TYS Platform FAQs

Trust Your Supplier (TYS) hosts a network of suppliers and customers to exchange validated, current, and trusted information about their businesses. TYS allows suppliers to maintain a trusted digital identity and choose when to permission that information to a vast network of partners.
Please contact Trust Your Supplier to establish an account as a customer. Email us at [email protected]. We will assign a Client Success Manager to answer your questions and work with you to enable TYS for your team.
The TYS Integration Services layer provides REST API interfaces to applications such as SAP, Oracle, and SAP Ariba to push or receive documents, data, and notifications. You will work with your designated TYS Client Success Manager to develop an integration plan that supports your current procurement processes.
As a nimble, customer-centric organization, we are willing to work at whatever pace best suits your organization. Based on previous experiences, the average time to get through a POC is 1-2 months and onboarding a group of suppliers from one geography takes roughly 2-3 months.
Trust Your Supplier works best on Google Chrome and Mozilla Firefox. We recommend using the latest versions of these browsers for the best performance. Edge is also supported. Please note that TYS does not support any versions of Internet Explorer (IE).
Only English is supported for buyers at this time. Our full list of languages for supplier users can be found on our Globalization page.
TYS is now available for supplier onboarding in over 100 countries. Please see Globalization for the full list. The country-specific attributes such as corporate identifiers, addresses, banking, etc. are all driven by the country identified for the supplier.
The TYS team can assist you with data cleansing, bulk invitations, and supplier adoption through dedicated resources assisting suppliers to populate their profile. Please work directly with your Customer Engagement Director to discuss the costs of these options.
TYS is built on an enterprise-grade platform with robust security and privacy controls. It supports Single Sign-On (SSO) and Multi-Factor Authentication (MFA) to protect user access and supplier profile data. The supplier's digital wallet is secured using blockchain technology, enabling tamper-proof audit trails for all profile changes. Role-based access controls ensure that data visibility is limited to authorized users based on their roles. Additionally, TYS follows industry-recognized security standards, including SOC 1/2 and ISO 27001, throughout its product development lifecycle. The entire privacy policy can be viewed at https://trustyoursupplier.com/privacy-policy/.
TYS supports risk orchestration across a wide range of domains, including: Cybersecurity risk (e.g., certifications, vulnerabilities, third-party assessments) Fraud and anti-bribery controls Financial and operational viability Sanctions and watchlist screening ESG (Environmental, Social, and Governance) Data privacy and security (e.g., GDPR, CCPA)
TYS supports new supplier onboarding, supplier request intakes from internal stakeholders, workflows and process orchestrations to ensure exceptions are managed and approvals obtained per your internal process controls. TYS also works with many 3rd parties to provide verifications and risk scores against the supplier profile. It also allows buyers to apply their own scores and weightings to the information for a 360 view. Suppliers have a portal to create and maintain their company firmographics, executive team, ownership and locations but also use our questionnaire framework to provide key information on many topics such as ESG, quality, information security, certifications and policies, etc.
Enhanced Supplier Data quality - Data cleaning and enrichment of supplier base Pre-Qualified Suppliers – Discover & assess supplier's risk before you onboard One place for Supplier Documents - Organized view of supplier documents. Faster onboarding and due diligence through pre-integrated data providers Unified risk view across suppliers and domains Automated risk workflows for approvals, alerts, and exceptions Prevent Bank Fraud: Bank Validation of Bank accounts Audit-ready compliance tracking and reporting Reduced risk blind spots with continuous monitoring Custom scoring models and configurable risk thresholds