Introduction
Parakeet Risk consumes external third‑party risk and sustainability data that customers license and authorize, unifying it with supplier records for monitoring, reporting, and action. This page explains supported feed types, ingestion methods, refresh cadences, field mapping, deduplication/linking, and audit logging.
Supported feed types (customer‑licensed)
-
ESG ratings and supplier assessments (e.g., EcoVadis, IntegrityNext)
-
Cybersecurity ratings (e.g., SecurityScorecard, RiskRecon)
-
Financial/credit and supplier viability indicators
-
Adverse media and enforcement actions
Note: Examples are illustrative only. Parakeet does not imply sponsorships or partnerships; ingestion occurs when customers provide access to their licensed sources.
Ingestion methods
-
API connector
-
Customer provides API base URL, auth method (key, OAuth, or token), and scopes.
-
Supports push (webhooks) or pull (scheduled GET). Rate‑limit aware with backoff.
-
SFTP/CSV
-
Drop zone with PGP encryption optional; schema validated on ingest.
-
Designed for Spreadsheet Synergy: preserves existing Excel/CSV layouts while adding enterprise‑grade automation and audit trails.
-
Email‑to‑ingest
-
Unique mailbox per tenant; attachments (CSV/XLSX) parsed against a registered schema.
-
Auto‑acknowledgment with validation results to sender list.
Refresh cadence options
-
Event‑driven (near‑real‑time): webhook push from source triggers ingest and normalization.
-
Scheduled: hourly, daily, or weekly pulls from API/SFTP.
-
On‑demand: user‑initiated sync for urgent investigations.
-
SLA guardrails: staleness thresholds raise alerts if a source has not refreshed within a configured window.
Mapping and normalization
Incoming fields are normalized to Parakeet’s unified risk model and enriched by the Rosella AI Agent for consistent scoring and categorization.
-
Core mapped attributes
-
vendor_id (customer master reference)
-
rating/score (numeric or tier mapped to standard scale)
-
issue_categories (standardized taxonomy)
-
last_update (UTC timestamp)
-
Additional metadata
-
source_name, source_dataset_id, collection_method (API/SFTP/Email)
-
data_scope (entity, facility, product, or domain)
-
confidence and effective_date
Deduplication and supplier linking
-
Deterministic linking using customer‑supplied keys (e.g., vendor_id, supplier ERP ID, registered domain) when available.
-
Probabilistic match when keys are absent: legal name similarity, country/region, website domain, and facility identifiers.
-
Link governance
-
Auto‑link when confidence ≥ threshold; otherwise route to review worklist.
-
All merges/splits are reversible with a full change history.
Sample anonymized payloads (representative)
The table shows how common sources map into Parakeet’s model after ingest. Values are illustrative only.
| source_type | example_provider | linking_key_provided | vendor_id | rating/score | issue_categories | last_update (UTC) | notes |
|---|---|---|---|---|---|---|---|
| ESG | EcoVadis (customer‑licensed) | supplier_legal_name + country | VND‑004521 | 63/100 | Labor, Environment | 2025‑08‑14T09:17:22Z | Includes medal level mapped to standard scale |
| Cybersecurity | SecurityScorecard (customer‑licensed) | website_domain | VND‑007833 | B (mapped → 80/100) | Vulnerabilities, Patch | 2025‑09‑01T21:05:10Z | Domain‑level scope captured in data_scope |
| Financial | Credit/viability source | supplier_account_number | VND‑003119 | 742 (mapped → 74/100) | Liquidity, Delinquency | 2025‑08‑28T12:33:47Z | Probability‑of‑default normalized to score |
| Adverse media | Media/enforcement feed | supplier_legal_name + country | VND‑009204 | N/A | Enforcement, Sanctions | 2025‑08‑30T04:02:11Z | Events deduped and severity‑tagged |
Data flow (high‑level)
Provider APIs / SFTP / Email → Ingestion Gateway (schema/quality checks) → Normalization & Rosella AI enrichment (taxonomy, scoring) → Dedup & Supplier Linker (deterministic/probabilistic) → Unified Risk Ecosystem (dashboards, alerts, workflows) → Downstream solutions: Continuous Compliance, Supply Chain Resilience, EHS Control Center
Governance and audit logging
-
Immutable event log: who/what/when/where for each ingest, mapping, transformation, and link/unlink action.
-
Evidence artifacts: original files/hash, API response fingerprints, validation reports.
-
Change management: versioned mappings and taxonomies; diff views highlight score or category changes between refreshes.
-
Access control: role‑based visibility to source data and vendor records; approvals captured directly in the workflow.
-
Export: audit packets (PDF + CSV manifests) for regulators and customers’ internal audits.
Setup checklist
1) Choose feed type and provider; confirm customer license and permissions. 2) Select ingestion method (API, SFTP/CSV, or email‑to‑ingest) and register schema. 3) Configure refresh cadence and staleness thresholds. 4) Define mapping rules and category taxonomy; enable Rosella enrichment. 5) Set linking strategy and review thresholds; test with a pilot file or sandbox API. 6) Activate alerts, dashboards, and audit exports.