|
|
Related Products
-
Source Defense
Source Defense is a mission critical element of web security designed to protect data at the point of input. The Source Defense Platform provides a simple and effective solution for data security and data privacy compliance – addressing threats and risks originating from the increased use of JavaScript, third-party vendors, and open-source code in your web properties. The Platform provides options for securing your own code, as well as addressing a ubiquitous gap in the management of third-party digital supply chain risk – controlling the actions of the third-party, fourth and nth party JavaScript that powers your site experience.
The Source Defense Platform protects against all forms of client-side security incidents – keylogging, formjacking, digital skimming, Magecart, etc. – by extending web security beyond the server to the client-side (the browser).
-
Resolver
Resolver gathers all risk data and analyzes it in context — revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks — whether compliance or audit, incidents or threats — and translates those effects into quantifiable business metrics. Finally, risk becomes a key driver of opportunity instead of being disconnected from the business.
Choose the risk intelligence software used by over 1000 of the world’s largest organizations. Resolver makes it easy to collaborate and collect data from across the enterprise, allowing teams to fully understand their risk landscape and control effectiveness. Understanding your data is one thing; being able to use it to drive vital action. Resolver automates workflows and reporting to ensure risk intelligence turns into risk reduction.
Welcome to the new world of Risk Intelligence.
-
ConnectWise Cybersecurity Management
Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
-
Acuity PPM
Acuity PPM provides Senior Leaders and Project Management Teams (PMO's) with easy-to-use portfolio management software to manage the project portfolio. Acuity PPM provides a Work Intake module to support demand management and helps you create and evaluate new project requests through prioritization, financial planning and resource management (capacity planning).
Once a request is approved, project teams can track project progress with centralized status reports, track key milestones, risks, issues, financial plans, decisions, lessons learned, project and portfolio roadmaps, and resource plans in Acuity PPM. This helps leadership teams select the right projects for the organization.
Connect to common Project Management tools such as Jira, Smartsheet, Asana, Wrike, Monday.com, and others.
Our implementations are measured in days, not weeks or months like many vendors. Get started quickly and give leadership the single source of truth they need to accomplish strategic goals.
-
Sign In Solutions
Sign In Solutions is the next generation of Visitor Management platform, offering transformative solutions to manage visitors, ensure compliance, mitigate risks, and optimize workplace operations.
Our visitor management system streamlines registration, check-in, and authorization processes, while our facility management tools streamline room booking, resource allocation, and asset management. We prioritize security with our advanced risk mitigation measures, including health and safety protocols, emergency messaging, and robust analytics for thorough auditing.
Sign In Solutions aims to deliver organizations a smooth visitor experience, heightened operational efficiency, and enhanced safety and security measures for the enterprise business.
-
GlitchSecure
Continuous Security Testing for SaaS Companies - Built by Hackers
Automatically assess your security posture with continuous vulnerability assessments and on-demand pentests. Hackers don't stop testing, and neither should you.
We use a hybrid approach that combines testing methodologies built by expert hackers, a real-time reporting dashboard, and continuous delivery of high-quality results. We improve the traditional pentesting lifecycle by continually providing expert advice, remediation verification, and automated security testing throughout the entire year.
Our dedicated team of experts works with you to properly scope and review your applications, APIs, and networks to ensure in-depth testing coverage all year.
Let us help you sleep better at night.
-
Camms GRC
Enabling your GRC success through Camms powerful, agile and scalable software.
Effective Governance, Risk and Compliance (GRC) management demands software capabilities to facilitate the sharing of data and insights across your wider risk landscape to drive agility and decision making – That’s where we come in!
We understand that every business will have different pain points, be at varying stages of maturity and have different objectives. We deliver solutions for those struggling with spreadsheets or at an Enterprise level, and all in between.
Our experience, coupled with our comprehensive, flexible cloud-based offering, allows you to focus on your immediate needs, deliver, and scale as you grow.
-
Safetica
Safetica is an integrated Data Loss Prevention (DLP) and Insider Risk Management (IRM) solution, which helps companies to identify, classify, and protect sensitive data as well as detect, analyze, and mitigate risks posed by insiders within an organization.
Safetica covers the following data security solutions:
✅ Data Classification: Safetica offers complete data visibility across endpoints, networks, and cloud environments.
✅ Data Loss Prevention: With Safetica, you can protect sensitive business- or customer-related data, source codes, or blueprints from accidental or intentional exposure through instant notifications and policy enforcement.
✅ Insider Risk Management: With Safetica, you can analyze insider risks, detect threats, and mitigate them swiftly.
✅ Cloud Data Protection: Safetica can monitor and classify files directly during user operations.
✅ Regulatory compliance: GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO/IEC 27001, SOC2 or CCPA.
-
Predict360
Predict360 is an integrated risk and compliance management software platform for financial and insurance organizations. It integrates risk and compliance processes and industry best practices content into a single platform that streamlines regulatory compliance, improves efficiency, predicts risk, and provides best-in-class business intelligence reporting.
Predict360 includes the following Risk Management applications: Enterprise Risk Management (ERM), Risk Management and Assessments, Risk Insights, Issues Management, Peer Insights, Third-Party Risk Management, and Quarterly Certifications and Attestations. Compliance applications are: Compliance Management, Compliance Monitoring & Testing, Complaints Management, Regulatory Change Management, Regulatory Examination and Findings Management, Policy & Procedure Management, and more.
360factors also offers Lumify360 - a KPI and KRI predictive analytics platform that enriches data, predicts performance, and works alongside any GRC.
-
Onspring
Onspring is an award-winning GRC automation and reporting software. Our SaaS platform is known for flexibility and ease of use for end-users and administrators.
Simple, no-code, drag-and-drop functionality makes it easy to create new applications, workflows, and reports independently without IT or developers.
- Manage a centralized risk register with multiple hierarchies
- Keep tabs on financial impacts & probabilities based on risk tolerance
- Capture & relate financial, operational, reputational & third-party risks
- Map controls to regulations, frameworks, incidents & risks
- Remediate findings through workflows or the POA&M process
Ready-made products get you started in as quickly as 30 days:
- Governance, Risk & Compliance Suite
- Risk Management
- Third-party Risk
- Controls & Compliance
- Audit & Assurance
- Policy Lifecycles
- CMMC
- BC/DR
FedRAMP moderate environment available.
|
|