Skip to main content

Supply Chain Discovery

Updated this week

Supply Chain Discovery

📌 Overview

The Supply Chain Discovery feature gives you clear visibility into your company’s extended attack surface. It helps you identify hidden third- and Nth-party vendors, spot Shadow IT, and mitigate the risks associated with unknown parties. By seeing technological connections, you can make more informed decisions and strengthen your overall security posture.


💡 Key Benefits & Capabilities

  • Gain visibility: Discover hidden suppliers and technological connections, spot Shadow IT, and make informed decisions.

  • Risk-based approach: Understand supplier risk through cyber posture scores and commonality metrics (% of Panorays’ organizations that have this supplier in their inventory).

  • Mitigate risk: Add the relevant discovered suppliers directly to your TPRM program to reduce exposure.


🔍 How to Access Supply Chain Discovery

  • Navigate to the My Company tab and select Supply Chain Discovery to view your organization’s extended supply chain.

  • Click the arrow next to a company to see the discovery method, supporting evidence, and related assets.

  • To view a specific supplier’s own supply chain, go to the Supplier Page and select the Supply Chain tab.


➕ Adding Suppliers

  • Single company: Hover over the company and click “Add”.

  • Multiple companies: Select checkboxes next to the companies and click “Add to Inventory”.

💡 Note: Companies already in your environment will not show the Add button. Instead, you can view or edit the existing supplier.


✏️ Completing the Add Supplier Process

After clicking Add, you’ll be taken to the Add Supplier page:

  1. The company name and domain are pre-populated

  2. Complete the Business Information section

  3. Select a Business Impact

  4. Assign the supplier to your preferred Evaluation Type

  5. Click Publish to add the supplier to your environment


📌 Summary

Supply Chain Discovery simplifies supplier visibility and assessment, helping you identify, assess, and add suppliers efficiently. By providing insights into hidden third parties and Shadow IT, it strengthens your TPRM program and reduces risk across your extended attack surface.

Did this answer your question?