Best Compliance Software in Germany - Page 68

Compare the Top Compliance Software in Germany as of April 2026 - Page 68

  • 1
    Tumult Analytics

    Tumult Analytics

    Tumult Analytics

    Built and maintained by a team of differential privacy experts, and running in production at institutions like the U.S. Census Bureau. Runs on Spark and effortlessly supports input tables containing billions of rows. Supports a large and ever-growing list of aggregation functions, data transformation operators, and privacy definitions. Perform public and private joins, filters, or user-defined functions on your data. Compute counts, sums, quantiles, and more under multiple privacy models. Differential privacy is made easy, thanks to our simple tutorials and extensive documentation. Tumult Analytics is built on our sophisticated privacy foundation, Tumult Core, which mediates access to sensitive data and means that every program and application comes with an embedded proof of privacy. Built by composing small, easy-to-review components. Provably safe stability tracking and floating-point primitives. Uses a generic framework based on peer-reviewed research.
  • 2
    NMTY Enterprise
    NMTY Enterprise helps you protect all your privacy-sensitive data within your organization, regardless if it is stored in databases or files. Make NMTY Enterprise part of your IT environment and immediately anonymize all data sources that need to be protected. NMTY Enterprise makes it possible to anonymize data regardless of how it is stored, from databases to individual files. Anonymize data stored in a database or in separate files such as CSV and XML. Data is always anonymized directly within the source. This prevents non-anonymized data from being duplicated unnecessarily. Connections to your data sources support integrated authentication and are always encrypted when stored. In addition to anonymizing datasets, it is also possible to directly anonymize data processed within documents and images. Our solutions are developed based on the latest innovations and integrate directly into your existing processes. This way we ensure we always achieve the maximum result.
  • 3
    PK Protect
    PK Protect is a data protection platform designed to help organizations safeguard sensitive information across diverse environments. It provides robust tools for data discovery, classification, encryption, and monitoring, ensuring that critical data is protected both at rest and in transit. With automated policies and compliance controls, PK Protect enables businesses to meet regulatory requirements like GDPR and HIPAA while minimizing the risk of data breaches. The platform integrates with various systems to provide a unified approach to managing data security across cloud, on-premises, and hybrid environments. By offering real-time visibility and proactive threat detection, PK Protect helps organizations maintain control over their sensitive data and reduce security vulnerabilities.
  • 4
    Anonomatic

    Anonomatic

    Anonomatic

    Safely store, anonymize, mask, mine, redact, and share sensitive data with 100% data accuracy and full international data privacy compliance. Reap significant time and cost savings, with no loss of functionality, when you separate PII from identified data. Embed PII Vault to create innovative solutions, reduce time to market, and deliver the most PII secure solutions anywhere. Unlock data to deliver more accurate and targeted messaging. Provide one, simple step to anonymize all data before it reaches your platform. Combine disparate, anonymous data sets at the individual level without ever receiving PII once that data has been anonymized with Poly- Anonymization™. Replace PII with a compliant multi-value, non-identifying key used in anonymous data matching to link data from multiple organizations.
  • 5
    Kodex

    Kodex

    Kodex

    Privacy engineering is an emerging field that has intersections with data engineering, information security, software development, and privacy law. Its goal is to ensure that personal data is stored and processed in a legally compliant way that respects and protects the privacy of the individuals this data belongs in the best possible way. Security engineering is on one hand a requirement for privacy engineering but also an independent discipline that aims to guarantee the secure processing and storage of sensitive data in general. If your organization processes data that is either sensitive or personal (or both), you need privacy & security engineering. This is especially true if you do your own data engineering or data science.
  • 6
    Accord

    Accord

    Accord

    Measuring the numerous periods that determine eligibility requires focused resources on ACA fundamentals. Multi-source data assembled on the best ACA platform in the industry means your 1094-C & 1095-C are accurate. Prevents incorrect forms from being issued to employees by instantly examining code combinations. Accord has created and continues to evolve a first-class platform for employers and licensees to manage the complexities of ACA reporting. View your dashboard where ongoing eligibility and affordability data associated with multiple measurements, stability, and wait periods are displayed. Generate all necessary ACA reporting and filing from our easy-to-use interface, no software to load and all upgrades come online seamlessly. Be prepared for IRS inquiries by maintaining diligent internal audit management. With easy access to historical data and your Accord team, audits are quickly performed when needed.
  • 7
    eCompliance

    eCompliance

    eCompliance Software

    Compliance is a necessary factor that protects a company from policy violations which can cost considerable reputational damage and high financial penalties to the organization. Statutory compliance management facilitates the management of the various compliance documents & renewal of the respective documents with notification, in a user-friendly manner. The notification about compliance, alerts and reminders will be sent through SMS and Email to the responsible users and to the relevant persons (escalation persons and other users) for compliance. E-compliance software application allows organizations to standardize compliance processes to avoid the risk of non-compliance. It enables users to schedule recurring compliances in a single unified web-based /cloud-enabled platform for easy execution. With this digital platform, businesses can easily handle multiple regulatory compliances, configure the prerequisites for effective regulatory compliance management
  • 8
    Valid8

    Valid8

    Valid8

    Now you only need a few hours to transform years of statements, checks, deposit slips and accounting system transactions into courtroom-ready evidence. Valid8 is the only cloud-based Verified Financial Intelligence (VFI) platform designed by forensic accountants who leverage advanced AI. Purpose-built to help teams trace the flow of funds quickly and accurately, Valid8 gets you to analyze in less time and with more confidence. Upload bank statements, check and deposit slip images, accounting system extracts, and transaction lists to Valid8 and get fully verified financial evidence within hours. See why Valid8’s (VFI) platform is exponentially faster than OCR solutions that require manual cleanup. Valid8’s VFI platform leverages AI and machine learning to automatically extract transactions from any statement or system. No more frustrations and delays: upload PDFs and get clean, reconciled data in hours.
  • 9
    Trade iQ

    Trade iQ

    AKS iQ

    Unified transaction view: Eliminates silos and improves collaboration across the organization. AI-powered risk insights: Provides robust indicators for informed decisions around every transaction. Compliance with regulations: Helps banks stay ahead of trade-based money laundering and terrorist financing (TBML/TF) regulations. Key Features: Modules: PRICE iQ (price due diligence), DUG iQ (dual-use goods check), Screen iQ (HSCode & PEP screening), SCAN iQ (sanctions & PEP screening), Vessel iQ (vessel & container tracking), Bank iQ (bank risk profile). Real-time transaction monitoring: Transact iQ uses AI to identify and report suspicious activity in trade transactions. 80+ red flag scenarios: Covers a wide range of potential ML/TF risks. Comprehensive reporting and audit trail: Provides visibility and accountability for all transactions.
  • 10
    Phalanx GRC
    Are you looking for a way to tie compliance activities to risk reduction, cost containment, and revenue growth? Phalanx GRC allows you to manage and report how your compliance programs do all three. Compliance experts have built our GRC tool for the needs of compliance executives. Reduce the burden of audits by using one tool for all your compliance programs. Phalanx provides mapping to multiple frameworks with have helped businesses reduce audit time by 30%. Phalanx GRC helps security leaders reduce risk by giving them the ability to manage their risk and security programs in one centralized location. Close more deals and build trust with your potential clients with confidence with a compliance program built with Phalanx.
  • 11
    Diligent ACL Analytics
    Your audit team is ready to work smarter. Powered by purpose-built analytics and time-saving automation, ACL Analytics is a comprehensive governance solution ready to enhance any company workflow. Enjoy a suite of functions designed to help your audit team work smarter. Leverage pre-designed test and data connectors that sync with commonly used assurance programs. Use software that’s integrated with your assurance program to deliver results clearly and in full detail. Communicate through sophisticated tools like embedded dashboards. Tap into the collective expertise of the thousands of assurance practitioners and dozens of expert Diligent consultants that make up the ACL Analytics community. Ensuring your data is protected is critical to Diligent, we offer clarity & control for the agile enterprise. Level up your audit function with better, more accessible data.
  • 12
    Diligent Risk Intelligence Data
    Automated real-time monitoring and search tool for negative news, watchlist, sanction, and politically exposed person data. Protect your institution from reputational, AML, and financial crime risks. Diligent’s patented search and monitoring capability offers real-time, accurate negative news and risk information using machine learning and relevancy score calculation. Screen against 1400+ watchlists, sanctions, and embargo lists in real-time with our comprehensive screening capability. Utilize automated monitoring for sanctions, watchlists, and state-owned entities. Map beneficial ownership and detect risks during crises for customers and vendors. We are committed to providing a robust and secure service that protects all our customers’ data. Diligent’s Security Program is governed based on the NIST Cybersecurity Framework and Diligent follows ISO/IEC 27001 standards to keep information assets secure by implementing an Information Security Management System (ISMS).
  • 13
    Diligent Market Intelligence
    During times of heightened scrutiny, Diligent Market Intelligence equips companies with the necessary information to proactively manage shareholder pressures, mitigate governance risks, and maintain a competitive edge in the market. Establish stronger corporate governance practices by benchmarking it against best-in-class standards. Prepare engagement strategy with access to complete voting records, proxy recs, and policies of investors globally. Detect activists, track campaign developments and identify areas of vulnerability to better manage activist scenarios. Understand perspectives on ESG using stats on shareholder proposals and science-based ESG scores. Comprehensive view of corporate governance and shareholder engagement behavior. Diligent’s market intelligence solution offers leading data and analytics across corporate governance, shareholder activism, and ESG to help organizations gain clarity on broader corporate governance topics and better inform their strategy.
  • 14
    Diligent Policy Manager
    Take control of your policy program and adapt to changing regulations. Work with the confidence of knowing your policies are always up to date. Itemize and track key policies with a 100% configurable revision and approval workflow engine. Keep documents prepared for audits and provide a seamless, transparent process. Send automated policy updates to target audiences, test policy comprehension and receive attestation that policies are universally understood. Manage your user capabilities efficiently and ensure the right people have access to the right information at the right time. Streamline communications and effectively convey policies, along with other important information. Keep data reportable and readily available via interactive, digestible visualizations. Unlock real-time insights and capitalize on the flexibility of customizable reports. We are committed to providing a robust and secure service that protects all our customers’ data.
  • 15
    Diligent Compliance & Ethics Training
    Diligent’s library of science-backed microlearning content grabs employee attention and ensures that key information sticks. Draw from a library of over 4,000 pieces of multimedia content in 60+ languages that educate and entertain. Each piece is backed by powerful behavior-change science. Leverage articles, blogs, case studies, brochure templates, illustrations, and many more to amplify your compliance program in your brand. From ESG and anti-bribery to annual code of conduct training, our library keeps employees in the know.
  • 16
    WebKyte

    WebKyte

    WebKyte

    Moderate user-generated videos and live streams at scale by detecting copyrighted, criminal, and duplicated content. Protect your library by scanning the largest video platforms for unauthorized copies Automatic Content Recognition (ACR) is an advanced technology that uses algorithms to analyze and identify criminal and copyrighted videos among user-generated content. Each upload on your platform is checked against the reference database of criminal or copyrighted content. If the upload matches the content in the reference database, you get notified about the match. Get visibility over what is available on your platform in real-time. ContentCore, WebKyte’s ACR solution, empowers platforms to rapidly spot unauthorized copyrighted video content and prevent legal charges for breaching Article 17.
  • 17
    Fairly

    Fairly

    Fairly

    AI and non-AI models need risk management and oversight. Fairly provides a continuous monitoring system for advanced model governance and oversight. With Fairly, risk and compliance teams can collaborate with data science and cyber security teams easily to ensure models are reliable and secure. Fairly makes it easy to stay up-to-date with policies and regulations for procurement, validation and audit of non-AI, predictive AI and generative AI models. Fairly simplifies the model validation and auditing process with direct access to the ground truth in a controlled environment for in-house and third-party models, without adding overhead to development and IT teams. Fairly's platform ensures compliant, secure, and ethical models. Fairly helps teams identify, assess, monitor, report and mitigate compliance, operational and model risks according to internal policies and external regulations.
  • 18
    LightBeam.ai

    LightBeam.ai

    LightBeam.ai

    Discover within minutes if sensitive information lurks in places you never expected (screenshots, logs, tickets, messages, tables). With one click, LightBeam can easily generate executive or delta reports to gain valuable insights into your sensitive data. Automate DSRs leveraging LightBeam's unique PII/PHI graphs comprehensively created from your data infrastructure. Build trust with your users by empowering them to exercise control over their data collection. Continuously monitor how sensitive data is collected, used, shared, and maintained with appropriate safeguards within your organization.
  • 19
    Telivy

    Telivy

    Telivy

    Experience the industry's most comprehensive and versatile audit tool, deployable seamlessly with a single script. Keep your networks, devices and data safe and secure by discovering any potential entry points for cyber attacks - from both inside and outside your organization. Protect your data from attacks that can encrypt, modify, corrupt or destroy data, such as ransomware. Ensure data is available to anyone in the organization who has access to it. Audit and configure proper access to all corporate assets on-premises and cloud. Enforce policies around user authentication, validation & privileges, and address issues regarding privilege creep. Test resilience to email phishing and application password detection attempts to gain access to restricted areas and exfiltrate confidential data.
  • 20
    eramba

    eramba

    eramba

    The real fuel that keeps eramba running and improving is its global community of users that leverage our simple and open code, documentation, forum, release planning, and business model. The experience of running for over a decade our community software helped us build our enterprise software that includes unlimited email support, additional features, and regular updates. Our ridiculously simple business model and affordable pricing is exclusively aimed at financing this project. Our community-driven repository of GRC templates is open and free for everyone no matter if you use eramba or not. Paying for templates is ridiculous if you consider the amount of brainpower the GRC community has. Compliance, internal controls, policies, mappings, questionnaires, etc.
  • 21
    360inControl
    Cybersecurity is essential for your company to protect your sensitive data, operations, and reputation from ever-evolving cyber threats and attacks. With 360inControl®, you can define and implement suitable measures for protection. Certifications strengthen a company’s credibility, efficiency, and ability to meet industry standards and gain customers’ trust. 360inControl® supports you in efficiently performing certifications in a time- and money-wise manageable way. Considering the ever-increasing complexity of regulatory requirements. Using 360inControl®, your organization ensures minimizing risks and maintaining effective governance. Centrally managed control library. Individually customizable and expandable. Pre-defined use cases for the identification of applicable controls.
  • 22
    Aegify RSC Suite
    For management ease and cost reduction, most healthcare providers and business associates prefer a unified risk, security and compliance solution. Today, the Aegify suite is a unique unified solution that operates at the intersection of security, compliance and risk management for healthcare, retail and financial organizations. For those that don’t need a unified RSC solution, each individual Aegify Manager product is a robust standalone solution. The market needs a holistic RSC solution that diagnoses, cures and prevents future catastrophic events from occurring.
  • 23
    Apomatix

    Apomatix

    Apomatix

    We have over ninety years of risk management and information security experience, and our products are designed to meet the unique challenges risk professionals face. Streamline and optimize your risk management activities. Identify, analyze, evaluate, and treat all your risks in one solution. Upgrade your information asset management. Record, assign, and manage your information assets in one central location. Simplify your internal control management process. Track implementation status and run control effectiveness tests for frameworks including ISO 27001 & CIS 20. We also have tools to automate the reporting process, saving you from having to manually build these in your spreadsheet. Together, these features help save time, reduce the burden of managing your risk register, and improve the quality of your risk assessments.
    Starting Price: $12.62 per user per month
  • 24
    CIMCON EUC Change Management
    The use of spreadsheets, models, Access databases, and other End User Computing (EUC) applications is increasing. Even if validated after development, further changes to EUCs are prone to errors and expose your firm to significant risk. EUC Insight Change Management continuously monitors high-risk EUCs to alert them on critical changes and implements flexible controls that reduce risk. Perform file comparisons and view changes side by side for spreadsheets, macrocode, and access databases. The smart audit trail can focus on specific areas or cells to spot trends or identify specific types of changes that have a high probability of error. EUC policies often require specific controls. EUCI Change Management provides automated versioning, security, and documentation, with reporting so that you can customize your procedures.
  • 25
    Pellonium

    Pellonium

    Pellonium

    Continuous cyber risk quantification, evaluation & business impact analysis based on what's actually happening in your organization. Prioritized tactics tailored to your environment & thresholds to reduce cyber risk exposure & increase security ROI. Automated compliance & controls management that leverage adaptable frameworks to significantly improve regulatory & internal oversight obligations. Shift from simply identifying what's wrong to why it actually matters & have data-driven confidence to ruthlessly protect investments & strategic goals. provides meaningful, actionable, and defensible insights to help security teams & executives answer the most urgent questions.
  • 26
    CyberGuard360

    CyberGuard360

    CyberGuard360

    At CyberGuard360TM we believe that the best defense is a good offense. That’s why we’ve built the next-generation breach prevention platforms just for MSPs to make certain everyone is trained to spot a cyber-attack, forming an offensive line of prevention that stops an attack before it strikes. Unlimited, comprehensive security awareness training is included with your MSP subscription to give to all of your clients. Training is a self-paced, web-based course, and includes weekly refreshers to keep employees cyber-aware. Our team of CISOs has created a NIST-based online risk assessment that meets regulatory requirements. We’ve automated the work plan generation for instant access to the work plan required to close the gaps identified, and we include revenue-generating recommendations for you to offer to your clients.
  • 27
    Metadium

    Metadium

    Metadium

    Metadium powers identification, authentication and crypto transaction management, providing AML compliance and risk management solutions. Our technology is compatible with EVM and provides standard API/SDK, making the integration process fast and convenient. Metadium provides high security features appropriate for corporate compliance like setting node permissions and data encryption for privacy protection. As blockchain technology continues to be accepted and integrated into multiple industries, the need for compliance grows. Metadium’s second generation uses its advanced technology and experience to provide a new ecosystem of compliant services and solutions that serve as the bridge to blockchain’s true potential. Our evergrowing ecosystem includes identity and data protection, innovative metaverse platforms, and highly secure payment and asset management services.
  • 28
    risk3sixty

    risk3sixty

    risk3sixty

    Work with us to assess your program with a seamlessly integrated audit. ​ Get help building framework-based programs for SOC, ISO, PCI DSS & more. Outsource your compliance program and focus more of your time on strategy. We bring the right technology, people, and experience to eliminate security compliance pains. Risk3sixty is ISO 27001, ISO 27701, and ISO 22301 certified. The same methods we employ with our clients allowed us to become the first consulting firm to obtain all three certifications. With over 1,000 engagements under our belt, we know how to audit, implement, and manage compliance programs. Visit our comprehensive library of security, privacy, and compliance resources to help you level up your GRC program. We help companies with multiple compliance requirements certify, implement, and manage their program at scale. We help staff and manage the right-sized team so you don’t have to​.
  • 29
    TrackMy

    TrackMy

    TrackMy

    TrackMy Verivax provides vaccine verification for your employee and non-employees with an easy-to-use online portal. Staff can log in, verify key demographic information and have their vaccine history verified within minutes. Organizations can then easily manage compliance and reduce administrative burden for pre-hiring and employee health. TrackMy Vaccines streamlines one on one and event style vaccinations events. Ensure your staff have an exceptional experience, organizations have an ability to offer online scheduling and the ability to electronically capture consents and signature. Most importantly ensure you’re in compliance with TrackMy bi-directional state immunization registry integrations, eliminating manual and duplicate data entry.
  • 30
    showd.me

    showd.me

    showd.me

    From initial set-up to certificate delivery, your dedicated account manager will handle it all to ensure an experience for your employees that reflects regulatory requirements and the custom needs of your organization. Take onboarding & training out of the classroom and into the hands of your employees with a mobile-optimized online training platform that offers engaging content and multilingual user support with no apps to download. Ensure staff stay on track. Our team proactively monitors completions and notifies employees of new training and tasks or upcoming deadlines to achieve completion rates of up to 100%. Drive high-quality care and ensure compliance with state and federal requirements with online, on-demand in-service training your employees can complete anytime, anywhere from any desktop, tablet, or smartphone.
MongoDB Logo MongoDB