Best Compliance Software - Page 89

Compare the Top Compliance Software as of May 2026 - Page 89

  • 1
    PrivacyPioneer

    PrivacyPioneer

    PrivacyPioneer

    Cover cap found from the data to delete the data life cycle of personal information protection systems, integrated automation, intelligence, visualization processing power, on the basis of the legal compliance, high efficiency and low cost to help business customers manage personal information, data Value innovation. Automatic personal data discovery, support structured and unstructured data, compatible with various mainstream databases. Construct a visual data map to visually display data attribution, relationship, processing history, etc. Manage the rights requests of data subjects and realize the automatic matching and response of personal information. Manage personal data processing behaviors and permissions, and ensure compliance with all access, processing behaviors, and access permissions. Intelligent privacy impact assessment and data protection impact assessment, combined with periodic automatic internal audits, minimize compliance risks.
  • 2
    Responsum

    Responsum

    Responsum

    Simplify and automate your Privacy compliance challenges with an all-in-one Privacy Management software. Minimize risks for your organization and turn Privacy into a competitive advantage. Privacy management is an essential, everyday duty of privacy teams. However, privacy professionals are often under tremendous pressure to ensure compliance in their organization, while often their teams are understaffed or do not have the right tools to support their work. Get the support you need through RESPONSUM’s Privacy modules. From keeping records of your processing activities to performing TIA or LIA, and executing DPIAs, you can gather all the information you need in one place and access it at any time you need it. No matter the sector your business is operating in, you need to adopt a security strategy to be aware of the operations that need a specific level of security. With the Security module, you can define and manage security controls, manage external vendors and stakeholders.
  • 3
    RIVN

    RIVN

    RIVN

    Privacy Manager provides your customers with an easily accessible page to manage all of their privacy preferences. Customers are pleasantly surprised when they see they can manage their consent and email preferences in one place. This shows your customers you care about their privacy. Few SasS based companies even offer the ability to delete consumer records on demand. Not only does RIVN Delete deliver the deletion request, but it also provides verification of the deletion process. This unique capability of RIVN Delete is a big motivator for companies to select RIVN Delete for consumer deletion requests. RIVN Scan is a cutting-edge technology that will prove identified vulnerabilities on your website or internal systems. RIVN Scan saves your data teams hundreds of man-hours. RIVN provides the most advanced, accurate, and vulnerability scanning technology available. We lead in providing the highest web vulnerability detection rate.
  • 4
    Cyber360

    Cyber360

    CENTRL

    Streamline cybersecurity assessments and transform your practice to serve more clients with a best-in-class cloud platform. Identify, analyze, and mitigate cybersecurity risks with full transparency and control. Comprehensive out-of-the-box yet highly configurable workflows and controls framework provide flexibility while driving efficiencies. Design a repeatable cybersecurity assessment process that maps to your organization needs. Gain visibility if your organization’s risk profile across business units, third parties, regions. Collect and store all assessments, documents, policies, issues in a centralized repository. Proactively manage exceptions through analytics, alerts and collaboration. Start with pre-built and pre-seeded industry assessment templates, or upload your own standard practice questionnaire. Multiple modes for assessments to suit business needs, self assessments, onsite assessments, and more.
  • 5
    Soveren

    Soveren

    Soveren

    We help IT and engineering teams eliminate the time lost on managing personal data across your entire tech stack. We’ve built secure integrations to popular applications and databases to automate personal data management across your entire IT stack. Our privacy platform evolves with regulations, so you can focus on your core product’s functionality and a scalable IT infrastructure. Soveren puts you one step ahead by allowing you to automate privacy compliance before it becomes an uncontrollable risk and time sink. We offer you a compliant storage and processing location. All data — including backups — resides within the EU. Appropriate controls are implemented to ensure that client data is treated with care and reasonable safeguards in a secure environment which prevents any kind of unauthorized access.
  • 6
    Systnaps

    Systnaps

    Systnaps

    The regulatory context of data security is constantly evolving, it is essential to implement a flexible and responsive solution within its IS to meet the complex requirements related to regulations and laws. Classify and categorize regulatory data. Inventory your data and manage retention periods. Respond quickly to requests from your data subjects. Manage hold times and business requirements for all of your master processes through a single application. Management of rules related to retention periods. Regulatory compliance of an Information System (retention period). Classify and calculate the level of data vulnerability. Model your service-oriented objects in order to inventory your IS assets.
  • 7
    Oyster IMS

    Oyster IMS

    Oyster IMS

    A new breed of Privacy Management software that allows you to operationalise a whole compliance programme including data, processes and activity. For example, data protection management tools will provide a central, shared repository for data maps and records of processing whilst allowing full and ongoing risk assessment. This can sit alongside fully audited consent management and vendor compliance assessments all controlled from a central dashboard.
  • 8
    CNIL PIA Software
    The tool is mainly addressed to data controllers who are slightly familiar with the PIA process. In this regard, a stand-alone version can be downloaded and easily launched on your computer. It is also possible to use the tool on an organisation’s servers in order to integrate it with other tools and systems already used in-house. A didactic interface to carry out PIAs: the tool relies on a user-friendly interface to allow for a simple management of your PIAs. It clearly unfolds the privacy impact assessment methodology step by step. Several visualisation tools offer ways to quickly understand the risks. A legal and technical knowledge base: the tool includes the legal points ensuring the lawfulness of processing and the rights of the data subjects. It also has a contextual knowledge base, available along all the steps of the PIA, adapting the contents displayed.
  • 9
    Draftit Privacy

    Draftit Privacy

    Draftit Privacy

    For many organisations, GDPR compliance is outside their realm of expertise – but this is where we excel. So we worked with a team of lawyers and privacy experts to develop a web-based software suite that will guide you through the process, improve your privacy procedures and help your organisation achieve compliance. Think of us as your guide through the data protection jungle. Privacy and GDPR compliance is only one out of five legal branches at Draftit. Understand the rules without being an expert. Privacy Expert is a digital guide that explains GDPR more straightforwardly. There are also aids such as document templates, explanations of essential concepts, and a bank of questions with answers to lots of data protection questions. Make risk analysis and impact assessment easy. Privacy DPIA is a valuable tool for identifying, analyzing, following up, and managing risks.
  • 10
    Sentinel Ethos

    Sentinel Ethos

    Sentinel Ethos

    Drive comprehensive privacy strategy from the top down in your organization to address the challenges of GDPR, CCPA, CPRA, and oncoming regulation across your business. Our team can bring C-level experts to connect your privacy program to broader organizational goals with our culture of PrivacyTM services. Deploy our comprehensive, proven model for successful privacy programs and compliance success. Bringing a combination of tools and people to bear, we will help your company build a top-to-bottom privacy organization or take an existing program and supercharge it to success. Privacy laws and customer expectations demand companies are thoughtful about their collection and usage of personal information. Continued compliance with modern privacy laws requires complex technical solutions.
  • 11
    Corethix

    Corethix

    Core Integrity

    Corethix is your go-to compliance program for effective risk management. Managing governance and risk within your organization is an important task and yet across the globe most organizations are still relying on outdated and disconnected systems and processes for achieving optimal compliance. Corethix was designed to solve this problem by harmonizing your key activities into one easy to use and secure platform. Our leading platform makes the job of managing all of this easy, all through a consolidated software platform for effective risk management consulting. Our solution is ideal for compliance teams whilst providing boards, directors and executives with comfort that their organization is focused on dealing with issues proactively. Our platform provides a centralized and holistic view of your organization with real-time data and insights, brought to life with our innovative Integrity Risk Index™.
  • 12
    CRS Certus

    CRS Certus

    CRS Certus

    Your information is securely held, communications are safely encrypted. Our fully encrypted backups occur often and regularly. Flexible and secure user password security. Fast interfaces, user experience and reporting through the latest database design and web technology. User management tools aide efficient processes. Uncluttered user interfaces, multiple browser tab access, effortless data links. Our user-friendly and easy to learn user interface means no steep learning curve. Logical data entry flow with what you expect where you expect. You select the modules you use and customize to your needs. You control your reports' content, you tailor your installation to suit your businesses needs. One stop for all of your risk and compliance office needs. View completed and incomplete controls. Retain all your controls and records in the one accessable data base. We support the global standards on Risk Management (ISO 31000) and Compliance (ISO 19600).
  • 13
    CUBE RegPlatform
    CUBE RegPlatform is our trusted, world-beating SaaS platform, providing the world’s most comprehensive source of classified, meaningful regulatory intelligence for large global financial organizations. Our RegPlatform product combines industry leading technology with expert validated insights to present a future proof, constantly up-to-date service that simplifies the complexities of multi-jurisdictional regulatory compliance. RegPlatform comprises a series of bespoke modules, allowing you to tailor our product to suit your global business and compliance needs. If you’re a large financial organization looking to streamline regulatory compliance on a global scale, then RegPlatform is the trusted partner for your compliance team. Our philosophy is founded on the Three R’s: to deliver real-time, relevant regulatory intelligence that mitigates compliance risk. We do this by leveraging leading techniques in artificial intelligence, from machine learning to natural language processing.
  • 14
    DataKlas GDPR
    DataKlas GDPR is the first complete package of tools to help companies comply with the EU regulation. The most stringent regulation ever introduced by the EU. Mandatory for any organization in the EU. Assumes the need to manage a GDPR Register. Available immediately, xentralized and easy to manage, applicable in any field of activity. Multi-user functionality and alert in case of error identification. Are you a DPO, a GDPR consultant, IT security solutions specialist? Join our DataKlas GDPR Certified Partners! The DataKlas GDPR Platform is based on concrete legislative elements and is a practical synthesis of tens of pages of the Regulation, structured in nomenclatures and registers that ease your consultant activity. DataKlas GDPR is a truly complete package of tools that help companies align with the provisions of the EU Personal Data Protection Regulation (2016/679).
  • 15
    CompliancePoint OnePoint
    CompliancePoint's OnePoint™ technology solution helps organizations practically and powerfully operationalize critical privacy, security and compliance activities within one simple interface. Use OnePoint™ to improve visibility and manage risk while reducing the cost, time and effort required to prepare for audits. Today, most organizations are required to follow at least one, but more often many, regulations. In addition to legal requirements, many organizations also juggle responsibilities related to industry standards or best practices. This can be daunting and time consuming. OnePoint™ enables organizations to implement a unified approach to complying with numerous standards and programs such as HIPAA, PCI, SSAE 16, FISMA, NIST, ISO, cyber security framework, GDPR, and more. Do you struggle to achieve critical privacy, security and compliance tasks on an ongoing basis? OnePoint™ provides organizations with the right tools and support that go beyond a "point in time" evaluation.
  • 16
    CompLions

    CompLions

    CompLions

    Save time and get a grip on your Risk & Compliance processes with 1 handy tool for every organization, regardless of industry or size. With our governance functionality you demonstrate that you handle your internal information security management with care and that you guarantee confidentiality, integrity and availability as laid down in ISO27001, NEN, NIST and BIO. With our tool you can monitor your GRC related problems. This way a lot of problems can be prevented and your company experiences control over the most important processes, the possible risks and consequences thereof. We make the handling of assessments from the management system and the selection of measures to control the risks clear and efficient. This gives you control and saves you time. You save time through smart deduplication of compliance, stricter quality requirements, standards, laws and regulations. Process assurance with the burden of proof towards your stakeholders.
  • 17
    InnoSec STORM
    In a world of massive potential cyber threats and attacks, there is no time or privilege to stand still! InnoSec’s enterprise offering is the most robust cyber risk product on the market. We address all aspects of cyber risk management by quantifying cyber risk and automating all cybersecurity activities. Our STORM application will be tailor-made to your organization workflow and provide each audience member of the organization with the information they need to act on, including the board and CEO, business owner, CISO, data privacy officer, chief risk officer, compliance manager and etc. STORM enterprise cyber risk management is an integrated product that utilizes organizational risk and workflow engines combine with audience-focused dashboards. It combines risk management, vulnerability management, compliance management, auditing, projects and tasks into a single platform. Our analytics can demonstrate risk across the organization, business units, process, system, and devices.
  • 18
    CipherTrace

    CipherTrace

    CipherTrace

    CipherTrace delivers cryptocurrency AML compliance solutions for some of the largest banks, exchanges, and other financial institutions in the world because of its best-in-class data attribution, analytics, proprietary clustering algorithms, and coverage of 2,000+ cryptocurrency entities, more than any other blockchain analytics company. Protection from money laundering risks, illicit money service businesses and virtual currency payment risks. Know your transaction automates Crypto AML compliance for virtual asset service providers. Powerful blockchain forensic tools enable investigations of criminal activity, fraud, and sanctions evasion. Visually trace the movement of funds. Monitor crypto businesses for AML compliance, evaluates KYC effectiveness and audits performance. CipherTrace’s certified examiner training provides hands-on instruction in blockchain and cryptocurrency tracing.
  • 19
    Skyflow

    Skyflow

    Skyflow

    Skyflow lets you run workflows, logic and analytics on fully encrypted data. Skyflow leverages multiple encryption and tokenization techniques for optimal security. Manage data residency, access, and policy enforcement, with auditable logs and provenance. Get to compliance in minutes, not weeks. Our trusted infrastructure and simple REST and SQL APIs make it easy. Tokenization for compliance, plus an encrypted data store so you can search, analyze, and use secure data. Run Skyflow in a virtual private cloud you choose. Use it as secure gateway, zero trust data store, and more. Replace a difficult-to-maintain patchwork of point solutions with a single cost-effective data vault. Leverage the power of your sensitive data in any workflow or application without ever decrypting the data.
  • 20
    ComplyAdvantage

    ComplyAdvantage

    ComplyAdvantage

    ComplyAdvantage offers AI-driven solutions for fraud detection and anti-money laundering (AML) risk management. Their platform helps financial institutions automate and streamline AML compliance by providing real-time risk monitoring, transaction screening, and customer due diligence. Using advanced machine learning, ComplyAdvantage reduces false positives and shortens onboarding processes while enabling businesses to detect suspicious activity before it escalates. The platform’s features include continuous monitoring of clients, automated screening against global watchlists, and detailed reporting tools to ensure compliance with regulatory requirements.
  • 21
    SymphonyAI Sensa
    SymphonyAI Sensa harnesses the most-advanced AI technology and machine learning to provide unsurpassed crime detection to financial institutions worldwide. Cost savings are easily realized by eliminating the symptoms of inferior alerting with a false positive reduction of up to 77%. The user-friendly Sensa platform builds a complete map of criminal behaviors, detecting anomalies that traditional systems are unable to see. Flexibility is a major factor in the deployment of Sensa, which can be used alone or to augment an institution’s current system. Sensa can also be deployed on premises or in the cloud to leverage the customers’ existing data set and deliver unparalleled results. Sensa customers can also experience up to an 81x risk-to-alert ratio improvement and a 263% increase in SARs. Lastly, predictive insights deliver a drastically reduced timeframe to identify genuine anomalies and achieve operational efficiencies.
  • 22
    acarda

    acarda

    acarda

    Consolidate your regulatory data and reporting with one integrated and easy-to-use Software as a Service (SaaS) solution. Reduce fragmentation of external suppliers and empower your team to work more efficiently. With the acarda platform and our managed services you can cover all common compliance reports in the EU or the UK and flexibly create your own factsheets. Our experts are on hand to implement and manage your solutions for regulatory requirements. For example:
  • 23
    Armadillo

    Armadillo

    The Armadillo Group

    Take the stress out of KYC & AML compliance with our tailored, comprehensive regulatory solutions. Full compliance assistance & management. Protect, maintain and improve your brand. Brand audit & protection, Trademark registration, oppositions & defence. UK & Worldwide company formation & administration services, cost effective legal solutions, UK accountancy & audit, company secretarial and compliance assistance. Added to this we have an extensive database of companies and so can provide documents and information from all jurisdictions globally; which is why customers choose us for their support.
  • 24
    CSS

    CSS

    Compliance Solutions Strategies

    CSS works with every firm to understand exactly where the gaps are in your global compliance program and guide you down the regulatory path from a tactical to strategic approach to compliance. Analyze existing processes to see where you have room for improvement and the roadblocks impeding your progress. Identify savings by transitioning specific compliance processes and tasks to an automated solution or managed services. Plan and implement your future compliance strategy to achieve maximum operational efficiency, scalability, risk mitigation and value creation. CSS delivers a complete end-to-end fund reporting solution that is unmatched in the market for depth and breadth of coverage, leveraging integrated data management, regulatory reporting software and document production capabilities.
  • 25
    Compliance.AI

    Compliance.AI

    Compliance.AI

    Agency activity summarized by document type. All agencies, in one place. See the violation, respondent and penalty amount, summarized by agency each week. Trending news and upcoming deadlines like comment close, effective and notice dates. Traditional GRC software products have existed for some time, but these applications were not designed to address the challenges associated with Regulatory Change Management. In fact, the required technology to support Regulatory Change Management activities did not exist at the time those applications were developed. Specifically, GRC software does not proactively monitor sources of new regulatory information, provide the ability to automatically analyze and enrich new regulatory content, or enable compliance, risk and legal teams deploy an RCM command center to monitor their compliance status.
  • 26
    Cortex Xpanse
    Cortex Xpanse continuously discovers and monitors assets across the entire internet to ensure your security operations team has no exposure blind spots. Get an outside-in view of your attack surface. Identify and attribute all internet connected assets, discover sanctioned and unsanctioned assets, monitor for changes and have a single source of truth. Prevent breaches and maintain compliance by detecting risky communications in global data flow. Reduce third-party risk by identifying exposures potentially caused by misconfigurations. Don’t inherit M&A security issues. Xpanse provides a complete, accurate and continuously updated inventory of all global internet-facing assets. This allows you to discover, evaluate and mitigate attack surface risks. You can also flag risky communications, evaluate supplier risk and assess the security of acquired companies. Catch exposures and misconfigurations before a breach.
  • 27
    Contingent

    Contingent

    Contingent

    Streamline global due-diligence by importing your existing database or seamlessly searching across millions of companies for verified and compliant ownership, financial data, certifications, and much more. Helping your team understand the risks across your entire supply chain or third-party network, whilst complying with regulations. Ease the burden with real-time and relevant alerts any time your supplier or third-party is at risk. Surface relevant data by selecting tolerance criteria, disruption events or metrics you want to monitor, and receive these alerts in a channel of your choice. Uncover efficiencies and savings with deep insights and reporting at your fingertips, making the path to digital transformation fast and cost-effective. Whilst improving compliance by following the exact process that meets your standards.
  • 28
    Coinfirm

    Coinfirm

    Coinfirm

    Since 2016 Coinfirm has been powering the mass adoption of blockchain in the new financial system. Coinfirm leads the industry in compliance for cryptocurrency, using powerful analytics across the most comprehensive blockchain database. From major protocols and exchanges to banks and governments, our industry leading blockchain analytics and AML solutions are trusted to best analyze and manage risk. Solve your crypto compliance issues, speak to the leading RegTech in Blockchain Analytics and Crypto AML/CTF. Manage counterparty risk, review & escalate cases, and create the perfect audit trail. Within seconds get an in-depth understanding with 270+ risk checks and data points ranging from financial crime to counterparty identity. Check every transaction with our standard reports and use enhanced reports in case you need to understand more. Discover and evaluate all addresses taking part in a multiple input-output blockchain transaction.
  • 29
    Conformance Works

    Conformance Works

    Conformance Works

    Every organizational structure is unique, requiring a custom tailored approach when dealing with concerns related to international standards. More often than not, this is a time intensive process. To address these needs, ISMS Solutions offers Conformance Works, a proprietary platform that walks customers through an automated system assisting customers with becoming compliant with whatever ISO standard they need. Simply put, Conformance Works simplifies and customizes the standard certification approach for each organization. With a built in document management system, global change editor, compliance management system, and risk assessment module, company documentation becomes straight-forward and efficient. The software will be accessible via multiple digital methods. Allows faster implementation of ISO standards for certification. Provides a streamlined user experience to meeting or exceeding ISO standards.
  • 30
    FirmGuard

    FirmGuard

    FirmGuard

    Compliance is much more than avoiding business and personal fines. Its about being operationally better. Good Governance, Risk & Compliance (GRC) outperforms the market and customers' expectations. You can't do it in spreadsheets. Yet, organisations continue to manage volumes of GRC processes manually, risking inefficiency and a lack of visibility. FirmGuard's tech-enabled GRC solutions offer a faster, more accurate and cost effective way to achieve compliance. Best practice templates feel familiar and guarantee complete visibility of your GRC landscape through a single pane of glass. FirmGuard gives you access to risk management, third party risk management (TPRM) and compliance applications centrally, in award-winning technology. Non-compliance issues increasingly come from outside of your business. Controlling third party risk is critical. However, it can also be taxing on resources.
MongoDB Logo MongoDB