Panorays | Company Profile
Contact Information
Industry & Market
Company Metrics
Funding Information
Headcount Distribution
By Department
Department Breakdown
Technology Stack
Email & Communication
Keywords & Focus Areas
Panorays
Overview
Panorays is a technology company based in New York City, founded in 2016. It specializes in SaaS-based third-party security risk management, offering a platform that automates the assessment, monitoring, and management of cybersecurity risks associated with third-party vendors and supply chains.
The core of the platform includes automated vendor questionnaires, external attack surface assessments, and business context analysis. This multi-dimensional approach provides organizations with continuous visibility into vendor security postures and helps prioritize risks effectively. The platform integrates compliance checks for major regulations and automated frameworks, ensuring regulatory alignment. Panorays assigns a unique "Risk DNA" rating for each third-party connection to provide actionable insights. The primary customer base includes enterprise and mid-market organizations across North America, the UK, and the EU, with strength in sectors such as banking, financial services, insurance, and healthcare. The company is led by experienced co-founders and has received substantial investment from leading venture capital firms.
Basic Information
| Industry | information technology & services |
|---|---|
| Founded | 2016 |
| Revenue | 3.7M |
| Headquarters | 41 E 11th St, 10th Floor, New York, NY 10013, United States |
Contact Details
- Phone: +1 929-529-6116
- Website: panorays.com
- LinkedIn: linkedin.com/company/panorays
Key Focus Areas & Initiatives
- Information security
- Security as a service
- Third party security risk management
- Vendor cyber risk
- Third party security platform
- Cybersecurity risk ratings
- Vendor risk management
- Thirdparty risk management
- Software development
- B2B
- Third-party vulnerability management
- Third-party security
- External attack surface management
- Remediation automation
- Cybersecurity monitoring
- Consulting
- 4th and 5th party risk
- Business impact analysis
- Third-party risk monitoring
- Third-party cybersecurity
- Automated questionnaires
- Vendor risk assessment
- Regulatory compliance
- AI-driven risk predictions
- Risk assessment
- Third-party risk ratings
- Dynamic risk ratings
- Third-party cyber risk management
- Supply chain visibility
- Cybersecurity posture
- External attack surface
- Real-time threat detection
- Supply chain monitoring
- Continuous monitoring
- Remediation plans
- Shadow IT detection
- Cyber posture ratings
- Risk DNA
- Supply chain cybersecurity
- Vendor security monitoring
- Risk DNA ratings
- Vendor security assessment
- Healthcare
- Cybersecurity questionnaires
- Data security
- Supply chain security
- Professional services
- Supply chain attack surface
- Risk assessment automation
- Vendor security gaps
- Cyber risk ratings
- External attack surface monitoring
- Third-party cybersecurity automation
- Threat alerts
- Dark web insights
- AI-powered questionnaire validation
- Attack surface management
- External asset scanning
- Third-party risk management
- Third-party cyber risk
- Risk DNA assessments
- Engagement communication
- Cyber security monitoring
- Reporting & dashboards
- Supplier portfolio management
- Security program integrations
- Enterprise risk management
- Mergers & acquisitions
- Executive-level reporting
- Vulnerability management
- Automated assessments
- Automated workflows
- Contextual cyber ratings
- Supplier cybersecurity
- Risk exposure insights
- Incident response plans
- Audit trail for communications
- Task automation
- Visibility into third parties
- Digital footprint assessment
- Non-compliance alerts
- Risk mitigation strategies
- Vendor risk assessments
- Customized questionnaires
- Compliance templates
- Threat landscape mapping
- Security posture evaluation
- Third-party risk lifecycle
- Data privacy compliance
- Cyber risk reporting
- Shadow IT discovery
- Risk management frameworks
- AI-powered validation
- Remediation tracking
- Incident response coordination
- Cybersecurity compliance standards
- Finance
- Computer & network security
- Information technology & services
- Health care
- Health, wellness & fitness
- Hospital & health care
- Professional training & coaching
Technologies Used
- AI
- Circle
- CloudFlare Hosting
- Cloudflare DNS
- Gmail
- Google Apps
- Microsoft Office 365
- React
- Reviews
- Salesforce
- WP Engine