Skip to content

ANNOUNCEMENT: Get Software Supply Chain Accountability with a Software Bill of Materials (SBOM). Learn More >>

Speak with an Expert


Asset to Vendor Library for Asset Owners

Access a central repository of third-party risk data to strengthen security and simplify compliance.

Join the community built for and by critical infrastructure.

The Fortress A2V Library is a unique community for information sharing and collaboration, providing clients with access to a library of more than 40,000 vendors and millions of assets. It is the only exchange that offers a complete cyber supply chain management solution for mission critical industries like electric power.

NATF Based 

Supplier provided supply chain risk assessments that are aligned with NATF criteria 


Live reports for suppliers and cyber assets on the network, and real-time alerts for new incidents or vulnerabilities


Product assessments that provide visibility on vulnerabilities, patch history, and security controls


Verified and validated vendor supplied security assessments
with evidence review by a
technical expert

We speak the same language.

Fortress aligns with standards set forth by North American Electric Reliability Corporation (NERC) and North American Transmission Forum (NATF). The A2V library serves not only as means for managing supply chain cyber risk but also as a system of record for simplifying compliance requirements.

Security should be accessible to all organizations, big and small.

Traditional third-party risk assessment services are a large financial undertaking for any business. Critical industries often lack budget and infrastructure to support initial vetting and continuous monitoring of their vendor network. This leaves them vulnerable to breaches.

The A2V Library provides load balancing of costs to ensure that a well-developed risk management program is affordable and available for any organization that supports critical infrastructure, no matter its size.

Take a virtual tour.

Fortress Platform makes it possible to orchestrate strategic processes and continuously monitor a wide variety of threats to identify weaknesses in your technology footprint.

Select a time to get started and access the library 

To get started, select a date and 30 minute time slot below to connect with an implementation specialist who can activate your account, show you around and answer any questions you may have.