About
Resolver gathers all risk data and analyzes it in context — revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks — whether compliance or audit, incidents or threats — and translates those effects into quantifiable business metrics. Finally, risk becomes a key driver of opportunity instead of being disconnected from the business.
Choose the risk intelligence software used by over 1000 of the world’s largest organizations. Resolver makes it easy to collaborate and collect data from across the enterprise, allowing teams to fully understand their risk landscape and control effectiveness. Understanding your data is one thing; being able to use it to drive vital action. Resolver automates workflows and reporting to ensure risk intelligence turns into risk reduction.
Welcome to the new world of Risk Intelligence.
|
About
At Swimlane, we believe the convergence of agentic AI and automation can solve the most challenging security, compliance and IT/OT operations problems. With Swimlane, enterprises and MSSPs benefit from the world’s first and only hyperautomation platform for every security function. Only Swimlane gives you the scale and flexibility to build your own hyperautomation applications to unify security teams, tools and telemetry ensuring today’s SecOps are always a step ahead of tomorrow’s threats.
Swimlane Turbine is the world’s fastest and most scalable security automation platform. Turbine is built with the flexibility and cloud scalability needed for enterprises and MSSP to automate any SecOps process, from SOC workflows to vulnerability management, compliance, and beyond. Only Turbine can execute 25 million daily actions per customer, 17 times faster than any other platform, provider, or technology.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Organizations interested in a powerful risk intelligence platform
|
Audience
Cybersecurity; Security Operations Centers; Enterprises; Managed Security Service Providers
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$10,000/year
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationResolver
Founded: 2000
Canada
www.resolver.com
|
Company InformationSwimlane
Founded: 2014
United States
swimlane.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|||||
|
||||||
CategoriesWithout visibility and action across complex, multi-page, multi-language social media pages and campaigns, negative and abusive user activity will continue to disrupt your online communities, alienate your consumers, and cut your bottom line. Safeguard your audiences across owned channels and paid activity so you can increase brand engagement and return on ad spend with an inviting and safe brand community. Our reliable moderation accuracy keeps your online presence welcoming, effective, and secure. We proactively protect your campaigns, offering visibility into owned accounts and paid activities while distinguishing the differences between organic and paid audience interactions. Through advanced detection and comprehensive insights, we safeguard your paid ROI and strengthen customer connections. |
Categories |
|||||
Incident Management Features
Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
Incident Reporting
IT Incident Management
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management
Incident Response Features
Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
Security Orchestration
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management
Audit Features
Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management
Compliance Features
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
Incident Management
ISO Compliance
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
GRC Features
Auditing
Disaster Recovery
Environmental Compliance
Incident Management
Internal Controls Management
IT Risk Management
Operational Risk Management
Policy Management
Integrated Risk Management Features
Audit Management
Compliance Management
Dashboard
Disaster Recovery
Incident Management
IT Risk Management
Operational Risk Management
Risk Assessment
Safety Management
Vendor Management
Investigation Management Features
Contact Management
Data Management
Incident Management
Reporting & Statistics
Subject Profiles
PCI Compliance Features
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
Patch Management
PCI Assessment
Policy Management
Physical Security Features
Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues
Risk Management Features
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
Internal Controls Management
IT Risk Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment
Vendor Management Features
Audit Management
Contact Management
Customer Database
Self Service Portal
Supplier Master Data
Transaction History
Vendor Maintained Profiles
Vendor Managed Inventory
Vendor Performance Rating
Vendor Qualification Tracking
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
|
Incident Management Features
Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
Incident Reporting
IT Incident Management
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management
Incident Response Features
Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
Security Orchestration
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
|
|||||
Integrations
Okta
ServiceNow
Slack
Zendesk
Amazon Web Services (AWS)
Carbon Black EDR
Check Point IPS
Check Point Infinity
Cofense Intelligence
CylanceENDPOINT
|
Integrations
Okta
ServiceNow
Slack
Zendesk
Amazon Web Services (AWS)
Carbon Black EDR
Check Point IPS
Check Point Infinity
Cofense Intelligence
CylanceENDPOINT
|
|||||
|