Best Compliance Software in the USA - Page 86

Compare the Top Compliance Software in the USA as of May 2026 - Page 86

  • 1
    Ascent

    Ascent

    Ascent RegTech

    Regulatory monitoring, made simple. View, search, and organize regulatory content from around the world, all in one place. Monitor and prioritize regulatory changes that apply to your business. Rule Updates, Filings, Proposals and Amendments are all included, so you’ll never be surprised by a new or updated rule. See documents organized by industry-standard themes (such as cybersecurity or AML) or by your own custom themes. Work the way you want for clearer insights into emerging regulatory trends. Mark documents and assign them to teammates for review. Create and manage your own obligations so you can track work and ensure completion. All rule updates, guidance notes, speeches and other regulatory documents are consolidated in one place. Documents are organized by key regulatory themes to reflect how Risk and Compliance Officers actually work. Save 20+ hours per regulation in monitoring rule changes. Ascent surfaces the information you care about.
  • 2
    ZEBSOFT

    ZEBSOFT

    Zebra Software

    ZEBSOFT GRC & ISO management software platform is a holistic approach to managing Governance, Risk & Compliance. With an intuitive and easy to use web interface, ZEBSOFT makes to easy to manage ISO (9001, 14001, 22301, 27001, 45001) and many other standards. ZEBSOFT has powerful integrated modules for Risk, Quality, Environmental, InfoSec, Compliances, policies (templates included) & documents, equipment & asset management with maintenance/calibration/testing planning. Improve internal communication, assign ownership, plan and carry out audits. Book a demo today to see what ZEBSOFT can do!
  • 3
    Terra

    Terra

    Terra

    Antiquated on-premise systems are a liability. Streamline your claims operations and improve efficiency with Terra's Automation, Integration, and Intelligence. Terra's products include Claims Management, Policy Management, Benchmark, and an Ancillary Services Marketplace. Manage risk with Automation, Cloud-Native, Integration, and Intelligence! Terra is a Cloud-Native Risk Management Information System for Property & Casualty Insurance.
  • 4
    Cloud Concinnity

    Cloud Concinnity

    The Concinnity Company

    Cloud Concinnity Board Management & Governance Software. Now more than ever, leaders need a way to simplify, centralize and automate everything mission critical — with airtight security protocols. Created by Board & C-Suite veterans with 100+ years of shared experience, Cloud Concinnity delivers access, process and outcomes — with security you can trust. Aligning interconnected teams and information can be streamlined & efficient — even when everyone is remote. Measure and track all key outcomes and issues, especially when things are moving fast. Cloud Concinnity brings together the best of process management tools, board management software, team collaboration and governance, risk management and compliance software in a single, secure hub.
  • 5
    SmartSearch

    SmartSearch

    SmartSearch

    SmartSearch is here to make AML, KYC and Identity Verification compliance easy. The most comprehensive features from an AML Provider. By simply entering the individual’s name, address and date of birth, SmartSearch will complete a full AML/KYC check - including automatic worldwide Sanction and PEP screening - giving you a clear pass or refer result in a matter of seconds. International verification is challenging due to regulatory, cultural and technological differences between countries. But thanks to our unique ability to integrate multiple data sources, we can verify international individuals and businesses. After initial AML/KYC checks have been completed, we continue to monitor all clients daily, alerting you if their Sanctions or PEP status changes. We can also complete retrospective checks on clients to ensure your firm remains compliant at all times.
  • 6
    LetFaster

    LetFaster

    LetFaster

    LetFaster specialises in cloud-based, automated Biometric Identity Screening, Fraud Detection & Tenant Screening. Through our proprietary Facial Recognition, Liveness and Motion Detection algorithms we authenticate global identity documents, with advanced AI and OCR techniques. Few professionals possess the skills to detect fake IDs. If a fake ID passes, all standard background screening would be performed on the real person instead of the fake, leaving organisations at risk of fraud and AML violations. Key Benefits: * In-Depth Tenant Screening * In-House SaaS Portal: Not an Outsourced Solution * Detect Internal and External Fraud * Key-Based 2-Factor Authentication (more secure than SMS Verification) * Strengthen Internal Controls * Automate Workflows: Operational Efficiencies * Automated Set-Up: Offices/Properties/Buildings/Owners * Simple To Use: No Training Required * Audit Trail * Business Intelligence * No Forced Tie-Ups * No Significant Upfront Fees
  • 7
    IDcheck

    IDcheck

    IDcheck

    IDcheck specialises in cloud-based, automated Biometric Identity Screening, Fraud Detection & KYC-AML. Through our proprietary Facial Recognition, Frictionless Liveness and Motion Detection algorithms, we authenticate global identity documents, with advanced AI and OCR. Few professionals possess the skills to detect fake IDs. If a fake ID passes, all standard background screening is performed on the real person instead of the fake, leaving organisations at risk of fraud and AML violations. IDcheck registration and log-in is far more secure than SMS verification. We use Key-Based 2-Factor Authentication, where the "pin" is neither transmitted nor stored. If a device is lost or stolen, the pin would fail after a few incorrect attempts and by using a keypad, even a Key-Logger could not detect the pin. There are multiple industry-specific, automated portals, with strict access management, permissions and internal controls, including sanctions, credit & wealth source checks.
  • 8
    CHEQ

    CHEQ

    CHEQ AI Technologies

    CHEQ FOR PPC Save significant wasted ad-spend and lower your CPA's across all major PPC buying channels with the world's No. 1 click-fraud prevention platform for advertisers PROTECT YOUR ENTIRE MARKETING SPEND The only solution covering all your paid search and paid social buying channels REMOVE BOTS FROM YOUR AUDIENCES The only solution that excludes invalid audiences, protecting your remarketing and lookalikes NEVER BLOCK REAL PAYING CUSTOMERS The only real-time cyber-driven solution that blocks all the bad traffic, but never the good traffic
  • 9
    Proteus NextGen Data Privacy
    Proteus NextGen Data Privacy software provides DPOs, Privacy teams and Legal teams with the data privacy management tools required to manage GDPR compliance, CCPA compliance or other data privacy compliance programme, comprehensively and effectively. Designed for enterprise organisations using current, secure technologies, Proteus NextGen is often regarded as the most highly configurable and comprehensive data privacy software on the market. Covering Privacy Impact Assessments, DPIAs, Transfer Impact Assessments, data mapping, reporting (eg Records of Processing Activity reports), Subject Access Request management, breach notification, vendor management, risk assessment and even automated SCC generation to help with Schrems II compliance, plus other features you would and would not expect. With training and consultancy available to get you up and running quickly, we aim for ultimate customer satisfaction. Go to our website to request a demo www.proteuscyber.com
  • 10
    ComplyWave

    ComplyWave

    ScanWave CTS

    ComplyWave is helping the world's leading organizations succeed by solving their most complex and sensitive security challenges. ComplyWave provides comprehensive implementation services for ISO Services ComplyWave is a proven leader in providing Information Security services to the government and commercial organizations. Our security professionals have developed a proven system to support the implementation and audit/ guidance on all sections of ISO Information Security Management System (ISMS) and supporting risk management frameworks. ISMS Compliancy Services Our security team provide you with the level of support you need. Many organizations are busy and do not have the resources to build an ISMS from the ground up. We are specialized in providing hands-on implementation support to include: Writing your policies and procedures - based on interviews with your personnel to ensure that we captured how you do the work, and delivered the below IS polices.
  • 11
    Transcend

    Transcend

    Transcend

    Transcend is the data privacy infrastructure that makes it simple for companies to give their users control over their personal data. Personal data is disorganized, hard to spot, and stored across many systems. That makes offering data rights—like deleting your data—very hard for companies. Transcend automatically fulfills data subject requests inside companies, across all of their data systems and vendors. Transcend also provides their end-users with a control panel, or “Privacy Center”, hosted at privacy.<company>.com where users can manage their privacy preferences, export their data, or delete it. By making data subject requests painless for companies, Transcend is putting users everywhere in the driver’s seat of their personal data.
  • 12
    SixFifty

    SixFifty

    SixFifty

    Automated Legal Expertise. SixFifty delivers the legal knowledge of Wilson Sonsini in a powerful software platform so anyone can afford the world's best law firm. Diversity, Equity, and Inclusion. How can you build a more divers workforce in compliance with the law? SixFifty can help. Return to Work. Reopening your office during COVID is complicated. We can help. Privacy Compliance. If your business targets people in California or Europe we can help you navigate the CCPA and GDPR. Diversity, Equity, and Inclusion. SixFifty worked with the employment experts at Wilson Sonsini to help you assess your diversity and inclusion efforts, build a plan to make progress, implement your action items, and keep your plans up to date. Privacy Compliance Manage your privacy compliance for the data you collect from California and Europe. Our user-friendly dashboard minimizes the time and pain of building your own custom solution and is powered by the expertise of Wilson Sonsini.
  • 13
    ConfigOS

    ConfigOS

    SteelCloud

    ConfigOS is currently implemented in classified and unclassified environments, tactical and weapon system programs, disconnected labs, and the commercial cloud. ConfigOS is client-less technology, requiring no software agents. ConfigOS scans endpoint systems and remediates hundreds of STIG controls in under 90 seconds. Automated remediation rollback as well as comprehensive compliance reporting and STIG Viewer Checklist output are provided. ConfigOS was designed to harden every CAT 1/2/3 STIG control around an application baseline in about 60 minutes - typically eliminating weeks or months from the RMF accreditation timeline. ConfigOS addresses Microsoft Windows workstation and server operating systems, SQL Server, IIS, IE, Chrome, and all of the Microsoft Office components. The same instance of ConfigOS addresses Red Hat 5/6/7, SUSE, Ubuntu, and Oracle Linux. ConfigOS content includes over 10,000 STIG and CIS controls. New functionality in Command Center includes a patent-pend
  • 14
    Complyon

    Complyon

    Complyon

    We help, You comply. Make compliance an asset and improve your business through Complyon’s governance, compliance and risk management software. Our tools ensure your compliance. Data mapping Reuse, optimize and connect your dataflows to save time and secure your information. Reporting. Generate up-to-date and protocol-ready reports in seconds, covering everything from systems to risks. Decentralizing compliance. A central platform allows your compliance to be trusted by management, while being simple to update, validate and administrate. Improve your compliance with our tailor-made workflows. Central governance. Central governance and business unit input provides all the right data to secure compliance for GDPR and other regulations you need to abide by. Data flow analysis. Understand the complete overview of your data through the interconnection of activities, systems and processes, including everything from third parties and policies to legal basis and retention rules.
  • 15
    DeleteMe
    When someone Googles you or your family — more than 40 data brokers are selling your personal info. Is it possible to have this removed? Yes. Improve Google Search results with DeleteMe. Removing personal information from data broker websites reduces your online footprint, and removes Google search results. Anyone can buy your executive and employee personal information today. That’s a major risk you don’t need. And we can fix it. Contact us today so we can take your employee information down and protect you from phishing attacks, identity theft, stalking, doxxing, and other serious threats. Or get started with an individual DeleteMe Business: Employee or DeleteMe Business: Executive account now and we’ll contact you to discuss protecting the rest of your company.
  • 16
    Fastpath

    Fastpath

    Fastpath

    Fastpath’s cloud-based access orchestration platform allows organizations to manage and automate identity, access governance, and data and configuration changes – efficiently and cost effectively. Our intuitive cloud-based platform seamlessly integrates identity governance and GRC into one sophisticated yet easy-to-use solution. Effortlessly automate, control, and monitor access - from applications down to individual data records to dramatically reduce risk and compliance costs. Fastpath’s platform was designed by auditors who understand the complexity of securing business application access. That’s why we created a solution that reduces the time, cost and complexity associated with audit processes and reporting to prove compliance.
  • 17
    Ennov Regulatory Suite
    Ennov Regulatory Suite, a world-class regulatory content and information management is a unified, centralized, end-to-end solution that is robust enough to support the regulatory information workflow from the earliest stages of research and development through market authorization. It is a common principle shared by companies striving to achieve regulatory operational excellence. These companies understand that an such a solution will help them drive harmonization, promote standardization, improve collaboration, ensure compliance, eliminate waste, reduce costs, accelerate product release and allow them to operate and compete more effectively in global markets. The Ennov Regulatory suite combines the power and flexibility of Ennov Doc, Ennov Dossier and Ennov Process to support the entire regulatory product lifecycle from the early planning of registration targets through product retirement. The Ennov Regulatory suite is an invaluable tool for regulatory activity planning.
  • 18
    Meadow

    Meadow

    Meadow

    Meadow’s complete suite of connected tools makes for smarter cannabis dispensary sales, marketing, inventory management, compliance, and more. Meadow is an all-in-one solution with a fully connected suite of specialized front and back-of-house software powering modern dispensaries. With POS, online ordering, express pick-up and contactless delivery in one secure platform, our complete solution streamlines omni-channel sales, while SMS & MMS marketing, loyalty and rewards help you stay connected to customers and grow your business. Integrated into all Meadow systems are compliant workflows and safeguards critical to operating in compliance with California's local and state regulations; review your business health with our smarter inventory management, reporting, analytics tools.
  • 19
    CMX1 Platform
    Leverage the same Audit Software some of the world's best known brands trust. CMX1's ActivityStudio® makes it easy to develop and execute audit, self-assessment, inspection, evaluation, certification, checklist, and survey programs to ensure quality, safety, compliance and mitigate operational risk. With drag-and-drop policy and visual form building, automated scheduling, comprehensive scoring, ratings & reporting, and CAPA workflows, our clients describe ActivityStudio® as a game changer. The CMX1 Platform enables companies of all sizes to gain control and transparency over their supply chains, deliver quality products and services, and ensure compliance and drive performance across their locations. CMX1 is a user-friendly, cloud-based platform that 800,000+ users across 120 countries use to achieve and maintain Quality and Operational Excellence. Via a single platform, you can manage all your supply chain partners, products, and locations effectively and with confidence.
  • 20
    Fireblocks

    Fireblocks

    Fireblocks

    Build, run and scale a profitable digital asset business. Fireblocks is an all-in-one platform to store, transfer, and issue digital assets across your entire ecosystem. With the Fireblocks DeFi API and Browser Extension, you can now securely access the full range of DeFi protocols for strategies like decentralized exchange (DEX) trading, lending/borrowing, staking, and yield farming. Secure customer and investor funds from cyber attacks, internal collusion and human error with a multi-layer technology that combines the latest breakthroughs in MPC cryptography with hardware isolation. Move and settle assets 24/7 using the first & only institutional asset transfer network. Maximize your balance sheet, reduce counterparty risk, and unlock new revenue opportunities. Enjoy peace of mind with the only insurance policy that covers assets in storage, transfer and E&O. SOC 2 Type II and regular pen testing from ComSec and NCC Group.
  • 21
    Hanzo

    Hanzo

    Hanzo

    Empower you compliance and legal teams to get the most out of unstructured data with Hanzo Ediscovery & Compliance solutions. Collect & archive highly dynamic and interactive websites + work apps like Gsuite & Slack. If you can see it, we can collect it and preserve it for your archives. Book a demo today! Hanzo is solving the single biggest challenge in above-board compliance and litigation today, contextual investigation, capture, and preservation of dynamic web content. Through one sophisticated platform, you are empowered with the tools you need to capture and preserve team messaging data, social media engagement, and interactive web content then replicate it in legally-defensible native format for analysis and review. Hanzo serves government agencies, enterprises, and top law firms across the globe. Technology that ediscovery and compliance teams rely on to manage tomorrow’s biggest data challenges today.
  • 22
    Strike Graph

    Strike Graph

    Strike Graph

    Strike Graph helps companies build a simple, reliable and effective compliance program so that they can get their security certifications quickly and focus on revenue and sales. WE ARE serial entrepreneurs who have built a compliance SAAS solution that simiplifies security certifications such as SOC 2 Type I/II or ISO 27001. We know from experience that these certifications dramatically improve revenue for B2B companies. Facilitated by the Strike Graph platform, key actors in the process including Risk Managers, CTO's, CISO's and Auditors can work collaboratively to achieve trust and move deals. We believe that every organization should have a fair shot at meeting cyber security standards regardless of security framework. As CTO's, sales leaders and founders, we reject the busy-work, security theater and arcane practices currently in the marketplace to achieve certification. We are a security compliance solution company.
  • 23
    HITRUST Assessment XChange

    HITRUST Assessment XChange

    HITRUST Assessment Exchange

    The HITRUST XChange Manager is a purposefully-built online portal which enables real-time collaboration between organizations and their entire supply chain to efficiently manage the exchange of risk assurance information and facilitate continuous monitoring of third-party risk. This innovative portal is the only TPRM solution that is both comprehensive and modular, including the three vital components of people, process, and technology. Make better informed risk decisions by leveraging the HITRUST Third Party Risk Management methodology. The HITRUST Assessment XChange is designed to be an extension of an organizations third-party risk management program. The XChange team streamlines and simplifies the process of managing and maintaining risk assessment and compliance information from third parties. Effectively engage third parties and identify the appropriate individual(s) responsible for responding to risk assessments and compliance information requests.
  • 24
    DatAnswers

    DatAnswers

    Varonis

    Easily respond to data subject access requests by surfacing personal information across cloud and on-prem files with fast and powerful search. Find any file with personal data in seconds with Varonis’ purpose-built search engine. We instantly surface and collect the information you need for DSARs, right to be forgotten, or e-discovery—all with super lean infrastructure. Our DSAR form uses sophisticated logic on the backend to ensure you get high-fidelity results, so you can avoid false positives (and fines). Keep a pulse on how much data you’ve indexed and any failed documents so that you always know the scope of your searches. Sensitive data creation doesn’t stop and privacy regulations are ever-evolving. Privacy automation can help you stay ahead. Easily see where you have overexposed PII with dynamic dashboards that highlight privacy issues. Reduce the risk of breaches and fines by monitoring for unauthorized access to sensitive information and restricting access to least privilege.
  • 25
    Cloud Compliance

    Cloud Compliance

    Cloud Compliance

    Operationalize privacy compliance and data security on Salesforce with the most comprehensive suite of products. The success of privacy programs requires thorough data inventory and risk assessment. However, most organizations end up overlooking pockets of data and struggle with manual processes and spreadsheets. Our Personal Data Inventory product is designed to automate and streamline DPIA and enterprise data inventory flows. Make it easy for your organization to have an accurate data inventory and clear risk assessment. Most organizations are seeing an increase in privacy right requests. Trying to meet these requests manually is inconsistent, error-prone, and increases the risk of non-compliance. Our Privacy Rights Automation product enables self-service and automates all privacy rights related activities. Mitigate the risk of non-compliance with a standardized and error-free solution.
  • 26
    Cassie

    Cassie

    Syrenis

    Cassie is the leading consent and preference management solution that provides a compliant, auditable single source of truth for every data subject your organization encounters. Cassie can strengthen your brand’s trust proposition through granular level consent and help drive value with more tailored communication and lower attrition. Every consent and preference journey is different. Cassie allows full customization of this process, integrating seamlessly with your existing systems, websites and additional incoming data sources. Cassie provides your data subjects with direct access and control to their consent and preferences via the Data Subject Portal, helping your organization to build brand trust through transparency. Our consent management platform enables your data subjects to update their data in real-time, granting your organization the benefit of a live, transparent audit history.
  • 27
    Confirmation

    Confirmation

    Confirmation

    1.5 million auditors, bankers, and financial professionals around the world trust Confirmation to validate data and identify fraud. We can help you too. Dated confirmation methods are inefficient and susceptible to fraud. Our secure digital platform gives you control over the process from start to finish. Watch this video to learn more. Work in a platform that puts data security first. Confirmation’s services are up to major industry standards and pass hundreds of security audits each year. Reduce the confirmation process to an average of two days and cut your costs in half (versus the cost of paper). Nine out of 10 auditors say our platform is easy to use. Plus, we offer robust customer support and ongoing training.
  • 28
    eKYC110

    eKYC110

    WISE AI

    Did you know there are 56% of potential customers who gave up on the onboarding process while applying for an account? 40% of them were concerned with the amount of information being asked, and 34% of them abandoned the process due to lengthy delays. Imagine, the amount of growth you can achieve by just providing an identity verification process that is quick and hassle-free for your customers. Introducing eKYC1110 - A revolutionary KYC solution that works seamlessly for customers by shortens customer onboarding process up to 95%. Intergrate your business with eKYC110, it's easy to use and simple to implement. Create a seamless customer experience. Increase customer opt-in rate. Reduce customer acquisition & verification costs. Enhance customer risk assessment.
  • 29
    Entify

    Entify

    Entify

    Find background information about your customers and partners from anywhere in the world and only make informed business decisions. Verify that the company exists and is active. Identify all the key individuals and associated legal entities. Crosscheck them against money laundering watchlists and find related negative media. Integrate Entify business tool to your own platform (or use the convenient self-service - no integration needed). Your client enters their company name, registration code and country. You receive a thorough Report outlining all the business data and highlighting potential risks. Start the private person verification from self-service environment. Send a personal link to your client. Receive a Report with verification result.
  • 30
    Lithic

    Lithic

    Lithic

    Lithic makes it simple to create payment cards to enable and control spending. Designed for developers, Lithic’s accessible building blocks reduce time to market, unlock new revenue streams and scale with your evolving business. Whether you’re creating payment cards for your customers, optimizing back-office operations, or simplifying disbursements, Lithic makes it easy to start without wading through lengthy MSAs or Sales demos. Pricing is simple, with no expensive monthly fees. Create your first card in minutes and use it right away.
MongoDB Logo MongoDB