Alternatives to 360inControl

Compare 360inControl alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to 360inControl in 2024. Compare features, ratings, user reviews, pricing, and more from 360inControl competitors and alternatives in order to make an informed decision for your business.

  • 1
    Resolver

    Resolver

    Resolver

    Resolver gathers all risk data and analyzes it in context — revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks — whether compliance or audit, incidents or threats — and translates those effects into quantifiable business metrics. Finally, risk becomes a key driver of opportunity instead of being disconnected from the business. Choose the risk intelligence software used by over 1000 of the world’s largest organizations. Resolver makes it easy to collaborate and collect data from across the enterprise, allowing teams to fully understand their risk landscape and control effectiveness. Understanding your data is one thing; being able to use it to drive vital action. Resolver automates workflows and reporting to ensure risk intelligence turns into risk reduction. Welcome to the new world of Risk Intelligence.
    Compare vs. 360inControl View Software
    Visit Website
  • 2
    Predict360

    Predict360

    360factors

    Predict360 is an integrated risk and compliance management software platform for financial and insurance organizations. It integrates risk and compliance processes and industry best practices content into a single platform that streamlines regulatory compliance, improves efficiency, predicts risk, and provides best-in-class business intelligence reporting. Predict360 includes the following Risk Management applications: Enterprise Risk Management (ERM), Risk Management and Assessments, Risk Insights, Issues Management, Peer Insights, Third-Party Risk Management, and Quarterly Certifications and Attestations. Compliance applications are: Compliance Management, Compliance Monitoring & Testing, Complaints Management, Regulatory Change Management, Regulatory Examination and Findings Management, Policy & Procedure Management, and more. 360factors also offers Lumify360 - a KPI and KRI predictive analytics platform that enriches data, predicts performance, and works alongside any GRC.
    Partner badge
    Compare vs. 360inControl View Software
    Visit Website
  • 3
    Onspring

    Onspring

    Onspring GRC Software

    Onspring is an award-winning GRC automation and reporting software. Our SaaS platform is known for flexibility and ease of use for end-users and administrators. Simple, no-code, drag-and-drop functionality makes it easy to create new applications, workflows, and reports independently without IT or developers. - Manage a centralized risk register with multiple hierarchies - Keep tabs on financial impacts & probabilities based on risk tolerance - Capture & relate financial, operational, reputational & third-party risks - Map controls to regulations, frameworks, incidents & risks - Remediate findings through workflows or the POA&M process Ready-made products get you started in as quickly as 30 days: - Governance, Risk & Compliance Suite - Risk Management - Third-party Risk - Controls & Compliance - Audit & Assurance - Policy Lifecycles - CMMC - BC/DR FedRAMP moderate environment available.
    Compare vs. 360inControl View Software
    Visit Website
  • 4
    LogicGate Risk Cloud
    LogicGate’s leading GRC process automation platform, Risk Cloud™, enables organizations to transform disorganized risk and compliance operations into agile process applications, without writing a single line of code. LogicGate believes that flexible, easy-to-use enterprise technology can change the trajectory of organizations and the lives of their employees. We are dedicated to transforming the way companies manage their governance, risk, and compliance (GRC) programs, so they can manage risk with confidence. LogicGate’s Risk Cloud platform and cloud-based applications, combined with raving fan service and expertly crafted content, enable organizations to transform disorganized risk and compliance operations into agile processes, without writing a single line of code.
    Compare vs. 360inControl View Software
    Visit Website
  • 5
    Safetica

    Safetica

    Safetica

    Safetica is an integrated Data Loss Prevention (DLP) and Insider Risk Management (IRM) solution, which helps companies to identify, classify, and protect sensitive data as well as detect, analyze, and mitigate risks posed by insiders within an organization. Safetica covers the following data security solutions: ✅ Data Classification: Safetica offers complete data visibility across endpoints, networks, and cloud environments. ✅ Data Loss Prevention: With Safetica, you can protect sensitive business- or customer-related data, source codes, or blueprints from accidental or intentional exposure through instant notifications and policy enforcement. ✅ Insider Risk Management: With Safetica, you can analyze insider risks, detect threats, and mitigate them swiftly. ✅ Cloud Data Protection: Safetica can monitor and classify files directly during user operations. ✅ Regulatory compliance: GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO/IEC 27001, SOC2 or CCPA.
    Leader badge
    Partner badge
    Compare vs. 360inControl View Software
    Visit Website
  • 6
    ClusterSeven

    ClusterSeven

    Mitratech

    With ClusterSeven Shadow IT Manager, gain control over the hidden spreadsheets and other data assets that put your enterprise at risk. Discover and manage the hidden, sensitive spreadsheets, applications, and data assets that lie outside of IT’s control – and create risk. Now you can easily and efficiently capture and maintain an inventory of the files your organization relies upon and monitor who’s making changes, helping you meet audit and compliance requirements and prevent problems before they impact your enterprise. Classify the risks associated with your newly discovered EUC files and organize them in a centralized database. Once you’ve established the spreadsheets your organization is using, you can carry out a deeper risk analysis on critical files using rules that matter to your business, such as the complexity of a formula or macro, use of sensitive terms in the file like “confidential,” inclusion of unprotected client or personal data, or the presence of hidden worksheets.
  • 7
    AuditBoard

    AuditBoard

    AuditBoard

    AuditBoard transforms how audit, risk, and compliance professionals manage today’s dynamic risk landscape with a modern, connected platform that engages the front lines, surfaces the risks that matter, and drives better strategic decision-making. More than 25% of the Fortune 500 leverage AuditBoard to move their businesses forward with greater clarity and agility. AuditBoard is top-rated in audit management and GRC software on G2, and was recently ranked as one of the 100 fastest-growing technology companies in North America by Deloitte. To learn more, visit: auditboard.com.
  • 8
    ControlMap

    ControlMap

    ControlMap

    Is cybersecurity compliance taking too much time and becoming an ever-growing challenge to manage? Do you need a cybersecurity audit done to win a deal? If yes, then you are at the right place. Controlmap helps companies of all sizes easily and quickly achieve SOC 2, ISO-27001, NIST, CSA STAR, or other Infosec certifications. ControlMap's cybersecurity compliance platform cuts manual grunt work by up to 80% by automating evidence collection, eliminating spreadsheets, and making manual follow-ups obsolete. With Risks, Controls, Policies, and Evidence continuously connected to the right people in your company in a single platform, you know you can sleep well. ControlMap continuously does the heavy lifting of compliance work for you, freeing you to do what your business needs. It follows up on scheduled tasks, automatically collects Evidence from the cloud, reminds employees to fulfill their compliance duties such as reading and acknowledging policies. To learn more, contact us.
  • 9
    SAI360

    SAI360

    SAI360

    The most powerful, agile approach to risk management. The decisions you make today can help mitigate the risks you may encounter tomorrow. SAI360 is cloud-first software and modern ethics and compliance learning content designed to help your organization effectively navigate risk with a flexible, agile approach. Intelligent solutions, global expertise all in one award-winning platform. Solution configurability, extensible data model with configurable UI/forms, fields, relationships to extend solutions. Process modeling, easily modify or create new processes to automate and streamline risk, compliance, and audit activities. Data visualization and analysis, many out of the box and easy to configure dashboards to visualize and analyze data. Learning and best practice content – preloaded frameworks, control libraries, and regulatory content along with values-based ethics and compliance learning content. System integration – Integration framework with APIs and other protocols.
  • 10
    MasterControl

    MasterControl

    MasterControl

    MasterControl Quality Excellence solutions are used by five of the largest regulatory agencies in the United States. A leading software-as-a-service (SaaS) provider, MasterControl helps companies get their life-improving products to market sooner. It does this by providing cloud-based solutions that manage an organizations documents, training and exams, corrective/preventive action, validation, and more. And its not just quality MasterControl has solutions for the entire product lifecycle.
    Starting Price: $25,000 / 1st year
  • 11
    Todyl Security Platform
    The Todyl Security Platform eliminates the complexity, cost, and challenges of ever-growing security stacks. Manage your security and networking through our cloud-first, single-agent platform. In minutes, you'll be connected and protected, with unmatched visibility and control across your environments. Stop managing products and start building a comprehensive security program. The Todyl Security Platform spans prevention, detection, and response by unifying SASE, Endpoint Security (EDR + NGAV), SIEM, MXDR, and GRC in a cloud-first platform. Todyl streamlines operations simplify architectures and empower your team to deliver highly effective security while simplifying compliance management. Thanks to the global scale and power of the Secure Global Network™ (SGN) Cloud Platform, users can securely connect to company networks, clouds, SaaS apps, and the Internet from everywhere in the world.
  • 12
    MetricStream

    MetricStream

    MetricStream

    Reduce losses and risk events with forward-looking risk visibility. Enable a modern and integrated risk management approach with real-time aggregated risk intelligence and their impact on business objectives and investments. Protect brand reputation, lower the cost of compliance, and build regulators and board’s trust. Stay on top of evolving regulatory requirements, proactively manage compliance risks, policies, cases, and controls assessments. Drive risk-aware decisions and accelerate business performance by aligning audits to strategic imperatives, business objectives and risks. Provide timely insights on risks and strengthen collaboration across various functions. Reduce exposure to third-party risks, make superior sourcing decisions. Prevent third-party risk incidents with continuous third-party risk, compliance and performance monitoring. Simplify and streamline entire third-party risk management lifecycle.
  • 13
    Centraleyes

    Centraleyes

    Centraleyes

    Centraleyes equips organizations with an unparalleled ability to achieve and sustain cyber resilience and compliance in a single pane of glass. Our solutions quantify, mitigate and visualize cyber risks – saving time and resources so you can focus on what really matters: Business success. Organizations across industries are affected by the growing number and complexity of cyber attacks increasing year over year. Cyber risk and compliance management is critical in protecting organizations from the financial, repetitional and legal damage. Proper cyber defense can only be achieved by analyzing, quantifying, and mitigating internal risk, while ensuring compliance with relevant standards and regulations. Outdated solutions like spreadsheets and old GRC systems are inefficient and make it impossible for cyber teams to effectively protect their organizations.
  • 14
    ZenGRC

    ZenGRC

    Reciprocity

    ZenGRC by Reciprocity is an enterprise-grade security solution for compliance and risk management. Trusted by the world's leading companies, including Walmart, GitHub, airbnb, and Genesys, ZenGRC offers businesses efficient control tracking, testing, and enforcement. It comes with system-of-record for compliance, risk assessment, centralized dashboards, streamlined workflow, and unified control management.
    Starting Price: $2500.00/month
  • 15
    Apptega

    Apptega

    Apptega

    Simplify cybersecurity and compliance with the platform that’s highest rated by customers. Join thousands of CISOs, CIOs, and IT professionals who are dramatically reducing the cost and burden of managing cybersecurity and compliance audits. Learn how you can save time and money, have great cybersecurity, and grow your business with Apptega. Go beyond one-time compliance. Assess and remediate within a living program. Confidently report with one click. Quickly complete questionnaire-based assessments and use Autoscoring to pinpoint gaps. Keep your customers’ data safe in the cloud and out of the hands of cybercriminals. Ensure your compliance with the European Union's official privacy regulation. Prepare for the new CMMC certification process to maintain your government contracts. Enjoy Enterprise-class capabilities paired with consumer app. Quickly connect your entire ecosystem with Apptega’s pre-built connectors and open API.
  • 16
    GlobalSUITE

    GlobalSUITE

    GlobalSuite

    Deploy and go: GlobalSUITE Solutions applications make it easy for you to comply with industry frameworks and ensure you work with best practices from a broad repository of international standards controls and specific regulations. The solution allows you to improve the management of your Security and Cybersecurity System by leaving behind manual methods that reduce the effectiveness of the equipment. Our clients start working from day one, without the need to invest time loading compliance catalogs, risk catalogs and controls, methodologies, etc. Everything is ready to optimize times and allow you to focus on the most important thing, your goals. We help you with a risk analysis adaptable to any methodology with the possibility of carrying out an assessment of them with risk maps and automatic dashboards. The solution allows you to make an automatic adequacy plan with workflows that offer you a comparison between periods, in addition to the history of compliance.
  • 17
    eramba

    eramba

    eramba

    The real fuel that keeps eramba running and improving is its global community of users that leverage our simple and open code, documentation, forum, release planning, and business model. The experience of running for over a decade our community software helped us build our enterprise software that includes unlimited email support, additional features, and regular updates. Our ridiculously simple business model and affordable pricing is exclusively aimed at financing this project. Our community-driven repository of GRC templates is open and free for everyone no matter if you use eramba or not. Paying for templates is ridiculous if you consider the amount of brainpower the GRC community has. Compliance, internal controls, policies, mappings, questionnaires, etc.
  • 18
    OneTrust GRC & Security Assurance Cloud
    Scale your risk and security functions so you can operate through challenges with confidence. The global threat landscape continues to evolve each day, bringing new and unexpected risks to people and organizations. The OneTrust GRC and Security Assurance Cloud brings resiliency to your organization and supply chain in the face of continuous cyber threats, global crises, and more – so you can operate with confidence. Manage increasingly complex regulations, security frameworks, and compliance needs with a unified platform for prioritizing and managing risk. Gain regulatory intelligence and manage first- or third-party risk based on your chosen methodology. Centralize policy development with embedded business intelligence and collaboration capabilities. Automate evidence collection and manage GRC tasks across the business with ease.
  • 19
    LogicManager

    LogicManager

    LogicManager

    Our risk management platform and consultancy empower you to anticipate what’s ahead, uphold your reputation and improve business performance through strong governance. Your risks are all interconnected. Our governance area and point solution packages are built on a taxonomy platform, so they can be easily integrated into any department and support you throughout the entirety of your organization’s risk journey. Use a risk assessment to easily identify bank risk themes across your branches as well as gaps in controls and processes. It’s also important to gain insight into location-specific risk factors (like susceptibility to natural disasters, number of employees or departments, etc.) to truly understand your risks on an enterprise level. We pair customers with our team of expert risk management consultants to get your business moving forward. With a range of personalized training sessions and best practice consulting services.
  • 20
    Fastpath

    Fastpath

    Fastpath

    Fastpath’s cloud-based access orchestration platform allows organizations to manage and automate identity, access governance, and data and configuration changes – efficiently and cost effectively. Our intuitive cloud-based platform seamlessly integrates identity governance and GRC into one sophisticated yet easy-to-use solution. Effortlessly automate, control, and monitor access - from applications down to individual data records to dramatically reduce risk and compliance costs. Fastpath’s platform was designed by auditors who understand the complexity of securing business application access. That’s why we created a solution that reduces the time, cost and complexity associated with audit processes and reporting to prove compliance.
  • 21
    Cybrance

    Cybrance

    Cybrance

    Protect your company with Cybrance's Risk Management platform. Seamlessly oversee your cyber security and regulatory compliance programs, manage risk, and track controls. Collaborate with stakeholders in real-time and get the job done quickly and efficiently. With Cybrance, you can effortlessly create custom risk assessments in compliance with global frameworks such as NIST CSF, 800-171, ISO 27001/2, HIPAA, CIS v.8, CMMC, CAN-CIOSC 104, ISAME Cyber Essentials, and more. Say goodbye to tedious spreadsheets. Cybrance provides surveys for effortless collaboration, evidence storage and policy management. Stay on top of your assessment requirements and generate structured Plans of Action and Milestones to track your progress. Don't risk cyber attacks or non-compliance. Choose Cybrance for simple, effective, and secure Risk Management.
    Starting Price: $199/month
  • 22
    UpGuard

    UpGuard

    UpGuard

    The new standard in third-party risk and attack surface management. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day. Continuously monitor your vendors, automate security questionnaires, and reduce third and fourth-party risk. Monitor your attack surface, prevent data breaches, discover leaked credentials, and protect customer data. Scale your third-party risk program with UpGuard analysts, and let us monitor your organization and vendors for data leaks. UpGuard builds the most powerful and flexible tools for cybersecurity. Whether you’re looking to prevent third-party data breaches, continuously monitor your vendors, or understand your attack surface, UpGuard’s meticulously designed platform, and unmatched functionality helps you protect your most sensitive data. Hundreds of the world’s most data-conscious companies are scaling faster and more securely.
    Starting Price: $5,249 per year
  • 23
    SureCloud

    SureCloud

    SureCloud

    SureCloud is a leading provider of cloud based, integrated GRC (Governance, Risk & Compliance) products and cybersecurity services, which reinvent the way you manage risk.  SureCloud is underpinned by Aurora, a highly configurable no-code platform, which is simple, intuitive, and flexible. Unlike other GRC platform providers who force organizations to adapt their processes, our solutions are highly configurable. Aurora can be easily customized to fit a wide range of operating models. Continually assess, mitigate risk, stay secure.
  • 24
    ControlPanelGRC
    NTT’s ControlPanelGRC software suite is focused on providing a comprehensive compliance automation solution for SAP environments. ControlPanelGRC® is a powerful, flexible, and easy to implement governance, risk management, and compliance (GRC) platform. With an exceptional experience, rapid implementation, seamless integration to SAP, and robust reporting and analytics, ControlPanelGRC keeps SAP users Always Audit Ready™ — saving time and money while eliminating anxiety and uncertainty from the compliance process.No hardware expenses. ControlPanelGRC installs directly in your existing SAP infrastructure via SAP transport. Minimal time to implement, shorter time to value.Go-live in as little as one day, training your team in less than one week. Lower implementation costs and no costs for upgrades. Reduce time spent on compliance activities. ControlPanel GRC AutoAuditor pushes reports in workflow for approval enabling your staff to complete their tasks in less time.
  • 25
    IBM OpenPages
    Simplify data governance, risk management and regulatory compliance with IBM OpenPages — a highly scalable, AI-powered, and unified GRC platform. IBM® OpenPages® is an AI-driven, highly scalable governance, risk and compliance (GRC) solution that runs on any cloud with IBM Cloud Pak® for Data. Centralize siloed risk management functions within a single environment designed to help you identify, manage, monitor and report on risk and regulatory compliance, especially in today’s changing business landscape. Prepare for the future with an extensible, fully configurable, integrated enterprise risk management solution that scales to tens of thousands of users. Drive GRC adoption for all three lines of the business with a modern, task-focused UI to complete tasks.
  • 26
    Ostendio

    Ostendio

    Ostendio

    Ostendio is the only integrated security and risk management platform that leverages the strength of your greatest asset. Your people. Ostendio delivers an easy-to-use, cost-effective platform that allows you to assess risk, create and manage critical policies and procedures, educate and empower your people to be secure with security awareness training, and monitor continuous compliance across 250+ security frameworks. With deep customization, advanced intelligence, and flexible controls, you’re always audit-ready, always secure, and always able to take on what’s next. For more information about Ostendio, visit ostendio.com.
  • 27
    Soterion

    Soterion

    Soterion

    A powerful, size-sensible GRC application for companies that require on-premise solutions. Ideal for smaller companies that have internal GRC resources. Reasons to believe. A complete On-Premise GRC solution that's a pleasure to use. Powerful, Size-Sensible Features. All the GRC features your business actually needs without complex, unnecessary functionality. Risk-rule-set@2x Intuitive and Easy to Use. We've completely re-imagined the GRC user experience from the ground up, making Soterion a pleasure to use. Our business-friendly reporting tools allow focused reports by business area. audit-surprise@2x. Insights as You Need Them. Avoid external audit surprises by viewing easy-to-understand access risk reports as and when you need to. Pay-as-you-go@2x Cost-Effective GRC Alternative. Get excellent value on all the on-premise GRC functionality your business actually needs, without paying a premium for enterprise features typically only required by the largest global companies
  • 28
    Archer

    Archer

    RSA Security

    Built upon decades of experience and hundreds of deployments across all domains of risk management. Whether your organization has an advanced Risk Management function looking to consolidate visibility or get started with one area of risk. Drive efficiency and coordination across stakeholders on a platform tailor-made for risk analysis and management. Archer enables a common understanding of risk, making it easier to work together to manage it. Applying the same taxonomies, policies and metrics to the management of all risk data enhances visibility for everyone, improves collaboration and increases efficiencies. Explore our comprehensive approach to integrated risk management with a demo of Archer. See the UI and discover how the features, dashboards, and capabilities can best address your organization’s unique risk and compliance challenges, whether you deploy our on-premises or SaaS offering.
  • 29
    Quantivate

    Quantivate

    Quantivate

    Since 2005, Quantivate has been helping organizations efficiently manage their governance, risk, and compliance (GRC) initiatives. Quantivate’s scalable technology and service solutions equip organizations of all sizes to make more strategic decisions, improve performance, and reduce costs. Learn about how Quantivate’s integrated platform can simplify GRC management at quantivate.com.
  • 30
    Pellonium

    Pellonium

    Pellonium

    Continuous cyber risk quantification, evaluation & business impact analysis based on what's actually happening in your organization. Prioritized tactics tailored to your environment & thresholds to reduce cyber risk exposure & increase security ROI. Automated compliance & controls management that leverage adaptable frameworks to significantly improve regulatory & internal oversight obligations. Shift from simply identifying what's wrong to why it actually matters & have data-driven confidence to ruthlessly protect investments & strategic goals. provides meaningful, actionable, and defensible insights to help security teams & executives answer the most urgent questions.
  • 31
    TruOps

    TruOps

    TruOps

    The TruOps platform centralizes all information and connects assets to risk and compliance data, including policies, controls, vulnerabilities, issue management, exceptions, and more. TruOps is a comprehensive cyber risk management solution. Each module is designed to maximize efficiency and solve the process challenges you face today while preparing your organization for the future. Consolidate disparate information and relationships to enable intelligent and automated choices and process information through risk-based workflows. Automate and streamline oversight of vendor relationships, perform due diligence, and consistently monitor third parties with this module. Streamline and automate risk management processes. Leverage conditional questions and a scenarios engine to identify risks. Automate the identification, planning, and response processes. Easily manage plans, actions, and resources and resolve issues promptly.
  • 32
    Corax

    Corax

    Corax

    Justify your security budget and optimize spending by understanding what impact each cyber risk has on your financial exposure. By being able to see your true financial exposure to cyber risk, you can now determine your risk appetite and make the right informed decisions to transfer or offset each risk. See the financial risk that each 3rd party is causing you, be that an existing or potential third party, now with the financial impact cost you can control and protect your critical supply chain. With each day, our database grows by over 100,000 companies to build the world’s most comprehensive modeled view on cyber risk. Our platform not only enables you to see how you compare in your industry against your peers but also provides a customizable peer group. Born in the insurance industry, we help some of the world’s largest insurers identify risk levels and financial impact across different industry sectors and business types.
  • 33
    Riskpro

    Riskpro

    Riskpro India

    Third party risk management (TPRM) is a structured approach to analyze and control risks arising to the organization from third parties. Mainly third parties are: Vendors Customers Joint ventures Counterparties Fourth Parties Third-party relationships can be a significant source of enterprise risk. The propagation of third-party partners, regulatory pressure, and the complexity of cyber-related risks has led companies to dedicate more time and attention to the potential risks by third parties. They enable companies to be flexible and competitive in a global business environment. These relationships often allow companies to delegate important tasks so that they can focus on their core competencies. With the benefits gained from third parties comes related risks that pose significant threats to a business, such as cyber breaches, business continuity challenges, or reputational damage.
    Starting Price: $750 per year
  • 34
    Kovrr

    Kovrr

    Kovrr

    Quantum is a cyber risk quantification (CRQ) platform with a set of new functionality and services that will help your business translate cyber risk into business impact. Quantum is designed to help CISOs, Chief Risk Officers and boards take control. It enables them to visualize the effectiveness of a cybersecurity program, assess the potential risk reduction for future cybersecurity investments, and form a solid risk transfer strategy. Get better coverage at a better rate on your cyber insurance policy. Use our security control ROI calculator to understand the financial benefits of improving your cybersecurity risk posture. Enhance the board and C-Suite’s decision-making process by financially quantifying cyber risk. Prioritize and justify cybersecurity investments based on business impacts and risk reduction. Assess the ROI of your cybersecurity program and stress test it based on potential risk mitigation actions, thereby supporting better resource allocation.
  • 35
    Cyberator

    Cyberator

    Zartech

    IT Governance, Risk and Compliance is the cyclical integration of risk assessment, compliance with standards to mitigate risk, and oversight of continuous compliance monitoring. Cyberator allows you to stay up-to-date with regulatory compliance or industry standards and helps transform your inefficient processes across your organization into a unified Governance, Risk and Compliance (GRC) program. It offers a drastic reduction of time in a risk assessment with a broader range of governance and cybersecurity frameworks to work with. It uses industry expertise, data-driven analysis and industry best practices to transform your security program management. Cyberator also provides automatic tracking of all gap remediation efforts and full control of security road-map development.
  • 36
    Oracle GRC

    Oracle GRC

    Oracle

    Oracle Governance, Risk and Compliance (GRC) serves as a platform for two components — Enterprise Governance, Risk and Compliance Manager (EGRCM) and Enterprise Governance, Risk and Compliance Controls (EGRCC). EGRCM forms a documentary record of a company’s strategy for addressing risk and complying with regulatory requirements. It enables users to define risks to the company’s business, controls to mitigate those risks, and other objects, such as business processes to which risks and controls apply. EGRCC comprises two elements, Application Access Controls Governor (AACG) and Enterprise Transaction Controls Governor (ETCG). These enable users to create models and controls and to run them within business applications to uncover and resolve segregation of duties violations and transaction risk. These components run as modules in the GRC platform. EGRCC runs as a Continuous Controls Monitoring (CCM) module. EGRCM provides a Financial Governance module by default.
  • 37
    Sealit

    Sealit

    Sealit Technologies

    When implementing a Zero Trust security model you shouldn’t question if your accounts or devices will get get compromised - assume they will. With Sealit, the sensitive data in your emails and files will remain fully protected even in that scenario. It takes one click from your existing inbox to encrypt your sensitive emails. It takes one click to encrypt any file format on your desktop. We made sure your workflow isn’t disrupted as we add a strong layer of protection to your sensitive data. Human error accounts for over 90 percent of cyber attacks on businesses, so you need to have a system in place to minimize the risk. Our patent-pending end-to-end encryption ensures each facet of your business is protected. Our app uses biometrics as authentication which provides you a seamless protection experience. Unlike passwords, biometrics cannot be taken away from you, there’s nothing you need to remember, and you always have it with you.
  • 38
    Auditrunner

    Auditrunner

    Auditrunner

    The Secure Audit, Risk, Compliance & Quality Software. With On-Premise and Cloud-based deployment options. Auditrunner offers granular encryption and role-based access control for audit files and documents at-rest. All data transfers are protected. We have automated 3000+ business processes for enterprises around the world. Our GRC platform modules are just a few of them. Cloud-based or On-Premise, deploy and start using. Hassle-free integration process enables you to enjoy the benefits of the platform within weeks of kickoff . The low-code platform we are built upon is fully customizable and allows for compliance with any standard or regulation. Operate in a responsive manner in today’s fast-moving, ever-changing regulatory environment and comply with multitude of different legislation instantly without the need for assistance. The ease of use we offer is unmatched.
  • 39
    Oracle Risk Management and Compliance
    Automate advanced security and transaction monitoring to strengthen financial controls, ensure separation of duties (SoD), stop fraud, and streamline audit workflows. Automate the analysis required to ensure all roles are audit-ready. Utilize visualizations and simulations to make the best design decisions. Use embedded sensitive access and SoD rules to ensure your roles are compliant prior to go-live. Avoid costly user acceptance testing and audit issues by designing secure ERP roles before the system goes live. Prevent tampering by continuously monitoring transactions and sensitive ERP data with built-in AI. Enable business continuity and resilience by adopting an AI-driven approach to risk management and security. Improve financial oversight by linking risk to business results. Empower employees to balance opportunities with risks. Streamline business continuity and readiness efforts.
  • 40
    CIMCON Software

    CIMCON Software

    CIMCON Software

    CIMCON Software minimizes operational risks inherent in end-user computing (EUC) files. Risks include regulatory reporting errors, non-compliance, cyber risk, and fraud. EUCs include documents such as spreadsheets, models, Access databases, scripted applications using VBScript, R, Python and self-service analytics tools such as Tableau and QlikView. Banks rely heavily on end-user computing applications (EUCs) such as Excel spreadsheets and scripts for day to day operations because they allow users to react quickly to changing market conditions or regulations. Whether they are used for creating financial models, finance, accounting or complying with regulatory requirements, they need to be managed effectively. CIMCON Software offers solutions that create an inventory of all EUCs in your organization, identify the most critical files, detect errors; provide a visual map of data dependencies, and provide on-going monitoring and control of your most important EUCs.
  • 41
    Telivy

    Telivy

    Telivy

    Experience the industry's most comprehensive and versatile audit tool, deployable seamlessly with a single script. Keep your networks, devices and data safe and secure by discovering any potential entry points for cyber attacks - from both inside and outside your organization. Protect your data from attacks that can encrypt, modify, corrupt or destroy data, such as ransomware. Ensure data is available to anyone in the organization who has access to it. Audit and configure proper access to all corporate assets on-premises and cloud. Enforce policies around user authentication, validation & privileges, and address issues regarding privilege creep. Test resilience to email phishing and application password detection attempts to gain access to restricted areas and exfiltrate confidential data.
  • 42
    ARCON | SCM
    The ARCON | SCM solution helps to enforce a comprehensive IT risk management framework – a unified engine of all IT risk management controls required to be implemented at different layers for effective risk mitigation. The solution ensures the creation of a robust security posture and ensures compliance. Critical technology platforms require continuous risk assessment. This can be achieved through the power of AI – governing, assessing, and optimizing the organization’s Information Risk Management. An organization’s IT infrastructure is constantly evolving, adding new capabilities and technologies, making it important for their cybersecurity and identity protection solutions to evolve with them. Having a unified engine for effective risk management implemented at different levels facilitates organizations to prioritize security and compliance efforts without the need for manual intervention.
  • 43
    Protecht ERM

    Protecht ERM

    Protecht Group

    While others fear risk, we embrace it. With offices in Los Angeles, London and Sydney, Protecht redefines the way people think about risk management. We help companies increase performance and achieve strategic objectives through better understanding, monitoring and management of risk. Protecht provides a complete solution comprised of world-class risk management, compliance, training and advisory services to businesses that need to manage non-financial risks and regulatory compliance, as well as regulators and governments around the world. With our flagship Protecht ERM no-code SaaS platform you can dynamically manage all enterprise risks in a single place: - Risk Assessment, RCSA, and risk registers - Compliance management - Incident management - Internal audit - Dashboard summaries of Key Risk Indicators (KRIs), Key Control Indicators (KCIs), and Key Performance Indicators (KPIs) - For ERM, vendor (TPRM & VRM), cyber & IT, model & AI, operational resilience & BCM
  • 44
    Jobarix

    Jobarix

    Maerix

    JOBARIX, our preventive analysis software enables you to analyze every risk in relation to a task, a piece of equipment or a workstation. Designed step by step, this analysis will allow the identification of every danger and hazard, implement control measures and reduce risks for the affected workers. This simple, intuitive system is easy to use, so you can concentrate your efforts on increasing performance. With one efficient tool you have a sound, centralized, document management system. Look no further, JOBARIX translates into Simplicity, Efficiency and Ingenuity! The ultimate goal is to reduce risks or eliminate hazards and to benefit from a healthier work environment. Knowing the risks to your business is the No.1 step in workplace safety! The task of performing a preventive analysis allows the detection of the risks that have to be mitigated through preventive measures.
  • 45
    Global Risk Exchange

    Global Risk Exchange

    ProcessUnity

    Protect your third-party digital ecosystem with a data-driven approach that provides complete portfolio visibility and predictive capabilities. Global Risk Exchange (formerly CyberGRX) delivers rich, dynamic assessments of third-party vendors at speed and scale so you can manage your evolving third-party ecosystem with a collaborative, crowd-sourced Exchange featuring a repository of validated and predictive assessment data. Using sophisticated data analytics, real-world attack scenarios, and real-time threat intelligence, we provide a complete portfolio analysis of your third-party ecosystem, helping you to prioritize your risks and make smarter decisions. Identify trends and create benchmarks by leveraging structured data and actionable intelligence.
  • 46
    BWise

    BWise

    SAI Global

    Risk Intelligence managed services and solutions help businesses create efficiencies and make objective assessments about current opportunities and threats by supporting everything from risk management and internal audit to regulatory compliance, internal control and information security programs. Risk Intelligence solutions are powered by BWise technology and support companies of all sizes through a wide range of deployment models, from on-premise implementations to out-of-the-box SaaS solutions streamlining single initiatives to complex integrated GRC projects. Ensure “one view of the truth” with centralized and up-to-the-minute dashboards that display risk exposure metrics on any device. Gauge employee understanding of GRC initiatives with customizable online Ethics and Compliance learning programs. Be certain that no matter how your organization grows or changes, your program can scale with agile, modular components based on the latest best practices.
  • 47
    Clym

    Clym

    Clym

    Clym is an affordable compliance platform that is easy to understand, looks good and protects your business immediately. Manage cookie consent, data subject requests and do not sell my private information requests for global compliance regulations such as GDPR, CCPA and LGPD. One platform for global privacy needs. Clym is the data privacy platform that helps organizations meet their data protection obligations. Cookies, consent, requests, policies and more are all managed in a secure and adaptive application. Clym helps you collect, control and manage the data that is relevant for your company in a transparent way. The platform covers 6 main areas of compliance, namely: data consent management, cookie consent management, company & DPO data management, terms, policies, agreements & procedures, data subjects’ requests, localization and consent receipts. Through all its functionalities, Clym provides a head start in data privacy compliance.
    Starting Price: $45 per month
  • 48
    Risk Warden

    Risk Warden

    Risk Warden

    Risk Warden dramatically mitigates potential human error for risk owners and risk assessors, optimizes consistency and gives you the power of a real-time overview of your company’s assets. As a risk assessor, revolutionize the way you conduct Risk Assessments and future-proof your business by using a paperless, cloud-based risk assessment platform. Perform on-site assessments quickly, efficiently, and accurately using our structured and systematic approach. As a risk owner go digital! Our bespoke property management software makes the process of assessing and managing your risk and compliance easier than ever. Our highly secure, cloud-based, digital solution is highly scalable and can be configured to meet all your Risk Management needs. Everything you need to digitize the risk assessment lifecycle within your business and attract bigger customers. Everything you need to bring your property compliance under control. Govern, track and action every aspect of your compliance lifecycle.
    Starting Price: £9 per month
  • 49
    VGS Platform

    VGS Platform

    Very Good Security

    The VGS Vault enables users to safely store their tokenized data. This creates a safe haven for your most sensitive data. In the event of a breach, there’s nothing to steal. You can’t hack what’s not there. VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it. Use the interactive example to see how data is transformed by VGS. Choose Redact or Reveal to hide or display data, respectively. Whether you’re building a new product and want best-in-class security from the start or are an established company looking to eliminate compliance as a roadblock to new business, VGS can help. VGS takes on the liability of securing your data, eliminating the risk of data breaches and reducing compliance overhead. For companies that prefer to vault their own data, VGS layers on protection to the systems, preventing unauthorized access and leakage.
  • 50
    CyberArrow

    CyberArrow

    CyberArrow

    Automate the implementation & certification of 50+ cybersecurity standards without having to attend audits. Improve and prove your security posture in real-time. CyberArrow simplifies the implementation of cyber security standards by automating as much as 90% of the work involved. Obtain cybersecurity compliance and certifications quickly with automation. Put cybersecurity on autopilot with CyberArrow’s continuous monitoring and automated security assessments. Get certified against leading standards via a zero-touch approach. The audit is carried out by auditors using the CyberArrow platform. Get expert cyber security advice from a dedicated virtual CISO through the chat function. Get certified against leading standards in weeks, not months. Safeguard personal data, comply with privacy laws, and earn the trust of your users. Secure cardholder information and instill confidence in your payment processing systems.