Best Compliance Software in New Zealand - Page 7

Compare the Top Compliance Software in New Zealand as of November 2024 - Page 7

  • 1
    WorkRamp

    WorkRamp

    WorkRamp

    WorkRamp is a modern training platform that enables companies to effectively onboard, train, and track their employees. Through self-guided activities, personalized testing, and interactive certification exercises, WorkRamp allows companies to build custom training that meets the needs of each team and department. WorkRamp is ideal for companies of with 50-500 employees who seek to reimagine employee training. Click on the free trial link above to join the ranks of Square, Intercom and Paypal. Bridge the gap between strategy and execution with WorkRamp. WorkRamp is an enterprise training and enablement software that helps companies perform at their highest levels. With WorkRamp, employees can become more productive through structured activities, shadowing, and interactive certification exercises. It offers deep integrations with existing tools like Zendesk, HRIS, Slack, and SFDC.
    Starting Price: $20.00/month
  • 2
    objectiF RPM

    objectiF RPM

    microTOOL

    Enterprise software for enhanced business agility. objectiF RPM offers features for project, portfolio, requirements, test, risk and workflow management. Visualize requirements, goals and processes with UML/SysML diagrams, manage backlogs on different levels of granularity (from business use case to user story), define workflows and patterns for recurring set-ups, plan taskmanagement with Kanban boards, run queries across multiple projects and collaborate efficiently with distributed teams on one single source of information. The software is highly customizable, integrable and extensible and can be specifically tailored to your individual corporate needs. It offers templates for agile and hybrid project management, digitization programs and projects following the Scaled Agile Framework®, SAFe.
    Starting Price: 129 €/month/concurrent user
  • 3
    CloudSploit

    CloudSploit

    CloudSploit

    Cloud security best practices as a service. CloudSploit is the leading open source security configuration monitoring tool for cloud infrastructure. Cloud security experts from around the world collaborate to create a repository of tests for cloud infrastructure such as AWS, Azure, GitHub, and Oracle Cloud.
    Starting Price: $7.17/month
  • 4
    GRC Envelop

    GRC Envelop

    Arambankudyil Consultancy

    Envelop is a risk management, audit workflow, and document management system. You can easily create and manage risks, and audits, attach work papers and create reports. Web application. Risk Management, Audits (process, objective, risk, control, test, finding and action) framework. Built-in report generator. Simple user interface and web-based! Flexible for internal control, SOX compliance, ISO 27001, PCI DSS, Internal Financial Controls, and many more. Workpapers can be attached at all levels, to an audit, process, objective, risk, control or test. Worried about reliability or budget? Use the free and open-source community version. MIT license is provided. We can host the community version for you! Envelop is a risk and audit management tool.
  • 5
    Mend.io

    Mend.io

    Mend.io

    Trusted by the world's leading companies, including IBM, Google, and Capital One, Mend.io's enterprise suite of application security tools is designed to help you build and manage a mature, proactive AppSec program. Mend.io understands the different AppSec requirements of developers and security teams. Unlike other AppSec solutions that force everyone to use a single tool, Mend.io helps them work in harmony by giving each team different, but complementary, tools - enabling them to stop chasing vulnerabilities and start proactively managing application risk.
    Starting Price: $12,000 per year
  • 6
    Creatrix Campus
    Creatrix Campus is a purpose-built higher education software suite that drives digital transformation by impacting across higher ed campuses. The software offers unmatched efficiency by automating end-to-end student and faculty lifecycle management, teaching, and learning, and institutional excellence with modules including; Student CRM, Admissions and Enrollment, Student Information System (SIS), Learning Management System (LMS), Course Evaluation, Faculty Management System (FMS), Outcome-Based Education (OBE), Competency-Based Education (CBE), Assessments, Scheduling, Accreditation, Strategic Planning Analytics, and a lot of other advanced software solutions. The integrated software is flexible, scalable, and works the way you want. It’s configurable over customization, adapting to the peculiar needs with the world’s best higher education workflows, powerful dashboards, data mappings, import & rules engines, setup wizards, form, menu, report builders, and push notifications. Wit
  • 7
    Analytica

    Analytica

    Lumina Decision Systems

    BI tools provide beautiful dashboards and reports that allow users to explore patterns in historical data. And past data can lead to insights. But it can never be prescriptive. Knowledge about what could happen, especially in unprecedented situations, and how to make it happen can only be achieved with Model-Driven decision-making. Analytica is a unique visual software environment for building, exploring, and sharing quantitative decision models that generate prescriptive results. Transcend cumbersome spreadsheets. Analytica’s scalability, power, flexibility, and clarity will be a revelation. Build transparent models using Analytica in a fraction of the time needed for procedural languages like R or Python. Get insights not just numbers. Use agile modeling to create models for effective business decision-making. Estimate risk and uncertainty using efficient probabilistic simulation. Smart sensitivity analysis shows what matters and why.
  • 8
    TimeTrex

    TimeTrex

    TimeTrex

    Rules can be automatically applied to specific employees or situations to automate all calculations, including overtime, premiums and multiple pay rates! Managers can remotely monitor and get up to the second reports regarding employee time and attendance, from anywhere at anytime. Eliminate waiting until the end of the pay period to review attendance records. Setup an unlimited number of accruals to automatically track employee vacations, sick days or banked time. Employees can also see their own accrual balances, eliminating time-consuming requests to human resources to lookup that information. Management has fine-grained control and tracking over where employees are able to punch in/out from, including down to the device and GEO fence level. Allocate time to jobs / tasks and track employee expenses while in the field. Handle employee skills / qualifications and process payroll with just a few clicks.
    Starting Price: $2.90 per month
  • 9
    SolarWinds Access Rights Manager
    SolarWinds® Access Rights Manager is designed to assist IT & security administrators in quickly & easily provisioning, deprovisioning, managing, & auditing user access rights to systems, data, & files, so they can help protect their organizations from the potential risks of data loss and breaches. By analyzing user authorizations & access permissions, you get visualization of who has access to what, and when they accessed it. Customized reports can be generated to help demonstrate compliance with many regulatory requirements. Provision & deprovision users via role-specific templates to help assure conformity of access privilege delegation, in alignment with security policies.
  • 10
    Skybox Security

    Skybox Security

    Skybox Security

    The Skybox approach to risk-based vulnerability management starts with fresh vulnerability data from your entire network — physical IT, multi–cloud and operational technology (OT). Skybox uses a wide range of sources, including asset and patch management systems and network devices, to assess vulnerabilities without a scan. We also collect, centralize and merge data from multiple scanners to give you the most accurate vulnerability assessments on demand. Centralize and enhance vulnerability management processes from discovery to prioritization and remediation. Harness the power vulnerability and asset data, as well as network topology and security controls. Use network modeling and attack simulation to find exposed vulnerabilities. Augment vulnerability data with intelligence on the current threat landscape. Know your best remediation option, including patching, IPS signatures and network–based changes.
  • 11
    Probely

    Probely

    Probely

    Probely is a web vulnerability scanner for agile teams. It provides continuous scanning of web applications and lets you efficiently manage the lifecycle of the vulnerabilities found, in a sleek and intuitive web interface. It also provides simple instructions on how to fix the vulnerabilities (including snippets of code), and by using its full-featured API, it can be integrated into development processes (SDLC) and continuous integration pipelines (CI/CD), to automate security testing. Probely empowers developers to be more independent, solving the security teams' scaling problem, that is usually undersized when compared to development teams, by providing developers with a tool that makes them more independent when it comes to security testing, allowing security teams to focus on more important and critical activities. Probely covers OWASP TOP10 and thousands more and can be used to check specific PCI-DSS, ISO27001, HIPAA, and GDPR requirements.
    Starting Price: $49.00/month
  • 12
    K2View

    K2View

    K2View

    At K2View, we believe that every enterprise should be able to leverage its data to become as disruptive and agile as the best companies in its industry. We make this possible through our patented Data Product Platform, which creates and manages a complete and compliant dataset for every business entity – on demand, and in real time. The dataset is always in sync with its underlying sources, adapts to changes in the source structures, and is instantly accessible to any authorized data consumer. Data Product Platform fuels many operational use cases, including customer 360, data masking and tokenization, test data management, data migration, legacy application modernization, data pipelining and more – to deliver business outcomes in less than half the time, and at half the cost, of any other alternative. The platform inherently supports modern data architectures – data mesh, data fabric, and data hub – and deploys in cloud, on-premise, or hybrid environments.
  • 13
    Dropsuite

    Dropsuite

    Dropsuite

    Dropsuite is a cloud software platform enabling businesses and organizations globally to easily backup, recover and protect their important business information. Dropsuite’s commitment to advanced, secure, and scalable cloud technologies keeps us in the forefront of the industry and makes us the choice of leading IT Administrators and Service Providers globally. Dropsuite's cloud-based email archiving solution helps any organization efficiently store, safeguard, manage, and discover data from most email systems such as Microsoft Exchange Online, Hosted Exchange, G Suite Gmail, and IMAP or POP protocols.
  • 14
    Portnox Security

    Portnox Security

    Portnox Security

    Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. As such, the platform can be easily deployed, scaled and managed by lean, resource-constrained IT teams across any corporate network - no matter how complex.
  • 15
    Jit

    Jit

    Jit

    DevOps ain’t easy! We are hearing more and more about the breakdown and friction where Dev meets Ops, so let’s not even talk about all the other shift-left domains that add another layer of complexity in the middle like DevSecOps. Where this comes with the need to implement and integrate dozens of security tools in their SDLC. But what if it doesn’t have to be difficult? Jit's DevSecOps Orchestration Platform allows high-velocity Engineering teams to own product security while increasing dev velocity. With a unified and friendly developer experience, we envision a world where every cloud application is born with Minimal Viable Security (MVS) embedded and iteratively improves by adding Continuous Security into CI/CD/CS.
  • 16
    OneTrust Privacy & Data Governance Cloud
    Go beyond compliance and build trust through transparency, choice, and control. People demand greater control of their data, unlocking an opportunity for organizations to use these moments to build trust and deliver more valuable experiences. We provide privacy and data governance automation to help organizations better understand their data across the business, meet regulatory requirements, and operationalize risk mitigation to provide transparency and choice to individuals. Achieve data privacy compliance faster and build trust in your organization. Our platform helps break down silos across processes, workflows, and teams to operationalize regulatory compliance and enable trusted data use. Build proactive privacy programs rooted in global best practices, not reactive to individual regulations. Gain visibility into unknown risks to drive mitigation and risk-based decision making. Respect individual choice and embed privacy and security by default into the data lifecycle.
  • 17
    Sign.Plus
    Sign.Plus is a legally-binding electronic signature solution, designed to make workflows faster for businesses of all sizes, from large enterprises to SMEs and even individuals. Sign.Plus Features: • Fill, sign, and send PDF documents, contracts, leases, NDAs, agreements, and more. • Extremely easy-to-use eSignature solution available on multiple platforms, including web, mobile, Google Workspace, and more. • Monitor the progress of your signature requests in real-time. • Reusable templates to send out frequent documents to different recipients. • Certificate of completion that contains a tamper-proof audit report with details about the signers. • Set up a team and add your employees to your team. • Compliant with electronic signature regulations such as ESIGN, eIDAS, ZertES, and more. • Compliant with the world’s strictest data regulations such as ISO 27001, SOC2 Type 2. • Data encryption in transit and at rest. • Data residency
    Starting Price: $9.99 per month
  • 18
    SAP Litmos LMS
    SAP Litmos is a SAAS/Cloud platform for e-learning, also known as a learning management system or LMS. SAP Litmos cloud-based LMS is intended to get learners engaged with great user experiences anytime, anywhere, on any device. SAP Litmos LMS allows you to create courses and learning paths utilizing video, audio, text, surveys, and more in SCROM, Tin Can, or AICC. An LMS gives training professionals everything they need to manage their entire training program from one secure, centralized environment. A cloud-based solution that unifies virtual, classroom, mobile, and social learning, SAP Litmos LMS empowers training departments, sales and service leaders, safety and compliance managers, and HR teams to collaborate, author, globally distribute, and track web-based training courses, as well as schedule and track instructor-led courses. It automates formerly burdensome tasks so that teams can focus their energy on aligning training with the company’s strategic agenda.
  • 19
    AuditBoard

    AuditBoard

    AuditBoard

    AuditBoard transforms how audit, risk, and compliance professionals manage today’s dynamic risk landscape with a modern, connected platform that engages the front lines, surfaces the risks that matter, and drives better strategic decision-making. More than 25% of the Fortune 500 leverage AuditBoard to move their businesses forward with greater clarity and agility. AuditBoard is top-rated in audit management and GRC software on G2, and was recently ranked as one of the 100 fastest-growing technology companies in North America by Deloitte. To learn more, visit: auditboard.com.
  • 20
    TurnKey Lender

    TurnKey Lender

    TurnKey Lender

    TurnKey Lender is a one-stop lending infrastructure used by creditors in 50+ countries to automate all elements of their operations. The platform enables lenders to profitably grow their business while cutting operational costs and risks. It's a powerful AI-driven SaaS that automates over 90% of all lending processes and gives both B2C and B2B lenders a competitive edge. TurnKey Lender Platform has several pre-configured solutions packages including Commercial, Consumer, Pay Later, Auto, Mortgage, Leasing, Factoring. Built in constant collaboration with lenders worldwide, TurnKey Lender is the ultimate solution that answers real-life digital lending challenges in a sophisticated manner.
  • 21
    Ideagen Internal Audit
    Ideagen Internal Audit (formerly known as Pentana Audit) gives you total oversight and control of internal audit activity. Over 10,000 auditors use it every day to limit their company’s exposure to risk, and to provide assurance with confidence. They work to a higher and more consistent standard in a modern SaaS platform that’s built for purpose. Ideagen Internal Audit is a built for purpose SaaS platform that brings your whole audit universe into focus. It empowers internal auditors to get more done, to a higher standard, by cutting the time spent managing systems and chasing updates. With integrated enterprise risk data, audit teams can focus their plans and resources on the issues that really matter. Every audit is completed to the same standard and methodology, so that reporting becomes more accurate.
  • 22
    Polarion REQUIREMENTS
    Effectively gather, author, approve and manage requirements for complex systems across entire project lifecycles. Facilitate synchronicity and easy access via 100% browser-based access to all Polarion data. Enable real-time communication between analysts, engineers, QA members and DevOps teams etc. via threaded discussions, wikis, notifications, alerts & more. Pass any audit, compliance, or regulatory inspection with traceability that is easily implemented and guaranteed via automatic change control of every requirement. Manage work items and documents via workflows that enforce how and when they move from state to state based on definable rules, with full audit trails, electronic signature and security. An exclusive innovation, Polarion LiveDocs, enables you to collaborate concurrently and securely on specification documents with having every single paragraph uniquely identifiable and traceable.
  • 23
    SailPoint

    SailPoint

    SailPoint Technologies

    You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world.
  • 24
    Avantra

    Avantra

    Avantra

    With nearly 20 years experience helping Enterprises and Managed Service Providers (MSPs) globally to better manage their SAP and cloud landscapes, we know what it takes to deliver better service, productivity, innovation and compliance to businesses who rely on SAP. Founded in Switzerland with global presence in UK, USA, Germany and Australia we are well placed to support the largest SAP customers and Managed Service Providers.
  • 25
    Chef

    Chef

    Progress Software

    Chef turns infrastructure into code. With Chef, you can automate how you build, deploy, and manage your infrastructure. Your infrastructure becomes as versionable, testable, and repeatable as application code. Chef Infrastructure Management ensures configurations are applied consistently in every environment with infrastructure management automation. Chef Compliance makes it easy to maintain and enforce compliance across the enterprise. Deliver successful application outcomes consistently at scale with Chef App Delivery. Chef Desktop allows IT teams to automate the deployment, management, and ongoing compliance of IT resources. Ensure configurations are applied consistently in every environment. Powerful policy-based configuration management system software. Runbook automation to consistently define, package & deliver applications. IT automation & DevOps dashboards for operational visibility.
  • 26
    Direct Claim Solution

    Direct Claim Solution

    Innovative Computer Systems

    Claims and Litigation management software for Captive or Risk Retention Group property and casualty claims. Direct Claim Solution is a complete system with claims, policy and vendor management for Self-Insured, Captive or Risk Pool programs. Offers industry specific tools for investigating and analyzing law as well as coverage. Modules for litigation management, subrogation and loss recovery as well as document management included. Merge feature makes for easy letter or email creation. For management, the robust report screen allows multi-conditional querying of claims by exposure type, state of loss, date ranges and policy issuance periods. Vendor isolation feature allows external service providers to access and populate fields in the system as needed to expedite reporting and collaborative analysis. See our website at www.directclaimsolution.com
  • 27
    Check Point CloudGuard

    Check Point CloudGuard

    Check Point Software Technologies

    The Check Point CloudGuard platform provides you cloud native security, with advanced threat prevention for all your assets and workloads – in your public, private, hybrid or multi-cloud environment – providing you unified security to automate security everywhere. Prevention First Email Security: Stop zero-day attacks. Remain ahead of attackers with unparalleled global threat intel. Leverage the power of layered email security. Native Solution, at the Speed of Your Business: Fast, straightforward deployment of invisible inline API based prevention. Unified Solution for Cloud Email & Office Suites: Granular insights and clear reporting with a single dashboard and license fee across mailboxes and enterprise apps. Check Point CloudGuard provides cloud native security for all your assets and workloads, across multi-clouds, allowing you to automate security everywhere, with unified threat prevention and posture management.
  • 28
    LiveRamp

    LiveRamp

    LiveRamp

    Everything we do centers on making data safe and easy for businesses to use. Our Safe Haven platform powers customer intelligence, engages customers at scale, and creates breakthrough opportunities for business growth. Our platform offers the modern enterprise full control of how data can be accessed and used with industry leading software solutions for identity, activation, and data collaboration. Build access to data, develop valuable business insights and drive revenue while maintaining full control over access and use of data at all times. Accurately address your specific audiences at scale across any channel, platform, publisher or network and safely translate data between identity spaces to improve results. Protect your customer data with leading privacy-preserving technologies and advanced techniques to minimize data movement while still enabling insight generation.
  • 29
    Qualys VMDR
    The industry's most advanced, scalable and extensible solution for vulnerability management. Fully cloud-based, Qualys VMDR provides global visibility into where your IT assets are vulnerable and how to protect them. With VMDR 2.0, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure its true risk, and track risk reduction over time. Discover, assess, prioritize, and patch critical vulnerabilities and reduce cybersecurity risk in real time and across your global hybrid IT, OT, and IoT landscape. Quantify risk across vulnerabilities, assets, and groups of assets to help your organization proactively mitigate risk exposure and track risk reduction over time with Qualys TruRisk™
  • 30
    Silverfort

    Silverfort

    Silverfort

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative agentless and proxyless technology, Silverfort seamlessly integrates with all existing IAM solutions (e.g., AD, RADIUS, Azure AD, Okta, Ping, AWS IAM), extending coverage to assets that could not previously have been protected, such as legacy applications, IT infrastructure, file systems, command-line tools, and machine-to-machine access. Our platform continuously monitors all access of users and service accounts across both cloud and on-premise environments, analyzes risk in real time, and enforces adaptive authentication and access policies.