FortifyData Automated Cyber Risk Management and Cyber GRC Platform https://fortifydata.com The Unified Platform for Cyber Risk Management, Cyber GRC, and Asset Intelligence. Tue, 10 Mar 2026 18:58:12 +0000 en hourly 1 https://wordpress.org/?v=6.9.2 https://fortifydata.com/wp-content/uploads/2022/03/mark-fortify_data-150x150.png FortifyData Automated Cyber Risk Management and Cyber GRC Platform https://fortifydata.com 32 32 Mitratech Prevalent Alternative for TPRM https://fortifydata.com/blog/mitratech-prevalent-tprm-alternative/ https://fortifydata.com/blog/mitratech-prevalent-tprm-alternative/#respond Tue, 10 Mar 2026 18:58:06 +0000 https://fortifydata.com/?p=23926 Evaluating Prevalent alternatives? See how FortifyData compares on ease of use, real-time risk visibility, and total cost — and why teams are making the switch.

The post Mitratech Prevalent Alternative for TPRM appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
Why TPRM Has Never Mattered More

Your vendors are your extended attack surface. According to the 2025 Verizon Data Breach Investigations Report, third-party involvement was linked to 30% of all breaches — double the prior year. Regulations like DORA, GLBA, and HIPAA now require organizations to demonstrate continuous, defensible oversight of their supplier ecosystem, not just an annual questionnaire or spreadsheet review.

To meet that challenge, many organizations turned to Prevalent, one of the earlier dedicated TPRM platforms on the market. But since Mitratech acquired Prevalent in October 2024, many wonder: Is there a better option?

This guide breaks down what Prevalent offers, where it falls short based on real user feedback, and why FortifyData has become a compelling, and in most cases, superior, alternative for third-party risk management.

What Is Mitratech Prevalent?

Prevalent is a third-party risk management platform that has been part of the TPRM market for over two decades. In October 2024, it was acquired by Mitratech, a legal, risk, and HR compliance technology company that has now made more than 24 acquisitions across its portfolio; so where is Prevalent’s priority among those internal integrations?

Key Features

Prevalent’s platform is built around several core capabilities:

  • Questionnaire-based risk assessments. This is Prevalent’s foundational approach. The platform provides a large library of pre-built questionnaires aligned to frameworks like ISO 27001, NIST, HIPAA, SOC 2, and SIG, and allows organizations to send these to vendors for self-assessment. Vendors complete assessments via a portal, and results feed into a risk register.
  • Continuous threat monitoring. Prevalent supplements questionnaires with external monitoring across five risk domains — data, brand, financial, operational, and regulatory. This includes alerts triggered by events like phishing detections, lawsuit filings, and credit score changes.
  • Automated document analysis. More recently, Prevalent introduced automated document analysis (ADA) using NLP and machine learning to check uploaded vendor evidence against keyword criteria, reducing the need to manually review supporting documents question by question.
  • Vendor Risk Networks. Prevalent operates shared assessment networks in verticals like healthcare and financial services, allowing vendors to complete an assessment once and share it across multiple customers.
  • AI enhancements. Since the Mitratech acquisition, Prevalent has introduced AI-assisted features including auto-population of questionnaires from prior Excel files and an AI assistant (“Alfred”) for platform navigation.

The Challenges with Prevalent

Despite its capabilities, consistent patterns emerge in user reviews on Gartner Peer Insights and G2 that are worth understanding before making a buying decision.

Questionnaires remain the core — and the bottleneck. Even with automation improvements, Prevalent’s workflow is fundamentally organized around sending, chasing, and processing questionnaire responses.

One Gartner reviewer put it directly:

Questionnaire fatigue is real for vendors, and delayed or incomplete responses create blind spots.

Complex onboarding and a steep learning curve. Multiple users across G2 and Gartner describe the platform as difficult to get up to speed on. One G2 reviewer noted:

Another Gartner reviewer described the product as

Inflexible reporting. Users frequently cite limitations in how data can be surfaced and exported. One reviewer noted being forced to export schedule reports to Excel just to analyze certain aspects of the process — defeating the purpose of a dedicated platform. Others specifically mentioned that dashboards cannot be customized to show only what’s relevant to their role.

Vendor portal friction. Gartner reviewers flagged that vendor users cannot see others from their own organization in the portal, cannot remove users themselves, and encounter unclear file upload workflows when completing tasks. These friction points slow down the very collaboration Prevalent is designed to enable.

Post-acquisition uncertainty. Mitratech has executed over 24 acquisitions across GRC software, legal tech, and HR technology. When any product is absorbed into a large, multi-product portfolio, questions about roadmap prioritization, support focus, and long-term product investment are legitimate. Teams evaluating Prevalent today are evaluating it as part of a much larger corporate entity — not the focused, independent TPRM company that built the product.

What Is FortifyData?

FortifyData is a Cyber GRC platform purpose-built for cybersecurity teams — unifying third-party risk management, attack surface management, vulnerability management, and compliance automation in a single platform. Its TPRM application goes beyond the questionnaire-centric model by leading with continuous, active monitoring of vendors’ external attack surfaces and layering in AI-powered SOC 2 and other report analysis, and AI workflow automation on top of traditional questionnaire management.

Key Features

Continuous external attack surface monitoring. Rather than waiting for the next assessment cycle, FortifyData continuously scans vendors’ internet-facing assets for vulnerabilities, misconfigurations, open ports, TLS/SSL issues, and dark web exposures. This gives teams live intelligence on vendor risk posture between formal assessments — not just a snapshot at the time a questionnaire was sent.

AI Auditor for vendor reports. FortifyData’s AI Auditor allows teams to upload SOC 2, HECVAT, SIG, and other vendor security documents and receive an intelligent audit against selected frameworks including NIST, ISO 27001, and CIS Controls. The AI generates a dashboard identifying gaps and control deficiencies, with page-specific citations from the original document — no manual line-by-line review required.

Agentic AI workflow automation. FortifyData’s AI vendor engagement agent autonomously handles outreach, sends context-aware follow-up questions, requests missing documentation, highlights non-compliance, and sends status reminders to vendors — dramatically reducing the administrative chase work that consumes most TPRM teams’ time. This is the future of TPRM to build an efficient and scalable program.

Questionnaire support (when you need it). FortifyData supports questionnaire-based assessments and auto-validates responses against live external data, closing the gap between what vendors claim and what is actually observable. Questionnaires are a tool in the workflow, not the entire workflow.

Unified Cyber GRC. For organizations that also need internal risk management, compliance automation (GLBA, HIPAA, HITRUST, ISO 27001, CMMC, and more), or attack surface visibility for their own environment, FortifyData covers all of it in one platform — eliminating the need for multiple point solutions.

FortifyData vs. Mitratech Prevalent: Core Comparison

Why Teams Choose FortifyData Over Prevalent

1. Faster Onboarding, Faster Value

Prevalent’s implementation requires significant upfront investment in configuration, training, and process-mapping. User reviews consistently describe the onboarding as overwhelming, particularly for teams new to formal TPRM programs. FortifyData is designed to deliver immediate value — the platform’s continuous monitoring begins generating vendor intelligence as soon as vendors are added, without requiring a fully designed questionnaire library to get started. Teams can get meaningful risk visibility within days, not months.

2. Easier to Use — for Your Team and Your Vendors

A TPRM platform that your team won’t use — or that your vendors find confusing — doesn’t reduce risk. FortifyData reviewers on Gartner Peer Insights describe it as straightforward to navigate, with responsive support and fast feature iteration based on customer feedback. One reviewer noted:

Critically, FortifyData’s vendor-facing workflows are designed to minimize friction, so vendors respond faster and more completely — reducing the chase work that eats up analyst time in questionnaire-heavy programs.

GPI_ReviewSnippet_193600_02052025

3. Real-Time Risk Visibility — Not Point-In-Time Snapshots

Questionnaires tell you what a vendor says about their security posture at a moment in time. FortifyData’s continuous external scanning tells you what is actually observable about their environment right now. If a vendor develops a critical vulnerability, exposes an open port, or has credentials appear on the dark web between assessment cycles, FortifyData surfaces it in real time — not at next year’s review. This shift from periodic compliance to continuous intelligence is fundamental to how modern TPRM programs should operate.

auto validation questionnaires

4. Smoother Vendor Collaboration

One of the most consistent criticisms of Prevalent from real users is the vendor portal experience — including the inability for vendor users to manage their own team members, unclear file upload workflows, and the general burden placed on vendors to “do the lifting.” When vendors find a platform difficult to work with, response rates drop and assessment quality suffers.

FortifyData’s agentic AI workflows autonomously guide vendors through the process — requesting the right documentation, following up contextually, and validating evidence automatically. The result is less email chasing for your team and less frustration for your vendors.

5. Better Value Across the Full Risk Picture

Prevalent is a point solution focused on the TPRM workflow. For organizations that also need attack surface visibility, internal vulnerability management, or compliance automation, that typically means purchasing and integrating additional tools. FortifyData consolidates those capabilities into a single platform — meaning fewer vendors to manage, fewer integrations to maintain, and a more accurate, unified view of your organization’s risk posture. For teams operating under budget pressure, that consolidation translates directly to cost savings.

enterprise dashboard demo co may2025

6. Responsive, Cybersecurity-Focused Support

FortifyData is a cybersecurity-native company, and its support model reflects that. Customers consistently describe response times as fast and the team as genuinely invested in their success — including implementing feature requests faster than most enterprise vendors. As one Gartner reviewer put it: “Fortifydata has been excellent to work with. Response to any questions that I have is quick and informative.”

By contrast, Prevalent’s acquisition by Mitratech — a company managing 24+ products across legal, HR, and risk verticals — raises reasonable questions about where dedicated TPRM support and innovation will rank in the broader corporate priority stack.

Real Results: Pima Community College

When Lorenso Trevino, CISO and Director of Security at Pima Community College in Arizona, needed to scale his team’s third-party risk assessment process, FortifyData’s AI Auditor delivered immediate, measurable results. Before FortifyData, each SOC 2 or HECVAT review required six to eight hours of manual analysis. After deploying the AI Auditor, that time dropped to one to two hours per vendor — enabling analysts to evaluate multiple vendors per day without sacrificing accuracy.

Trevino noted that he personally validated the AI’s output against manual analysis on the first several reports before trusting it fully. The results matched, and the team now focuses their attention on the flagged concerns rather than reviewing the entire document from scratch — a more intelligent, defensible approach to vendor oversight.

This kind of efficiency gain isn’t theoretical. It’s what frees TPRM teams to cover more of their vendor portfolio, respond faster to emerging threats, and demonstrate a stronger program to auditors and leadership.

Read more details in the case study.

Make Third-Party Risk Management Simpler with FortifyData

If you’re evaluating Prevalent alternatives because your current program feels like it’s held together by questionnaire follow-ups, manual document reviews, and spreadsheet exports — you’re not alone, and you’re not stuck.

FortifyData was built to do the hard work for you. Continuous monitoring that never stops between assessments. AI that reads vendor reports so your analysts don’t have to. Workflows that chase vendors automatically. A unified platform that covers TPRM, attack surface management, and compliance without requiring five different tools.

The goal isn’t just a better platform. It’s a TPRM program you can actually defend to auditors, regulators, and your leadership team — one that scales with your vendor ecosystem instead of lagging behind it.

Ready to see what a modern TPRM program looks like?

Frequently Asked Questions

Is Prevalent still supported after the Mitratech acquisition?

Yes, Mitratech has stated that existing customers will continue to have access to their account managers, customer success managers, and support teams. However, Prevalent is now one of more than 24 products within Mitratech’s portfolio, spanning legal tech, HR, and GRC. Organizations should evaluate whether a TPRM product owned by a large, multi-vertical acquirer will continue to receive the same level of focused innovation and support they received from an independent vendor.

What are the main limitations of questionnaire-only TPRM?

Questionnaire-based assessments have two fundamental constraints: they rely on vendor self-reporting (which can be incomplete or inaccurate), and they are point-in-time snapshots that become stale the moment they’re completed. A vendor could pass a rigorous assessment in January and develop a critical vulnerability in February. A questionnaire-only program wouldn’t know until the next annual review. Modern TPRM programs combine questionnaires with continuous external monitoring to close that gap.

Does FortifyData still support vendor questionnaires if needed?

Yes. FortifyData supports questionnaire-based assessments and can map responses to major compliance frameworks including NIST, ISO 27001, SOC 2, HIPAA, PCI DSS, and more. The key difference is that questionnaires are one tool within a broader, continuous risk monitoring workflow — not the primary mechanism for risk intelligence. FortifyData also auto-validates questionnaire responses against live external scan data, so you can see whether a vendor’s self-reported controls match observable reality.

How long does it take to transition from Prevalent to FortifyData?

Transition timelines vary depending on vendor portfolio size and existing process maturity, but FortifyData is designed for rapid deployment. Because continuous monitoring begins generating intelligence immediately upon vendor onboarding — without relying on a fully built questionnaire to be deployed — teams typically begin seeing value within days. FortifyData’s team works closely with customers during migration to ensure continuity of existing vendor relationships and historical risk data.

The post Mitratech Prevalent Alternative for TPRM appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
https://fortifydata.com/blog/mitratech-prevalent-tprm-alternative/feed/ 0
Make TPRM Work Disappear https://fortifydata.com/webinars/make-tprm-disappear-outsourcing-tprm-tips/ https://fortifydata.com/webinars/make-tprm-disappear-outsourcing-tprm-tips/#respond Thu, 26 Feb 2026 20:00:49 +0000 https://fortifydata.com/?p=23893 Live Session When: Tuesday, March 24, 2026 – 2:00pm ET / 11;aam PT Key Criteria for Outsourcing Due Diligence and Monitoring Third-party risk management (TPRM) often consumes disproportionate time and resources—leaving teams stretched thin on manual due diligence, vendor follow-ups, and continuous monitoring. Building on our popular “Improve Your TPRM Program in 45 Days” session, […]

The post Make TPRM Work Disappear appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
Live Session

Make TPRM Work Disappear

When: Tuesday, March 24, 2026 – 2:00pm ET / 11;aam PT

Key Criteria for Outsourcing Due Diligence and Monitoring

Third-party risk management (TPRM) often consumes disproportionate time and resources—leaving teams stretched thin on manual due diligence, vendor follow-ups, and continuous monitoring.

Building on our popular “Improve Your TPRM Program in 45 Days” session, this new session explores outsourcing TPRM to a managed service provider so you can truly make the burden disappear.

Discover the essential criteria for confidently outsourcing—guaranteed SLAs for due diligence turnaround, automated yet expert-driven continuous monitoring, intelligent escalation protocols for non-responsive vendors, and measurable outcomes like slashed risk exposure and compliance readiness without adding headcount.

Learn how FortifyData’s fully managed TPRM services—powered by our AI Auditor, workflow automation, and external attack surface intelligence—deliver these results through a dedicated team that handles everything end-to-end.

Attendees will gain clarity on evaluating managed providers and see why organizations are turning to FortifyData to offload TPRM entirely, freeing them to focus on core business growth and innovation.

Who should attend:

CIOs, CISOs, IT Directors, Security Managers, Risk and Compliance Officers, Third-party and Vendor Risk professionals.

Duration:

30 minutes, including Q&A

The post Make TPRM Work Disappear appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
https://fortifydata.com/webinars/make-tprm-disappear-outsourcing-tprm-tips/feed/ 0
AI-Powered Next Generation Third-Party Risk Management Whitepaper https://fortifydata.com/whitepaper/next-generation-third-party-risk-management-whitepaper/ Tue, 17 Feb 2026 13:49:42 +0000 https://fortifydata.com/?p=11226 Whitepaper: AI-Powered Next Generation Third-Party Risk Management In an increasingly interconnected digital ecosystem, third-party vendors are both essential enablers of business growth and significant vectors for cyber threats. With 30% of breaches linked to third-party involvement according to the 2025 Verizon DBIR (double the prior year’s rate), organizations face mounting pressures from evolving regulations like […]

The post AI-Powered Next Generation Third-Party Risk Management Whitepaper appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>

Whitepaper: AI-Powered Next Generation Third-Party Risk Management

AI-Powered Next Gen TPRM Whitepaper

In an increasingly interconnected digital ecosystem, third-party vendors are both essential enablers of business growth and significant vectors for cyber threats. With 30% of breaches linked to third-party involvement according to the 2025 Verizon DBIR (double the prior year’s rate), organizations face mounting pressures from evolving regulations like DORA and NIS 2 in Europe, alongside U.S. mandates such as GLBA, PCI DSS, and HIPAA.

Traditional TPRM approaches, reliant on manual reviews and static questionnaires, fall short. They lead to resource drains, inaccurate insights, and overlooked risks, including nascent AI vulnerabilities like prompt injections and data leaks.

This updated whitepaper from FortifyData explores the transformed TPRM landscape. It introduces a modern framework that integrates vendor classification, External Attack Surface Management (EASM), automated questionnaires with technical auto-validation, and groundbreaking AI innovations. Discover how our AI Auditor streamlines SOC 2, HECVAT, and other report analyses, reducing review times by over 75% with framework-aligned dashboards and citations, while AI Workflow Automation handles vendor onboarding, document requests, and compliance reminders autonomously.

Learn practical strategies for optimizing resources, leveraging contract renewals for vendor cooperation, and building resilience through breach planning. Featuring a real-world case study from Pima Community College and key requirements for next-gen solutions, this guide equips cybersecurity leaders with actionable insights to mitigate supply chain risks, ensure regulatory compliance, and scale TPRM without added headcount.

Download now to future-proof your program and explore emerging possibilities, like AI agent-to-agent interactions with vendor trust centers for seamless, context-aware data exchanges.

Download The Next Generation Third-Party Risk Management Whitepaper

The post AI-Powered Next Generation Third-Party Risk Management Whitepaper appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
Kenna Security Alternative https://fortifydata.com/blog/kenna-security-alternative/ Mon, 16 Feb 2026 21:20:43 +0000 https://fortifydata.com/?p=23772 As you likely know, Cisco Vulnerability Management (formerly Kenna Security) is sunsetting and putting Kenna Security to end of life support. FortifyData is more than capable as a risk-based vulnerability management (RBVM) module, among its suite of cyber GRC platform offerings. FortifyData is offering remaining Kenna Security customers support for a smooth transition to FortifyData- […]

The post Kenna Security Alternative appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>

As you likely know, Cisco Vulnerability Management (formerly Kenna Security) is sunsetting and putting Kenna Security to end of life support.

FortifyData is more than capable as a risk-based vulnerability management (RBVM) module, among its suite of cyber GRC platform offerings. FortifyData is offering remaining Kenna Security customers support for a smooth transition to FortifyData- migrating data, configure for streamlined prioritization and focus on CTEM-aligned exposure management strategies and remediation.

Key Milestone dates from the Cisco Vulnerability Management announcement

Kenna Security ProductEnd of Sale DateLast Date of Support
Cisco Vulnerability Management (Kenna.VM)March 10, 2026June 30, 2028
Cisco Vulnerability Intelligence (Kenna.VI)March 10, 2026June 30, 2028
Cisco Vulnerability Application Security Module (AppSec)March 10, 2026June 30, 2028

Vulnerability Management Changed

The landscape of vulnerability management has evolved significantly, driven by the exponential growth in vulnerabilities and the integration of advanced contextual factors such as Cyber Threat Intelligence (CTI), Exploit Prediction Scoring System (EPSS), and operational or business context.

What was once a straightforward prioritization exercise reliant primarily on Common Vulnerability Scoring System (CVSS) scores (essentially ranking scanner outputs by severity) has transformed into a more proactive, holistic approach aligned with Continuous Threat and Exposure Management (CTEM).

This shift enables organizations to predict exploitability, incorporate real-time threat data, and weigh business impacts, turning vulnerability management from a reactive task into a strategic forefront of risk reduction.

This progression may have contributed to Cisco’s decision to sunset its Vulnerability Management platform (formerly Kenna Security) in late 2025, as the tool, while pioneering in risk-based vulnerability management (RBVM), was rooted in an earlier era that focused on aggregation and prioritization without fully addressing the demands of modern, complex environments like cloud and AI-driven systems, prompting a move toward more unified exposure management solutions.

Why FortifyData as a Kenna Security Alternative

FortifyData is a Cyber GRC platform with the capabilities that support a CTEM strategy. 

Continuous asset discovery, vulnerability and threat exposure identification, threat monitoring, risk-based prioritization, remediation validation and power workflows will automate and power your CTEM strategy to manage threat exposure across assets, networks, and third parties.  

FortifyData dashboard tight image

Attack Surface Management & Internal Assessments: It conducts continuous external and internal assessments and can include cloud attack surface assessments to identify and mitigate exposures that can lead to breach and attack paths that can victimize your organization. 

Risk-Based Vulnerability Prioritization: This approach prioritizes vulnerabilities based on business context, incorporates threat intelligence, and exploitability, thereby focusing remediation efforts. FortifyData ingests multiple cyber threat intelligence feeds where you benefit from that enrichment against your asset inventory resulting in a dynamic and automated remediation prioritization.

Workflow for Mobilization:FortifyData’s platform for CTEM can be set to notify the relevant stakeholders when threat exposures or vulnerabilities are identified, asset footprint changes, remediation validations are confirmed or remain. The mobilization of your team based on automated findings is what moves the needle on reducing your overall threat exposure profile. 

(Beyond Kenna) Third-Party Risk & Security Ratings: Vendors can be thought of as a peripheral risk, often times managed by procurement with some programs informing security as part of the process. Vendor attack surface is your attack surface in many instances. This vector should also be monitorined and considered in your cyber risk profile for prioritization. FortifyData monitors vendor extneral attack surface exposure and produces security rating scores for both internal and external stakeholders.

(Beyond Kenna) Risk & Compliance Module: FortifyData also has a risk and compliance module for managing compliance to multiple frameworks. With ASM/vulnerability findings, native in the platform, it is seamless to link them to controls, policies and evidence to evolve towards continuous compliance management.

Gartner Peer Insight review snippet FortifyData image

Chief Information Officer in the Education Industry gives FortifyData Cyber Risk Management Platform 5/5 Rating in Gartner Peer Insights™ Vulnerability Assessment Market.
Read the full review here.

How Does CTEM and Vulnerability Management Differ? 

The biggest difference between CTEM and traditional vulnerability management is in their approach. Traditional security waits for problems to appear, while CTEM works continuously to stay ahead of attackers.  

Here’s a side-by-side look: 

AspectTraditional Vulnerability ManagementContinuous Threat Exposure Management
ApproachReactive: action begins after threats or breaches occur.Proactive: continuously identifies and prioritizes risks before they’re exploited.
FocusNarrow: known threats like viruses, malware, or missing patches.Broad:full visibility across the digital environment, including hidden and emerging risks.
TimingPeriodic: weekly, monthly, or quarterly scans and updates.Continuous: always monitoring, always assessing.
ScopeLimited: primarily systems within the corporate network.Comprehensive: spans cloud, endpoints, apps, vendors, and third-party ecosystems.
ResponseDelayed: issues fixed after detection, sometimes post-damage.Preventive: reduces exposure by closing gaps before attackers can act.
Tools UsedFirewalls, antivirus, and manual patching tools.Advanced automation, threat intelligence, and unified exposure management.
Value to LeadershipStatic reports that quickly go stale.Dynamic insights and metrics that guide strategic decisions and resource allocation.

Consolidated vs. Point Solution

Cybersecurity threats are escalating and legacy tools like Cisco’s Kenna Security are being phased out, platforms such as FortifyData emerge as robust alternatives by offering integrated cyber risk management that encompasses vulnerability prioritization and beyond. FortifyData provides a Kenna-like risk-based vulnerability management approach, leveraging machine learning to calculate risk scores that incorporate not just vulnerability severity but also business criticality, live threat intelligence, and exploit prediction. This enables organizations to move from reactive patching to proactive remediation, prioritizing exposures based on real-world exploitability and potential impact. By unifying these elements into a single platform, FortifyData eliminates the silos created by standalone tools, reducing the complexity and overhead of managing disparate systems.

The overarching benefits of adopting a platform that enables CTEM strategy, like FortifyData, lie in its promotion of efficiency, cost savings, and enhanced decision-making. Organizations no longer need to procure and maintain separate solutions for vulnerability scanning, threat intelligence feeds, or compliance reporting, which can lead to significant reductions in licensing fees and operational silos. Automation features, such as custom risk modeling and non-intrusive continuous assessments, streamline workflows, enabling faster risk quantification and remediation. Ultimately, this unified approach fosters a more resilient cybersecurity posture, aligning with modern demands for platform consolidation and business-contextualized risk management in dynamic digital environments.

A study from IBM and Palo Alto Networks found that companies that adopted a consolidated security platforms are achieving four times greater ROI (101%) than those with fragmented security stacks (28%).

FAQs

1. Is Kenna Security being sunset by Cisco?

Yes. Cisco Vulnerability Management (formerly Kenna Security) has an End of Sale date of March 10, 2026, and support continues until June 30, 2028. Organizations should plan migration before support fully ends.

2. What happens to existing Kenna Security users?

Existing customers can use the platform until June 30, 2028. After that, support ends. Teams must migrate data, workflows, and integrations to a new platform before the final support deadline.

3. Should teams replace Kenna with another RBVM tool or a broader platform?

Teams should evaluate long-term strategy. RBVM-only tools support prioritization, but broader CTEM-aligned platforms provide continuous monitoring, exposure management, and compliance integration for more comprehensive risk reduction.

4. What are the risks of delaying a Kenna replacement?

Delaying replacement may lead to rushed migration, outdated integrations, reduced innovation, and potential visibility gaps, increasing operational and security risk as end-of-life deadlines approach.

The post Kenna Security Alternative appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
How Attack Surface Management Drives CTEM Strategies https://fortifydata.com/webinars/how-asm-drives-ctem-strategies/ https://fortifydata.com/webinars/how-asm-drives-ctem-strategies/#respond Tue, 10 Feb 2026 21:47:13 +0000 https://fortifydata.com/?p=23719 Demo Spotlight Monthly live demos: real-world cybersecurity use cases & best practices. When: On Demand Recording Available Now Join this live, hands-on demonstration of FortifyData’s Attack Surface Management (ASM) module and discover how it directly powers a mature Continuous Threat Exposure Management (CTEM) program. See continuous asset discovery—external and agentless internal—combined with operational context and […]

The post How Attack Surface Management Drives CTEM Strategies appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
Demo Spotlight

How Attack Surface Management Drives CTEM Strategies

Monthly live demos: real-world cybersecurity use cases & best practices.

When: On Demand Recording Available Now

Join this live, hands-on demonstration of FortifyData’s Attack Surface Management (ASM) module and discover how it directly powers a mature Continuous Threat Exposure Management (CTEM) program.

See continuous asset discovery—external and agentless internal—combined with operational context and real-time cyber threat intelligence to deliver accurate, up-to-date risk prioritization that ensures your team remediates the exposures that matter most, first.

In this focused 30-minute session, we’ll explore key use cases including:

  • Comprehensive external asset discovery and attack surface visibility
  • Agentless internal assessments to unify hybrid data and close visibility gaps
  • How business/operational context + threat intelligence fuel our intelligent prioritization engine
  • Seamless linkage to GRC frameworks, risk registers, and compliance reporting for continuous governance

Perfect for security leaders building or advancing their CTEM strategy. Q&A included—bring your questions! 

Duration:

30–45 minutes, including Q&A

The post How Attack Surface Management Drives CTEM Strategies appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
https://fortifydata.com/webinars/how-asm-drives-ctem-strategies/feed/ 0
Future of TPRM: From Process Management to Autonomous Risk Intelligence https://fortifydata.com/blog/future-of-tprm-from-process-management-to-autonomous-risk-intelligence/ https://fortifydata.com/blog/future-of-tprm-from-process-management-to-autonomous-risk-intelligence/#respond Fri, 06 Feb 2026 23:20:17 +0000 https://fortifydata.com/?p=23699 The Future of TPRM: From Process Management to Autonomous Risk Intelligence For years, third-party risk management has been defined by manual effort, periodic assessments, and an uncomfortable tradeoff between speed and confidence. Security teams chase questionnaires. Vendors respond with static documents. Risk is assessed at a moment in time, then quickly becomes outdated. Even as […]

The post Future of TPRM: From Process Management to Autonomous Risk Intelligence appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>

The Future of TPRM:
From Process Management to Autonomous Risk Intelligence

For years, third-party risk management has been defined by manual effort, periodic assessments, and an uncomfortable tradeoff between speed and confidence.

  • Security teams chase questionnaires.
  • Vendors respond with static documents.
  • Risk is assessed at a moment in time, then quickly becomes outdated.

Even as tools have improved, the core operating model of TPRM has remained stubbornly human-driven and reactive. 

That model is nearing its end. 

Looking ahead, the evolution of TPRM points toward a fundamentally different future one that is largely autonomous, continuously operating, and intelligence-driven. In this future state, third-party risk management is no longer a workflow teams manage, but a system that manages itself. 

At the center of this transformation is AI. 

In an AI-powered TPRM world, organizations deploy intelligent risk agents that operate on their behalf. These agents understand the organization deeply its industry context, regulatory obligations, data sensitivity, operational dependencies, and risk tolerance.

Whether the organization operates in financial services, healthcare, higher education, or critical infrastructure, the agent carries that context into every risk interaction automatically. 

 

When evaluating a potential or existing third-party vendor, these agents no longer begin with a questionnaire. 

Instead, they communicate directly with the vendor’s trust center or assurance agent through secure, interoperable mechanisms. Policies, certifications, audit reports, penetration test summaries, resilience attestations, and control mappings are exchanged agent-to-agent in real time.

AI-powered vendor risk assessment begins.

Information is validated at the source, evaluated for relevance and freshness, and mapped directly against the organization’s regulatory and internal requirements without human intervention. 

Redundancy disappears. Vendor fatigue declines. Accuracy improves. 

Crucially, this interaction is not generic. The requesting agent negotiates precise access—only what is required based on the organization’s risk profile, contractual needs, and applicable regulations. If a vendor handles regulated data, supports mission-critical operations, or introduces systemic risk, the depth of review automatically increases. If the vendor is low-risk, the assessment remains lightweight and efficient. 

When gaps emerge outdated artifacts, missing controls, inconsistent claims the system does not escalate everything to a human. Instead, the agent issues targeted, contextual follow-up requests that are specific, defensible, and proportional to the risk. Humans are engaged only when judgment, approval, or accountability is required. 

This is what near-autonomous TPRM looks like. 

Risk assessments are no longer quarterly or annual events. They are continuous. Risk signals from trust centers, attack surface intelligence, incident disclosures, regulatory changes, and operational metrics are correlated in real time. Vendor risk scores evolve dynamically, not on spreadsheets or dashboards waiting for manual updates, but as living representations of exposure. 

Importantly, autonomy does not mean opacity. 

Every AI-driven action is explainable, auditable, and governed. Decisions are logged. Evidence is traceable. Human-in-the-loop controls exist where regulation, contracts, or material risk demand it. The system accelerates work but accountability remains human. 

The outcome is not just efficiency. It is a stronger, more resilient supply chain. 

Organizations move from chasing compliance to continuously validating trust. Security teams stop managing processes and start making decisions. Vendors engage through standardized, intelligent channels instead of repetitive questionnaires. And risk—once lagging behind the business—moves at the speed of the ecosystem it protects. 

This is where TPRM is going. 

Not incremental automation. 
Not better questionnaires. 

But a future where third-party risk management is largely autonomous, continuously aware, and designed for the scale and complexity of modern digital supply chains. 

And the organizations that embrace this shift early will not just manage risk better—they will operate with confidence others cannot match. 

This is precisely why FortifyData is taking intentional steps toward agentic, AI-powered vendor risk assessment workflows.

We are already delivering time and efficiency savings to clients with our AI Auditor of vendor reports (video at the top), which can be intelligently compared to other frameworks.

Our next effort automates the due diligence lifecycle to reduce the administrative burden of requesting information, initiating a custom questionnaire addressing gaps, evaluating provided evidence for an efficient risk decision.  

We believe the future of TPRM is not another layer of tooling, but a fundamentally new operating model one where intelligent agents execute risk workflows end-to-end, continuously and contextually, while humans retain oversight where it matters most. 

FortifyData TPRM AI Auditor dashboard and template library image

By building agentic workflows into the core of the platform, FortifyData is laying the foundation for autonomous risk operations that scale with the modern enterprise, reduce friction across the vendor ecosystem, and deliver real-time, defensible confidence in third-party relationships. This is not a distant vision; it is the direction we are actively designing toward and acting on today.

Related Posts

The post Future of TPRM: From Process Management to Autonomous Risk Intelligence appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
https://fortifydata.com/blog/future-of-tprm-from-process-management-to-autonomous-risk-intelligence/feed/ 0
FortifyData Unveils AI-Powered Innovations to Accelerate CTEM https://fortifydata.com/news/fortifydata-unveils-ai-powered-innovations-to-accelerate-ctem/ https://fortifydata.com/news/fortifydata-unveils-ai-powered-innovations-to-accelerate-ctem/#respond Tue, 03 Feb 2026 09:00:00 +0000 https://fortifydata.com/?p=23682 FortifyData Unveils AI-Powered Innovations to Accelerate Continuous Threat Exposure Management (CTEM) Platform Enhancements Automate Risk Prioritization and Remediation Planning, Transforming

The post FortifyData Unveils AI-Powered Innovations to Accelerate CTEM appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>

FortifyData Unveils AI-Powered Innovations to Accelerate Continuous Threat Exposure Management (CTEM)

Platform Enhancements Automate Risk Prioritization and Remediation Planning, Transforming Alert Overload into Proactive Cyber Resilience for Leadership Teams 

ATLANTA, GA, February 3, 2026  – FortifyData today announced significant enhancements to its AI-powered cyber risk management platform, designed to empower organizations adopting Continuous Threat Exposure Management (CTEM) strategies. 

FortifyData delivers the foundational visibility required for effective CTEM through continuous asset inventory assessments of both external and internal environments. Its Attack Surface Management capabilities automatically discover and monitor internet-facing assets, while agentless internal assessments—or integrations with leading security tools like Tenable, Qualys, Rapid7, Microsoft Defender, and others—provide comprehensive coverage of on-premises, cloud, and hybrid assets. By unifying these findings with cyber threat intelligence and business context, the platform creates a single, real-time view of cyber risk that seamlessly integrates with GRC processes and mobilizes security, compliance, and leadership teams around prioritized actions. 

Security teams are often overwhelmed by thousands of vulnerability alerts lacking business context or exploitability insights. FortifyData addresses this core data aggregation challenge head-on. 

The platform uses advanced AI and machine learning to unify disparate sources—including internal scans and external cyber threat intelligence. It then sifts through volumes of findings, assesses asset criticality to business operations, and delivers a prioritized list of the most impactful risks. 

Gone are endless CVSS-driven lists without filters. Instead, teams get actionable focus on real threats. 

Central to this is the dynamic risk map—a visual 5×5 grid categorizing exposures from critical to low with intelligence updates highlighting what changed, and takes organizational asset context into consideration, so clients get a prioritized synopsis. This enables rapid identification and decision-making. 

FortifyData dashboard dynamic risk map with AI-powered remediation recommendations

Clients have reported slashing remediation times by up to 50%, turning potential disruptions into controlled, prioritized actions. 

FortifyData is also introducing autonomous remediation planning recommendations—a new feature that charts the most efficient path to improved cyber readiness and resilience. 

It dynamically factors in the changing attack surface, existing compensating controls, and automated risk prioritization. The tool then generates tailored remediation options with attainable goals. 

Progress can be quantified via an updated cyber risk score, providing clear visibility into posture gains. Alternatively, you can query the system to find the most efficient path to improved cyber risk posture, and it will identify remediation activities to arrive at your desired goal, as represented by the score. (e.g. remediate these 3 items and improve score by 130pts, as depicted in the screenshot). 

For one healthcare provider and other clients, these capabilities have driven measurable improvements in overall security posture—reducing risk exposure, accelerating compliance alignment, and delivering substantial time savings in assessments and operations. 

FortifyData remediation planner cyber rating improvement

Organizations embracing continuous exposure management gain a proactive edge in reducing breach risk by focusing on the threats that matter most. FortifyData bridges identification to execution, making CTEM practical and measurable through automated prioritization and remediation. 

“CTEM isn’t just a buzzword; it’s a necessity for surviving in a threat landscape where attackers use AI to exploit weaknesses in real time,” said Victor Gamra, CEO of FortifyData. “Our platform empowers teams to unify fragmented security data, prioritize with precision, and remediate autonomously, delivering not just announcements of features but tangible outcomes like fortified resilience and operational efficiency.” 

To dive deeper into threat exposure strategy implementation, cybersecurity leaders are invited to the live session: “Implementing CTEM: Unifying Fragmented Security for Improved Cyber Resilience” on February 17, 2026. Register to save your spot for a discussion on adopting CTEM strategies. 

About FortifyData

FortifyData is a modern cyber risk management software platform built for cybersecurity teams, bringing together attack surface monitoring, third-party risk management, and compliance automation. It eliminates tool sprawl, improves visibility, and reduces cyber risk without complexity. Trusted by organizations worldwide, it offers complete cyber GRC capabilities, real-time risk intelligence, and compliance automation across frameworks, with a focus on cybersecurity use cases. For more on FortifyData’s CTEM-enabled solutions, visit www.fortifydata.com  

The post FortifyData Unveils AI-Powered Innovations to Accelerate CTEM appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
https://fortifydata.com/news/fortifydata-unveils-ai-powered-innovations-to-accelerate-ctem/feed/ 0
Implement CTEM Unify Fragmented Security Webinar https://fortifydata.com/webinars/implement-ctem-unify-fragmented-security-webinar/ https://fortifydata.com/webinars/implement-ctem-unify-fragmented-security-webinar/#respond Tue, 27 Jan 2026 02:09:01 +0000 https://fortifydata.com/?p=23654 Live Session On Demand Implement Continuous Threat Exposure Management (CTEM): Unify Fragmented Security for Proactive Cyber Risk Resilience When: On

The post Implement CTEM Unify Fragmented Security Webinar appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
Live Session On Demand

Implement Continuous Threat Exposure Management (CTEM): Unify Fragmented Security for Proactive Cyber Risk Resilience

When: On Demand

Fragmented security tools and static assessments leave organizations vulnerable to breaches that exploit overlooked gaps and constantly changing attack surfaces.

Continuous Threat Exposure Management (CTEM) delivers a transformative, proactive framework to unify disparate cybersecurity risk data sets—from vulnerabilities and misconfigurations to dark web intelligence and asset inventories—into a single, automated risk engine.

Gartner predicted that by 2026, organizations that prioritize their security investments based on a continuous exposure management program will be 3x less likely to suffer a breach.

Attendees will gain practical insights into:

  • Step-by-step strategies to implement CTEM and overcome common pitfalls
  • The critical role of automation in managing dynamic, ever-expanding attack surfaces
  • How CTEM integrates siloed data sources to create a continuous, unified view of cyber risk
  • Smarter risk prioritization based on real-world exploitability, asset criticality, and current threat intelligence (beyond outdated methods like CVSS alone)
  • Automated workflows that mobilize remediation teams quickly and measurably reduce exposure over time

Powered by FortifyData’s integrated platform, this session equips CISOs, security leaders, and IT professionals with actionable tactics to consolidate tools, automate processes, and deliver executive-level visibility into evolving exposures—shifting from reactive firefighting to proactive, measurable risk reduction.

Join us to explore CTEM implementation that aligns security with business outcomes, emphasizes breach prevention, and drives strong ROI. 

Duration:

30–45 minutes, including Q&A

The post Implement CTEM Unify Fragmented Security Webinar appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
https://fortifydata.com/webinars/implement-ctem-unify-fragmented-security-webinar/feed/ 0
AI SOC2 HECVAT Auditor Accelerates Vendor Risk Assessments at Pima Community College https://fortifydata.com/case-study/ai-vendor-risk-assessment-pima-community-college/ https://fortifydata.com/case-study/ai-vendor-risk-assessment-pima-community-college/#respond Tue, 20 Jan 2026 23:38:41 +0000 https://fortifydata.com/?p=23603 Using AI to scalable audit the increase of vendor SOC 2, HECVAT and other reports returned big time savings for overworked security analysts.

The post AI SOC2 HECVAT Auditor Accelerates Vendor Risk Assessments at Pima Community College appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
Pima Community College logo

AI SOC2, HECVAT Auditor Accelerates Vendor Risk Assessments at Pima Community College

Challenge

Pima Community College’s vendor risk assessments relied on manual SOC2 and HECVAT reviews. A single analyst would scrutinize documentation for compliance, taking 6-8 hours per vendor, per analyst, per day; limiting number of vendors to review and become a bottleneck for new services procurement and renewals. This process, shared among team members, consumed about 10% of their time, creating inefficiencies in this fast-paced educational setting.

Key Results

FortifyData’s AI Auditor dramatically reduces vendor review times of SOC 2 and/or HECVAT from 6-8 hours to just 1-2 hours. It was noted during this evaluation that the FortifyData AI Auditor reliably identifies compliance issues, gaps and flags potential risks that their side-by-side manual method comparison missed, delivering robust vendor risk management tailored for higher education institutions in Arizona. By automating AI vendor risk assessments, teams have slashed the time dedicated to vendor report reviews from 10% to under 2%, freeing up resources to prioritize proactive security tasks.

Background

Pima Community College, a leading Arizona institution based in Tucson, leverages FortifyData’s AI SOC2 auditor to streamline HECVAT and SOC2 vendor risk assessments, achieving faster compliance evaluations and freeing resources for strategic cybersecurity initiatives.

Pima Community College, serving diverse students across Tucson and southern Arizona with programs in healthcare, technology, business, and beyond, manages an extensive network of third-party vendors to support its operations. As a public community college, it prioritizes compliance with security standards to safeguard sensitive data and uphold institutional trust.

Lorenso Trevino, Chief Information Security Officer and Director of Security at Pima Community College, leads a team where one of the third-party risk management tasks is evaluating vendor security postures amid growing regulatory demands. Seeking to optimize SOC2 and HECVAT analysis, Trevino tried FortifyData’s AI auditor—a solution tailored for efficient third-party risk automation in higher education – and later adopted it in their vendor review process.

Challenges

Before FortifyData, Pima Community College’s vendor risk assessments relied on manual SOC2 and HECVAT reviews. A single analyst would scrutinize documentation for compliance, taking 6-8 hours per vendor (depending on comprehensiveness of documentation provided by vendor) and limiting throughput to one analysis per day. This process, shared among team members, consumed their time, creating inefficiencies in their educational setting.

“Our college conducted a manual SOC2/HECVAT review,” Trevino explained.

“This involved one analyst reviewing key points in the documentation to ensure the vendor met the minimum requirements to proceed.” These manual efforts hindered timely vendor onboarding and diverted attention from other critical cybersecurity duties.

Solution

To address these hurdles, Pima Community College integrated FortifyData’s AI SOC2 HECVAT auditor, automating the analysis of vendor risk reports. This feature “reads” SOC2 and HECVAT documents, identifies compliance gaps, against the standard and delivers structured summaries and dashboards for swift human validation—ideal for institutions navigating complex vendor ecosystems.

Initially skeptical, Trevino’s team cross-verified early results with manual checks. See how the AI Auditor works in this quick video.

“I am always skeptical of the results of AI,” Trevino noted.

“As such, we verified our first couple of reports with a separate, manual analysis.”

The AI proved accurate, allowing focus on flagged concerns and building trust in the TPRM AI analysis for ongoing third-party risk automation.

The results showed that the report was relatively accurate; however, we gained a significant advantage by focusing only on the areas of concern, thereby reducing unnecessary analysis. Although we will still manually validate certain controls, our results have shown that the analysis provided by the AI auditor is generally trustworthy.

Lorenso Trevino Chief Information Security Officer / Director of Security Pima Community College

Key Benefits:

  • FortifyData’s AI SOC2 HECVAT auditor slashes review times from 6-8 hours per vendor to 1-2 hours, enabling their analysts to handle multiple assessments daily while maintaining accuracy in third-party risk automation.
  • The AI Auditor draws reliable conclusions on compliance issues, flagging potential risks that manual processes might overlook, ensuring robust vendor risk management for higher education institutions.
  • By automating AI vendor risk assessments, teams reduce time spent on vendor report reviews and assessments from 10% to under 2%, allowing focus on proactive security tasks and enhancing overall cybersecurity posture in a demanding educational environment.
FortifyData AI Auditor of SOC 2 and vendor reports dashboard image

The Results

Implementing FortifyData’s AI vendor risk assessment tool yielded impressive outcomes for Pima Community College. Review times plummeted by over 75%, from 6-8 hours to 1-2 hours per vendor, empowering analysts to process multiple evaluations daily amid other tasks.

Team time allocation for vendor reports dropped from 10% to less than 2%, providing substantial capacity for strategic initiatives.

The AI auditor of vendor reports like SOC 2, HECVAT or others, not only replicates manual findings but also highlights overlooked issues, strengthening compliance. “Yes, absolutely. [The AI Auditor analysis would] Draw the same conclusions in a fraction of the time, while also highlighting concerns that we may have overlooked,” Trevino affirmed. For higher education, this means more reliable SOC2 and HECVAT analysis without resource strain.

"The best part is that they can shift their focus to other tasks while the AI auditor is doing its documentation analysis. This is a big win for my team."
Lorenso Trevino
Chief Information Security Officer / Director of Security

Why FortifyData?

FortifyData’s AI SOC2 HECVAT auditor has revolutionized vendor risk assessments at Pima Community College, delivering efficient, accurate results that support Arizona’s educational cybersecurity needs. By automating compliance checks, the platform ensures institutions like Pima can prioritize secure operations confidently.

As Pima Community College advances, FortifyData stands as a key partner in third-party risk management. Discover how our AI vendor risk assessment solutions can enhance your higher education security—schedule a demo to see the innovation.

The post AI SOC2 HECVAT Auditor Accelerates Vendor Risk Assessments at Pima Community College appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
https://fortifydata.com/case-study/ai-vendor-risk-assessment-pima-community-college/feed/ 0
Demo Spotlight Third-Party Risk Management https://fortifydata.com/webinars/demo-spotlight-third-party-risk-management/ https://fortifydata.com/webinars/demo-spotlight-third-party-risk-management/#respond Fri, 09 Jan 2026 22:21:26 +0000 https://fortifydata.com/?p=23538 Demo Spotlight Monthly live demos: real-world cybersecurity use cases & best practices. When: On Demand Recording Available Now Join this

The post Demo Spotlight Third-Party Risk Management appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
Demo Spotlight

Demo Spotlight Third-Party Risk Management

Monthly live demos: real-world cybersecurity use cases & best practices.

When: On Demand Recording Available Now

Join this live, hands-on demonstration of FortifyData’s powerful Third-Party Risk Management (TPRM) application. Discover how to streamline vendor risk processes, eliminate blind spots, and make faster, more accurate decisions—all while leveraging our latest AI innovations.

In this focused session, we’ll walk through key use cases including:

  • Efficient vendor due diligence and onboarding evaluations, with clear criteria for risk-informed decisions
  • Issuing, managing, and auto-validating questionnaires—combining responses with live data to close gaps quickly
  • Proactive continuous monitoring powered by direct external attack surface assessments and vulnerability scanning (not passive data), so you can track score changes, prioritize critical vendors, and stay ahead of evolving threats
  • Our new AI Auditor feature, which intelligently analyzes vendor security reports (such as SOC 2, ISO 27001, and more) against selected frameworks—delivering intuitive dashboards with gap highlights, control deficiencies, and precise page citations in minutes

Whether you’re scaling your TPRM program or refining existing workflows, this demo will equip you with practical guidance to reduce manual effort, strengthen visibility, and proactively manage third-party cyber risk.

Live Q&A included. Recordings available post-event for you and your team.

The post Demo Spotlight Third-Party Risk Management appeared first on FortifyData Automated Cyber Risk Management and Cyber GRC Platform.

]]>
https://fortifydata.com/webinars/demo-spotlight-third-party-risk-management/feed/ 0