Glossary
Report an Issue
Newsroom
Try SAFE for Free
SAFE One
SAFE One
SAFE 3.1
SAFE 3.2
Contents
x
Getting Started
User Guide
Settings
Integration Guides
Release Notes
Support Matrix
SAFE KB Articles
Beta
Powered by
User Guide
5 Articles
in this category
Print
Contents
User Guide
5 Articles
in this category
TPRM Onboarding Guide
Overview Third-party risk management is essential in cybersecurity, especially as organizations increasingly depend on external vendors, suppliers, and service providers. These relationships can introduce risks to your organization, such as data se...
Dashboard
Introduction SAFE Dashboards are composed of widgets that show snapshots and visualizations of your risk posture. This helps you quickly see and compare different Groups and Risk Scenarios. Every user can create their dashboards in SAFE to easil...
Risk Scenario
4 Articles
in this category
Group
2 Articles
in this category
Questionnaire
1 Article
in this category
People
Users Employees of your organization (People) are considered as an attack surface in SAFE. The system automatically fetches the users from integrations like KnowBe4 , Proofpoint , and Phishing report upload . The user list displays the detai...
Assets
Introduction This page displays a list of all the onboarded assets in SAFE and their details, such as Asset Name, Asset Type, IP Address, Criticality, Last Assessed Date, Asset Owner, and others. Users can perform the following action on the a...
Peer Insights
Overview of SAFE Peer Insights At SAFE, transparency is paramount in our approach to data collection and usage. A recurring query from our customers revolves around benchmarking their performance against industry standards. To facilitate this, S...
Configure Single Sign-On (SSO)
7 Articles
in this category