Third Party Risk Management - Consultancy, Assessment & Advisory

Supplier Assess

A 3rd Party Supplier Security Assessment Service

Taking the pain out of Third Party Risk Assessment. Performing effective supplier due diligence and IT security assessments is a critical aspect of your Third Party risk management program. But it’s expensive, time-consuming, and often painful… for both your organisation, as well as each supplier. SupplierAssess is a Third Party Risk Managed Service that allows you to simplify and improve your existing Third Party risk management program by leveraging DVV Solutions’ expertise in performing and analysing Third Party risk. The subscription-based service uses industry best practices to enable you to scale your Third Party risk management program without the need for additional staff or resources. SupplierAssess accomplishes this by providing the technology, process and people necessary to efficiently understand supplier risk, help you remediate inefficient controls and better prepare and protect your organisation from Third Party risks.

SupplierAssess leverages our Supplier Risk Manager and Supplier Threat Monitor platforms to provide you with robust management of assessment data and real-time threat intelligence. We utilise Shared Assessments industry-standard practices including Standardised Information Gathering (SIG) questionnaires and Standardised Control Assessments (SCA) for onsite assessments. Your dedicated certified IT Security Assurance Consultant performs detailed analysis based on all the data and evidence gathered and will then present and consult on the resulting risk report and recommended improvements to mitigate any identified risks.

SupplierAssess delivers:

Streamlined Assessments – the resource to assess mission-critical suppliers within a shorter timescale

Enhanced Capability – the processes, resource and skills to manage and analyse large volumes of complex supplier risk assessments

Independent, Professional Verification – the collection, analysis and reporting of each supplier’s risk profile from CTPRP-certified IT Security Assurance Consultants – especially critical for highly regulated industries

Improved Scalability – the flexibility to manage more suppliers and assessments with greater efficiency


  • Expert risk assessment support from a dedicated, CTPRP certified IT Security Assurance Consultant who understand your business requirements
  • Ranking of suppliers and risk factors, collection of assessments and evidence for each Third Party supplier
  • Continuous monitoring from that provides supplemental data points about a supplier’s threat landscape
  • Supplier Assessment Dashboard and Annual Report that include findings and mitigation recommendations


  • We understand your risk appetite, security objectives and compliance requirements
  • We collect supplier questionnaires, supporting evidence and onsite assessments
  • We provide detailed risk analysis, reports and recommendations on information accumulated, industry intelligence and contextual risk environment
  • We work with you and suppliers to implement remediative measures and process improvements
  • We provide continuous threat intelligence between annual assessments

TPRM delivered to your desk

Lorem ipsum dolor sit amet, consectetur adipiscing elit. In mollis convallis eleifend. Sed convallis justo eget ipsum fermentum, non eleifend justo posuere. Sed sollicitudin dolor ac mi viverra consectetur. In ullamcorper a ex id vehicula. Pellentesque porta finibus lorem vitae rutrum. Nulla tincidunt neque sed lacus congue auctor. Morbi at lorem odio. Nunc quis arcu id magna molestie placerat.

Call today 0161 476 8700

or Submit a Contact Form


Why choose us?

We are specialists in Third Party Risk Management with over 18 years of experience in Cyber Security and Governance, Risk & Compliance
We are a Shared Assessments program member and recognised Assessment Firm with CTPRP-certified IT Security Assurance Consultants.
We are focused on delivering a Third Party Risk Management program that secures your data supply chain and enhances your IT security posture.