Blood Hound Underground Utility Locators logo
  • Industry Energy
  • Footprint 20 IPs
  • Followers Monitored by 3 companies
  • Year founded 1999
  • Employees 78

Blood Hound is an underground utility locating firm based in the heart of the Midwest, providing services nationwide. Using state-of-the-art techniques and technology, we can locate any and all underground utilities and structures.That includes privately owned and exotic facilities such as chilled water, chemical transport, process, waste, or underground storage tanks. Although it’s the law to call 8-1-1 before you dig, this system doesn’t locate these utilities. Blood Hound makes use of a variety of technologies, including state-of-the-art EM scanning, GPS mapping, Ground Penetrating Radar, camera inspection, and vacuum excavation, so you can be sure that if it’s on your job site, you will know about it before your shovel does.

80/ 100
Start Free Trial

SecurityScorecard calculates cybersecurity scores based on 10 factors that reflect different cybersecurity practices and risks.

What do our scores mean?
What do our scores mean?
We learned from over 12 million cybersecurity ratings that companies with an F are 13.8 times more likely to be impacted by a breach versus those with an A.

SecurityScorecard Badge

Business prospects want to know that you're maintaining a strong cybersecurity program. Show it off with a free SecurityScorecard badge.

Latest news

Others in their industry

Loading...

What do we measure?

Footprint
Footprint
issue
issue
factor
grade

SecurityScorecard collects billions of signals each week, helping organizations see risks, get more actionable information, and respond faster to keep up with threat actors. Security teams are able to react quickly to digital criminals, respond to Zero-Day incidents faster, and reduce the risk exposure timeline.

Learn More About Security Signals

These are some of the factors we use to calculate the overall score:

issue

Network Security

Discover open access points, insecure or misconfigured SSL certificates, or database vulnerabilities.

issue

Patching Cadence

Understand how diligently a company is patching its operating systems, services, applications, software, and hardware in a timely manner.

issue

IP Reputation

See the quantity and duration of malware infections, along with other factors influence the overall assessment of an organization’s IP Reputation.

issue

Endpoint Security

Understand the effectiveness of protections in place for laptops, desktops, mobile devices, and all employee devices that access that company’s network.

SecurityScorecard logo emblem

How is your Scorecard calculated?

Take a look at the 10 factor categories at the core of SecurityScorecard’s cybersecurity rating methodology.

Embed security into your company DNA

Cyber risk ratings influence business activity from the loading dock to the board room. Learn all how to incorporate security ratings insights into workflows throughout your organization

Scorecards deliver real value

How do you quantify cyber risk management? Threat prevention may be hard to compute, but Forrester Consulting has done the work or you. Spoiler alert: SecurityScorecard customers realize investment payback in under a quarter.

11,000,000+ companies rated

Get your free Security Ratings report to see your custom score

Get Free Report

Trending Scorecards