By selecting a specific supplier, you can view a breakdown of the various elements that make up the supplier’s ratings and scores, alongside any additional information about the company.
Supplier Approval Status
Next to the supplier’s name is an icon that indicates the approval status of the supplier.
Who added the supplier?
On a supplier’s page, you will see an overview of who added the supplier and when.
4th Parties
You can view the technologies and third parties that were automatically discovered for any given supplier by clicking on the 4th Parties option.
Download Report
Click on Download Report to receive a PDF report that will automatically be saved to your computer.
The report consists of the supplier’s information, Cyber Posture, Questionnaire assessment overview, and other information.
Documents and Files
You can view any of the files uploaded by the supplier as part of their questionnaire responses, as well as files your team may have uploaded for this supplier.
Business Snapshot
Clicking on the Business Snapshot will open an overview of the supplier’s information including: organization, industry, location, number of employees, social media links and any other information related to your business relationship with the supplier. This includes information you may have added, such as certificates and compliance information from their websites.
Editing a Suppliers’ Information
You can make edits to your suppliers’ information on the Supplier Rating Page by clicking on "Edit supplier's information".
Invite Supplier to Register
By clicking on "Invite Supplier", you can invite the supplier to view their own Panorays Security Profile. It’s important to note that they won’t see the contextual information you have entered about them (for example: how critical they are to your business or any documents you uploaded about them).
Findings
Click on Findings in the top menu on the supplier’s page to view all the findings that were discovered during the external assessment.
The findings can be filtered by:
Severity: Critical/High/Medium/Low/Info
Asset: Certain IP/domain/subdomain
Category and Sub-Category: e.g., DNS under Network and IT
Status: Open/In Dispute/Done
Clicking on a finding will open a window on the right-hand side of the screen with more information about what needs to be done to remediate the finding and why.
You also have the option to leave an internal note or a file for any of your company's internal users to view.
We recommend sharing the findings with your suppliers to allow them to work on them and improve their security posture.








