Alternatives to Cub Cyber
Compare Cub Cyber alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Cub Cyber in 2026. Compare features, ratings, user reviews, pricing, and more from Cub Cyber competitors and alternatives in order to make an informed decision for your business.
-
1
StandardFusion
StandardFusion
A GRC solution for technology-focused SMB and Enterprise Information Security teams. StandardFusion eliminates spreadsheet pain by using a single system of record. Identify, assess, treat, track and report on risks with confidence. Turn audit-based activities into a standardized process. Conduct audits with certainty and direct access to evidence. Manage compliance to multiple standards; ISO, SOC, NIST, HIPAA, GDPR, PCI-DSS, FedRAMP and more. Manage vendor and 3rd party risk, and security questionnaires easily in one place. StandardFusion is a Cloud-Based SaaS or on-premise GRC platform designed to make InfoSec compliance simple, approachable and scalable. Connect what your organization does, with what your organization needs to do.Starting Price: $1800 per month -
2
FileCloud
FileCloud
FileCloud is a hyper-secure EFSS (enterprise file sync and share) platform that provides industry leading compliance, data governance, data leak protection, data retention and digital rights management capabilities. Workflow automation and granular control of content sharing across most enterprise platforms are fully integrated into the complete EFSS stack. FileCloud is a leader in content governance and collaboration for unstructured data, trusted and used worldwide across Global 1000 enterprises, educational institutions, government organizations, and service providers. Granular control of content sharing is fully integrated into the stack through comprehensive audit logs and access permissions, and the Compliance Center helps with regulations like GDPR, HIPAA, and NIST 800-171 (among others). FileCloud also provides Zero Trust File Sharing® an industry first innovation that allows users to share sensitive data via an encrypted zip file that cannot be accessed by unauthorized userStarting Price: $6.00/month/user -
3
ControlMap
ControlMap
Is cybersecurity compliance taking too much time and becoming an ever-growing challenge to manage? Do you need a cybersecurity audit done to win a deal? If yes, then you are at the right place. Controlmap helps companies of all sizes easily and quickly achieve SOC 2, ISO-27001, NIST, CSA STAR, or other Infosec certifications. ControlMap's cybersecurity compliance platform cuts manual grunt work by up to 80% by automating evidence collection, eliminating spreadsheets, and making manual follow-ups obsolete. With Risks, Controls, Policies, and Evidence continuously connected to the right people in your company in a single platform, you know you can sleep well. ControlMap continuously does the heavy lifting of compliance work for you, freeing you to do what your business needs. It follows up on scheduled tasks, automatically collects Evidence from the cloud, reminds employees to fulfill their compliance duties such as reading and acknowledging policies. To learn more, contact us.Starting Price: $0 -
4
CimTrak Integrity Suite
Cimcor
Securing your enterprise against internal and external threats is key to meeting compliance standards and regulations. CimTrak’s change management, auditing, and reporting capabilities allow private and public companies to meet or exceed even the most rigorous compliance mandates. From PCI, SOX, HIPAA, CIS, NIST, and many more, CimTrak has you covered. File and System Integrity monitoring helps protect your critical files from changes, whether malicious or accidental, that can take down your critical IT infrastructure, threaten critical data, or cause non-compliance with regulations such as PCI. Change is inevitable in the IT environment. CimTrak delivers integrity monitoring, proactive incident response, change control, and auditing capabilities in one easy to use and cost-effective file integrity monitoring tool. -
5
Etactics CMMC Compliance Suite
Etactics
Preparing for the Cybersecurity Maturity Model Certification (CMMC) assessment is a considerable investment from both time and money perspectives. Organizations handling Controlled Unclassified Information (CUI) within the defense industrial base should expect to have an authorized CMMC 3rd Party Assessment Organization (C3PAO) certify their implementation of NIST SP 800-171 security requirements. Assessors will evaluate how the contractor implements each of the 320 objectives across all applicable assets within the scope, including people, facilities, and technologies. The assessment process is expected to involve a review of artifacts, interviews of key personnel, and tests of the technical, administrative, and physical controls. As organizations prepare their body of evidence, they should establish a relationship between the artifacts, the security requirement objectives, and assets within scope. -
6
ComplyUp
ComplyUp
Easy enough for the self-reliant small business, and powerful enough for the compliance professional. NIST 800-171 contains 110 requirements. Assess your organization to determine where you stand. This is often referred to as a gap analysis or a readiness assessment. Create your system security plan (a formal document describing how you satisfy the 110 requirements) and POA&Ms (remediation plans for the requirements you don't satisfy). Address the requirements you don't satisfy by changing configurations, deploying solutions, or updating your company policies. Keep an eye on your organization, and update your documentation periodically to accurately reflect your security posture. We take security as seriously as you do. Your assessment data is auto-encrypted, keystroke-by-keystroke, with a unique encryption key you generate before it's sent to our servers. ComplyUp can help get you compliant while you still run your business as usual.Starting Price: $1,800 per year -
7
CyberCompass
CyberCompass
We build Information Security, Privacy, and Compliance Programs to improve your cyber resilience – saving you and your organization time and money. CyberCompass is a cyber risk management consulting and software firm. We navigate organizations through the complexity of cybersecurity and compliance at half the cost of full-time employees. We design, create, implement, and maintain information security and compliance programs. We provide consulting services and a cloud-based GRC workflow automation platform to save our clients over 65% of the time to become and remain cybersecure and compliant. We provide expertise and support for the following standards and regulations – CCPA/ CPRA, CIS-18, CMMC 2.0, CPA, CTDPA, FTC Safeguards Rule, GDPR, GLBA, HIPAA, ISO-27001, NIST SP 800-171, NY DFS Reg 500, Singapore PDPA, SOC 2, TCPA, TPN, UCPA, VCDPA. We also provide third-party risk management within the CyberCompass platform.Starting Price: $5000/year -
8
Cybrance
Cybrance
Protect your company with Cybrance's Risk Management platform. Seamlessly oversee your cyber security and regulatory compliance programs, manage risk, and track controls. Collaborate with stakeholders in real-time and get the job done quickly and efficiently. With Cybrance, you can effortlessly create custom risk assessments in compliance with global frameworks such as NIST CSF, 800-171, ISO 27001/2, HIPAA, CIS v.8, CMMC, CAN-CIOSC 104, ISAME Cyber Essentials, and more. Say goodbye to tedious spreadsheets. Cybrance provides surveys for effortless collaboration, evidence storage and policy management. Stay on top of your assessment requirements and generate structured Plans of Action and Milestones to track your progress. Don't risk cyber attacks or non-compliance. Choose Cybrance for simple, effective, and secure Risk Management.Starting Price: $199/month -
9
RealCISO
RealCISO
Take the hassle out of managing cyber risk and compliance. Assess, report and remediate your security gaps in days, not months, so you can focus your time and money on core business initiatives. RealCISO assessments are based on common compliance frameworks including SOC2, NIST Cybersecurity Framework (CSF), NIST 800-171, HIPAA Security Rule, & the Critical Security Controls. You’ll answer straightforward questions about the people, processes and technologies in your organization, and get actionable instruction on current vulnerabilities, along with recommendations on tools that can resolve them. Every organization wants a stronger security posture, but rarely is it clear how to do so. Technology is rapidly changing. Best practices are evolving. Industry standards are shifting. Without a trusted guide, reducing cyber risk while maintaining compliance can be a constant uphill battle.Starting Price: $49.99 per month -
10
Cuick Trac
Cuick Trac
With Cuick Trac, your organization can meet the technical practices of NIST SP 800-171, in as few as 14 days, making the implementation and management of the administrative and physical requirements much easier to accomplish, as CMMC 2.0 continues to evolve. Chockful of scoping diagrams, team exercises, questions to ask, and much more, our ebook is your guide to all things CUI. Take your team through the steps of identifying sensitive information using our sample business process flow to follow the data. Learn how to identify information as CUI, CTI, or CDI using our determination workflow. -
11
RegScale
RegScale
Shift left security with compliance as code. End audit fatigue by automating every phase of your control lifecycle. RegScale’s CCM platform delivers always-on readiness and self-updating paperwork. Integrate compliance as code into the CI/CD pipelines, speed certification, reduce costs, and future-proof your security posture with our cloud-native solution. Determine where to get started on your CCM journey and move your risk and compliance program into the fast lane. Integrate compliance as code to generate outsized ROI and rapid time-to-value in 20% of the time and money of legacy GRC tools. The fastest way to FedRAMP with automated generation of artifacts, simplified assessments, and industry-leading support for compliance as code with NIST OSCAL. With dozens of integrations with leading scanners, cloud hyper-scalers, and ITIL tools, we provide plug-and-play automation for evidence collection and remediation workflows. -
12
TechIDManager
Ruffian Software
Are you implementing MFA everywhere but sharing admin accounts among your techs? If you are, you have not implemented MFA with fidelity. All modern security frameworks are clear that 1:1 is what account access should look like. Most MSPs have some sort of solution in place that ultimately puts the tech to client access outside of those parameters. TechIDManager creates and manages the accounts and credentials of your techs across all of your domains and networks - in a fashion that is more efficient, more secure, and more cost effective than any other platform on the market. Features Helps you become security framework compliant (NIST, CMMC, CIS, HIPAA, PCI.) Eliminates the need to share admin accounts (meeting modern security framework requirements like NIST 800-171 3.3.2 and many others) Automatic creation and disabling of accounts; right and permissions management Downtime tolerant Inject your unique credentials into client access points with minimal effortStarting Price: $200/month/100 licenses -
13
SISA RA
SISA Information Security
Soaring cyber-attacks emphasize the need for organizations to look forward and see what is coming ahead. A formal Risk Assessment helps entities to disclose vulnerabilities and build a robust security architecture. While assessing risks is highly recommended for organizations to gain insights into the evolving cyber threats, automated risk assessment tools simplify the job for businesses. With the right Risk Assessment tool, organizations can save 70 – 80% of efforts to conduct risk-related activities and concentrate on critical tasks. SISA being a PCI Risk and Compliance expert for more than a decade, identified the challenges faced by organizations in anticipating risks and built SISA Risk Assessor, an intuitive Risk Assessment solution. SISA’s Risk Assessor is the first PCI Risk Assessment tool in the market, built based on world-renowned security methodologies, including NIST, OCTAVE, ISO 27001, and PCI DSS risk assessment guidelines. -
14
Clearity
Clearity
Clearity.io is a security compliance management application that provides covered entities, business associates, and their partners the ability to measure their security program by conducting self-assessments, managing corrective action plans, and working towards industry-driven compliance while viewing real-time data on our dashboard. Does your risk and compliance intelligence come from pages and pages of paper-based reports? How much time do you spend manually creating or combing through spreadsheets and PDFs from 3rd party vendors? If this is your organization, it’s time to automate that process. Clearity gives you the ability to feel in control of your security risks and to know what work needs to be completed. As you head down that road, visually see your risks diminish over time. Create your own HIPAA, HIPAA (Vendors), CSC, NIST CSF, or NIST 800-53 Security Assessments. Work on them on your own time.Starting Price: $199 per month -
15
Capture2Proposal
Capture2
Capture2Proposal is the leading GovCon business development, sales intelligence and capture lifecycle management platform. Identify and target opportunities as early as 36 months before the solicitation date giving you the runway needed to shape the deal. C2P’s machine-learning model analyzes your pipeline and feedback to suggest relevant federal procurement opportunities to consider. Easily create custom data fields to align C2P to your business development and capture processes and pipeline reporting needs. Contacts library and activity tracking ensures your winning process is repeatable and lessons learned are readily available. Integrated proposal scheduling, task and document management simplify data calls and streamline proposal planning and development. Invite, assign roles, and manage your proposal teams’ access to C2P’s DFARS/NIST SP 800-171 compliant proposal repository with ease. -
16
MailRoute
MailRoute
Stop Ransomware, spam and phishing, other viruses and threats for SMB, Enterprise, Healthcare, and Government agencies and contractors. API-level integration for Microsoft Office 365 & GCC High, Google Workplace, other email hosts and all servers. MailRoute stops email-instigated attacks on your information and hardware, with cost-effective, multi-layered protection. We offer CMMC, NIST 800-171, HIPAA, DFARS compliant and DISA accepted email security services. No single point of failure. Wholly owned solution includes geo-distributed datacenters with redundant network feeds, power sources and cooling, for 99.999% uptime. MailRoute prevents forgeries and email spoofing by identifying malicious messages with email authentication tools through assisted and managed DNS changes. Continually managed and updated email-network security stops cybercrime and threats like downtime, ensuring cost-predictability and reliability.Starting Price: $2 per user per month -
17
SafeLogic
SafeLogic
Do you need FIPS 140 validation or FIPS 140 certification for your technology to enter new government markets? Get a NIST certificate in just two months and make sure it remains active over time with SafeLogic's FIPS 140 simplified solutions. Whether you need FIPS 140, Common Criteria, FedRAMP, StateRAMP, CMMC 2.0, or DoD APL, SafeLogic helps you maximize your public sector business. Companies selling technology that performs encryption to the federal government must obtain NIST certification per its FIPS 140 regulation that confirms their cryptography has been tested and approved for use by government agencies. FIPS 140 validation has been so successful, that it has been adopted as mandatory by several additional security regulations including FedRAMP, StateRAMP, CMMC v2, Common Criteria, and DoD APL. -
18
Accellion
Accellion
The Accellion secure content communication platform prevents data breaches and compliance violations from third party cyber risk. CIOs and CISOs rely on the Accellion platform for complete visibility, compliance and control over the communication of IP, PII, PHI, and other sensitive content across all third-party communication channels, including email, file sharing, mobile, enterprise apps, web portals, SFTP, and automated inter-business workflows. When users click the Accellion button, they know it’s the safe, secure way to share sensitive information with the outside world. With on-premise, private cloud, hybrid and FedRAMP deployment options, the Accellion platform provides the security and governance CISOs need to protect their organizations, mitigate risk, and adhere to rigorous compliance regulations such as NIST 800-171, HIPAA, SOX, GDPR, GLBA, FISMA, and others. Accellion solutions have protected more than 25 million end users at more than 3,000 companies.Starting Price: $15.00/month/user -
19
Intellicta
TechDemocracy
Intellicta, TechDemocracy’s brain child, is the first of its kind to deliver a holistic assessment of an entity’s cybersecurity, compliance, risk and governance. It is a singular product capable of predicting potential financial liabilities caused by threats posed by vulnerabilities in cyberspace. Intellicta empowers senior, non-technical business decision-makers to understand, evaluate and measure the effectiveness of their existing cybersecurity, governance, risk, and compliance programs. The platform can be customized to meet every company's unique business requirement. It leverages quantifiable metrics based on established models from ISM3, NIST, and ISO, among others to provide solutions. Intellicta boasts of open-source architecture that aggregates and analyzes every facet of an enterprise’s unique ecosystem, so that it can be integrated and monitored continuously. It can extract critical data from cloud-based, on-premises and third-party systems. -
20
IBM Guardium Quantum Safe, delivered on the IBM Guardium Data Security Center, monitors, uncovers, and prioritizes cryptographic vulnerabilities to help protect your data from both conventional and quantum-enabled risks. As quantum computing advances, traditional encryption algorithms that would take centuries to break using conventional computers may be cracked within hours, potentially leaving all sensitive information secured by today's encryption standards vulnerable. IBM, a leader in the quantum-safe space, developed two recently published NIST post-quantum cryptographic standards in collaboration with industry partners. Guardium Quantum Safe provides comprehensive, consolidated visibility into your organization’s cryptographic posture, vulnerabilities, and remediation progress. Users can define and run policies based on internal security policies and external regulations, integrating with enterprise issue-tracking tools to accelerate compliance.
-
21
securityprogram.io
Jemurai
Excellent security for small companies. Easily build a standard and audit-ready cybersecurity program. We want to make excellent security accessible to smaller organizations, and help them build legitimate security programs so they can win deals. Perfect for startups, you're already sprinting. Leverage a tool and a team that can keep pace with you. Document templates and built-in training allow you to make pragmatic improvements that improve security and demonstrate alignment to standards that customers trust. Your security program begins with reviewing and adopting security policies. We built the simplest possible policies that adhere to NIST 800-53 standards. We mapped the standards so that you'll know you're covered. We cross-reference our program activities to other standards including SOC 2, ISO 27001, NIST CSF, CIS 20, and CMMC to make sure you get credit for the work you do with customers and your management team.Starting Price: $99 one-time payment -
22
DORA 360
Gieom
DORA 360 is a scalable, modular SaaS platform tailored for financial institutions to build, integrate, and demonstrate operational resilience. It connects business processes with policies, risk controls, IT systems, third parties, incidents, and related data, offering a unified solution for evidencing regulatory compliance across Europe. Specifically designed to support compliance with the Digital Operational Resilience Act (DORA), DORA 360 also extends its capabilities to meet other international ICT standards, such as NIST and ITIL, ensuring streamlined and comprehensive compliance management. Magpie AI is the regulatory intelligence engine behind DORA 360, designed to streamline DORA compliance. Harnessing the power of generative AI, Magpie AI provides instant answers to all your DORA-related queries. It delivers real-time regulatory updates, predictive compliance insights, automated gap analysis, and continuous monitoring to keep your compliance status up-to-date. -
23
comaea
comaea
Discover the capability and competency of your employees. Competency assessor presents a true 180 and 360 approach to employee assessment. Self-assessment is made by individuals which then allows line managers to moderate and validate their scores. Create plans, goals and actions to fill competency gaps and evaluate and capture feedback from employees, line managers and independent assessors. Engage with employees through dialog using a structured and consistent approach. At the heart of a competence-led approach is being able to analyze and interrogate the data and use it to make decisions. Gain valuable insights into employee capability, competency and compliance by team, by role, by project and holistically across the organization. -
24
SandboxAQ
SandboxAQ
The emergence of large, fault-tolerant quantum computers poses a significant threat to current public-key cryptography, leaving sensitive data and systems vulnerable to attacks. SandboxAQ was selected by the NIST's National Cybersecurity Center of Excellence for its Migration to Post-Quantum Cryptography project, which partners with industry to help the government develop best practices to transition from current public-key cryptography to post-quantum cryptography algorithms. Easily adhere to new cryptographic requirements and switch between them without requiring additional development or maintenance. Application Analyzer detects and records all calls to cryptographic libraries made by an application at run time, identifying vulnerabilities and policy breaches. -
25
ResponseHub
ResponseHub
ResponseHub is a cloud-based, AI-powered platform designed to help B2B companies efficiently complete and manage security questionnaires. Customers upload their existing security documentation, such as policies, procedures, architectural diagrams, and certifications—into a centralized knowledge base. ResponseHub ingests, indexes, and structures this material using a combination of document parsing, semantic search, and AI models. The platform can also include pre-defined security control frameworks (e.g. NIST-aligned controls) to provide consistent coverage where customer documentation is incomplete.Starting Price: $50 per month -
26
Quantum Firewall Software R82
Check Point
New AI innovations prevent millions of new zero-day attacks, accelerate security for DevOps, and increase data center operational simplicity and scale. Quantum Firewall Software R82 provides uncompromising security and operational simplicity for Quantum on-premises and CloudGuard Network firewalls. AI-powered, adaptive threat prevention for novel and encrypted threats. Dynamic tools to accommodate rapidly changing environments. Automatically keep up with business growth & unpredictable traffic spikes. NIST-certified encryption to protect against quantum computing hacking. Find hidden relationships and traffic patterns to prevent novel malicious campaigns and brand impersonation. Increases the effectiveness of website categorization to make the most of your security policies. R82 delivers powerful new protection from the most evasive phishing, malware, and DNS attacks, even in encrypted traffic. -
27
Inkrypt AI
Inkrypt AI
Inkrypt.ai is an enterprise-grade cryptographic security and key management platform designed to deliver automated encryption, post-quantum readiness, and centralized cryptographic governance for modern software systems. The platform enables organizations to integrate encryption and key management directly into applications through generated SDKs while maintaining full operational visibility and compliance readiness. Inkrypt.ai provides end-to-end encryption across the data lifecycle, including key generation, secure storage, rotation, and access control. Its hybrid cryptographic architecture aligns with NIST post-quantum cryptography guidance, allowing enterprises to prepare for future quantum threats without disrupting existing systems. The platform includes a web-based administration and analytics console, real-time telemetry pipelines, centralized audit logging, and policy-driven access controls. Automated key rotation, zero-downtime cryptographic operations, and real-time se -
28
QSE
QSE Group
QSE Group delivers quantum-resilient cybersecurity solutions designed to protect sensitive data from both current and future threats, including quantum computing. Using post-quantum cryptographic algorithms aligned with NIST standards, QSE secures data through encryption, key management, and secure communications. Built with an API-first design, it integrates easily into existing cloud, on-prem, or hybrid environments. Core features include secure entropy generation, zero trust policy enforcement, and compatibility with identity systems and SIEM tools. QSE also supports white-label deployment for SaaS vendors and MSPs. With real-time monitoring, compliance-ready reporting, and applications across finance, healthcare, legal, and government sectors, QSE enables future-proof protection without disrupting current infrastructure. It's a practical, scalable solution for organizations serious about long-term data security.Starting Price: $19.90/month -
29
ControlCase
ControlCase
Almost every business has to comply with multiple information security related standards and regulations. IT compliance audits are complicated, expensive, and full of challenges. These can include but are not limited to PCI DSS, ISO 27001, GDPR, HIPAA, HITRUST, FISMA, NIST 800-53, MARS-E, BITS FISAP. Managing these audits individually poses a number of challenges for a business; including repetition of efforts, managing multiple audit firms, increased costs, complexity and time. While standards such as PCI DSS, ISO and SOC provide a benchmark for protecting data, criminals are always on the hunt for security vulnerabilities and malware to exploit organizations. The ControlCase Data Security Rating is focused exclusively on understanding your environment and providing solutions that seamlessly integrate security and go beyond just compliance. -
30
compliance.sh
compliance.sh
Built for startups, scale-ups and enterprises. don't let compliance slow you down. Our platform enables you to get compliant with any framework quicker than its ever been possible. Close deals faster with our AI security questionnaire automation. Our AI generates all of the answers based on your documentation and policies. Use AI to generate any policies you need for all of the common frameworks like ISO 27001, SOC 2 Type II, HIPAA, NIST and GDPR. Use the power of AI to respond to any questionnaire, in any format - all based on your policies and documentation. Use AI to generate any policy you need for any compliance framework with our generative artificial intelligence. Add any associated risks to your risk register, remediate, update and report on each risk under one roof. -
31
Cm3
Cm3 Contractor Management
Online Contractor Compliance Management solution developed by Experts in Workplace Safety and Risk Management. Cm3’s contractor safety, compliance management and prequalification solution is unique in its employment of experienced Assessors who are qualified to make careful judgements about contractor risk and liability. Dramatically decrease the time required to onboard your contractors by inviting them to join Cm3. From your client dashboard, set your compliance requirements around minimum insurances, licences, and known risks based on your contractors’ scope of work. Easily find and engage new businesses from Cm3’s centralised system of existing contractors that meet your compliance requirements and have completed their assessment. -
32
KCM GRC Platform
KnowBe4
You have challenging compliance requirements, not enough time to get audits done, and keeping up with risk assessments is a continuous problem. The KCM GRC platform helps you get audits done in half the time, is easy to use, and is surprisingly affordable. Reduce the time you need to satisfy requirements to meet compliance goals with pre-built requirements templates for the most widely used regulations. Save time when you manage distribution of policies and track attestation through campaigns. Simplify risk initiatives with an easy-to-use wizard with risk workflow based on the well-recognized NIST 800-30. Easily prequalify, assess, and conduct remediation to continually monitor and keep track of your vendors’ risk requirements. KCM effectively reduces the time you need to satisfy all of the requirements necessary to meet risk and compliance goals. Spend significantly less time and money when dealing with your compliance and audit initiatives. -
33
Jombay
Jombay
Designing & Administering an Assessment center could be complex Introducing Jombay’s Assessment Center Technology Platform! We have single dashboard for the assessment taker to access all these tools. We have integrated Assessor dashboards to rate candidates real-time. Assessors can choose associated Smart-text as a reference to populate the report and add their observations. Our platform publishes Analytics dashboard around group development areas. Seamless integration with tools from different Personality & Cognitive Assessment providers. Configure the competencies you want to measure. Select the assessment templates. Upload your assessment content (case studies, role plays etc.) Integrate any personality or cognitive assessment of your choice. Send out the links of the assessment taker dashboard to the candidate. Use the video technology platform and assessor dashboard to evaluate role plays, interviews and case studies -
34
FastTrackGov
FastTrackGov
We are a specialized software developer focused on the public sector. Drive efficiency, boost resident satisfaction, and manage your finances with our easy-to-implement, secure software. Streamline your licensing, permitting, code enforcement, and much more with this easy-to-use, web-based software. Collect all of your property information and view it from anywhere with FastTrackGov’s property management software. Managing the permitting process can be difficult and time-consuming for even the most experienced staff members. With FastTrackGov’s Construction Permitting solution, you can manage every step efficiently with automated workflows. Boost your planning productivity by storing all property and land use information in a centralized database that fully integrates with your Tax Assessor’s office. Streamline your permitting process and process applications online with Contractor Connect. -
35
SECTARA
SECTARA
SECTARA™ (Security Threat And Risk Assessor) was created for security consultants and corporate security managers frustrated with the lack of advanced security risk assessment (specific) software and tools. Performing risk assessments using MS Office products, in particular, can be a tedious process, plagued by styling / formatting problems, layout selection and the routine need for reverse engineering to assure logic throughout. Such methods are not particularly collaborative, present data security concerns and often drift beyond the bounds of recommended security standards and their assessment methodologies (because we are all human). Moreover, enterprise risk systems are necessarily generic and security risk consultant’s needs are very specific. It’s also difficult to get IT and expenditure approval for internally hosted systems, especially ones that are not part of ‘core’ business. SECTARA™ was developed in response to those problems, providing a security risk assessment. -
36
CompliancePoint OnePoint
CompliancePoint
CompliancePoint's OnePoint™ technology solution helps organizations practically and powerfully operationalize critical privacy, security and compliance activities within one simple interface. Use OnePoint™ to improve visibility and manage risk while reducing the cost, time and effort required to prepare for audits. Today, most organizations are required to follow at least one, but more often many, regulations. In addition to legal requirements, many organizations also juggle responsibilities related to industry standards or best practices. This can be daunting and time consuming. OnePoint™ enables organizations to implement a unified approach to complying with numerous standards and programs such as HIPAA, PCI, SSAE 16, FISMA, NIST, ISO, cyber security framework, GDPR, and more. Do you struggle to achieve critical privacy, security and compliance tasks on an ongoing basis? OnePoint™ provides organizations with the right tools and support that go beyond a "point in time" evaluation. -
37
Lexis Quantum Portal
LexisNexis
The Lexis Quantum Database already has thousands of high-quality quantum cases for you to search when valuing your cases. However, it’s important we act now to ensure you continue to have a wide pool of up-to-date representative cases to help best serve your clients now and in the future. We’ve designed the Lexis Quantum Portal to make submitting cases, particularly bulk submissions, easy, secure and GDPR compliant. By submitting your quantum cases through the Lexis Quantum Portal you can have a hand in increasing the availability of cases whilst helping ensure the database remains representative. The more cases we can add to our quantum databases the better you can serve your clients. The majority of quantum data is in the case management systems of insurance companies, personal injury and clinical negligence firms like yours. -
38
Cybersecurity risks are present due to hackers, wayward or careless employees, bad configuration settings, and even failing hardware. Misdiagnosing these risks often results in an expensive loss of data, so it's important to take stock of what's happening across your environment. Here's how Powertech Risk Assessor for IBM i helps to assess and mitigate cybersecurity risks. Powertech Risk Assessor for IBM i gathers detailed security data and compares your system settings to best practices in minutes. The simple, automated process saves system administrators from spending days preparing reports and makes the audit process more efficient. Government and industry security mandates, including PCI DSS and HIPAA, require annual assessments of security risks. Powertech Risk Assessor for IBM i is an independent, third-party assessment that enables you to meet these requirements.
-
39
Quantum Project Manager
Quantum Software Solutions
The Quantum Project Manager Suite is simple to use and easy to implement. But it’s a high-powered, serious contractor’s tool. Simple, integrated, flexible construction software. The Quantum Project Manager Suite was engineered to manage and track all of your project needs with ease. With Quantum Project Manager, you can produce estimates and bid proposals for a project, track subcontracts/POs and change orders, generate progress billing payment applications, print certified payroll reports, track your equipment usage and expenses and create and track all of your communications along the way—all with one simple, easy-to-use tool. And while the Quantum Project Manager programs are designed to work together, each program can be used independently. They even integrate with QuickBooks®. -
40
D-Wave
D-Wave
Our singular focus is to help customers achieve real value by using quantum computing for practical business applications. You may be surprised to learn that our enterprise customers have already built hundreds of quantum applications across many industries. The powerful combination of the Advantage™ quantum system and the Leap™ hybrid solver services enable the first in-production quantum applications demonstrating business benefit. D-Wave is the practical quantum computing company delivering real business value for manufacturing, supply chain and logistics, scheduling, and mobility applications today. Quantum computing is already helping to optimize many key parts of the value chain in Industry 4.0. -
41
Rigetti Quantum Cloud Services (QCS)
Rigetti Computing
We make it possible for everyone to think bigger, create faster, and see further. By infusing AI and machine learning, our quantum solutions give you the power to solve the world’s most important and pressing problems. Thermodynamics sparked the Industrial revolution. Electromagnetism ushered in the information age, now, quantum computers are harnessing the unique information processing capability of quantum mechanics to exponentially reduce the time and energy needed for high-impact computing. With the first paradigm-shifting advance since the integrated circuit, quantum computing is poised to transform every global market. The gap between first movers and fast followers will be difficult to overcome. -
42
Apptega
Apptega
Simplify cybersecurity and compliance with the platform that’s highest rated by customers. Join thousands of CISOs, CIOs, and IT professionals who are dramatically reducing the cost and burden of managing cybersecurity and compliance audits. Learn how you can save time and money, have great cybersecurity, and grow your business with Apptega. Go beyond one-time compliance. Assess and remediate within a living program. Confidently report with one click. Quickly complete questionnaire-based assessments and use Autoscoring to pinpoint gaps. Keep your customers’ data safe in the cloud and out of the hands of cybercriminals. Ensure your compliance with the European Union's official privacy regulation. Prepare for the new CMMC certification process to maintain your government contracts. Enjoy Enterprise-class capabilities paired with consumer app. Quickly connect your entire ecosystem with Apptega’s pre-built connectors and open API. -
43
HIPAA Survival Guide
HIPAA Survival Guide
Perform a NIST-based Risk Assessment in 3 hours or less... our competitors say it is snake oil and that it can't be done. Of course, that's what they would say...we can prove there's no snake oil...just good 'ole fashioned American ingenuity and disruptive innovation. Our Subscription Plan is a 360-degree comprehensive, systematic, transformative, and coherent HIPAA analysis and remediation offering. In addition to Expresso®, the Risk Assessment Express, our Subscription Plan comes bundled with dozens of products and the high-touch consultative services required to complete your Risk Assessment and Remediation initiatives. It’s “Compliance in a Box” and what one of our customers aptly described as "an embarrassment of riches." Ours is an enterprise-ready offering at a price point accessible to the masses of healthcare providers and their business associates. We combine years of legal, compliance, business, and technology experience into world-class products that you can trust. -
44
Risk Warden
Risk Warden
Risk Warden dramatically mitigates potential human error for risk owners and risk assessors, optimizes consistency and gives you the power of a real-time overview of your company’s assets. As a risk assessor, revolutionize the way you conduct Risk Assessments and future-proof your business by using a paperless, cloud-based risk assessment platform. Perform on-site assessments quickly, efficiently, and accurately using our structured and systematic approach. As a risk owner go digital! Our bespoke property management software makes the process of assessing and managing your risk and compliance easier than ever. Our highly secure, cloud-based, digital solution is highly scalable and can be configured to meet all your Risk Management needs. Everything you need to digitize the risk assessment lifecycle within your business and attract bigger customers. Everything you need to bring your property compliance under control. Govern, track and action every aspect of your compliance lifecycle.Starting Price: £9 per month -
45
SalaryExpert
ERI Economic Research Institute
Find out how you can retain top talent using reliable compensation data. Utilize our compensation information to help determine how much you should be paid. Our compensation planning data, powered by ERI’s Assessor Platform gives compensation and HR professionals access to global salary data from all over the world. Find the right salary information to help your company stay competitive in the market and hire the right candidates. With thousands of job titles (including executive pay) and cost of living and compensation information from around the world, we are here to meet your compensation planning needs. Benchmark market rates for base salary, incentives, and total cash based on location, industry, and size. Customize those compensation rates based on experience, revenue/assets, skills, education, and certifications. Our salary survey data offers you access to curated datasets, innovative analyses, robust databases, and frequent job audits. -
46
Smart Banner Hub
Smart Banner Hub
Transform text, drawings, and photos into mathematical animations. Create animated banners for LinkedIn, YouTube, Instagram, Facebook, Medium, GitHub, Substack, and Twitter. Five creative products: ▪️ Signature Studio – post-quantum protected email signatures with NIST-approved cryptography (ML-DSA, FIPS 204) ▪️ Typography Studio Pro – animated typography for banners and email signatures ▪️ Portrait Studio – transform photos into self-sketching DBSCAN animations ▪️ Doodle Animation Studio – convert freehand drawings into mathematical animations ▪️ Video E-cards – animated greeting cards for birthdays, holidays, and special occasions Powered by Clustrolin™, the world's first DBSCAN Creative Engine.Starting Price: $2.99 -
47
Q-CTRL
Q-CTRL
Infrastructure software to power the quantum future. Quantum technology promises to transform the economy. We expand the utility of quantum computers and deliver new quantum sensing capabilities, all through software. Quantum infrastructure software transforms bare-metal quantum processors into useful computational tools. Our technology unleashes the hidden performance inside of the most powerful computers so you can achieve more. Add automation and performance management to my QC platform. Professional-grade toolkits to design, automate, and scale quantum hardware and controls. Unleash latent hardware performance with fully integrated performance management for cloud quantum computing platforms. Automatically reduce error and boost algorithmic success on cloud-accessible quantum computers. Professional-grade toolkits to design, automate, and scale quantum hardware and controls. -
48
Amazon Braket
Amazon
Easily work with different types of quantum computers and circuit simulators using a consistent set of development tools. Build quantum projects on a trusted cloud with simple pricing and management controls for both quantum and classical workloads. Run hybrid quantum-classical algorithms faster with priority access to quantum computers and no classical infrastructure to manage. Reserve dedicated device access and engage directly with quantum computing specialists using Braket Direct. Accelerate scientific discovery with tools for algorithm development and support from the AWS Cloud Credit for Research Program. Push the boundaries of quantum hardware research with easy access to superconducting, trapped ion, and neutral atom devices. Bring software for quantum computing to market rapidly with Amazon Braket’s software development kit, simple pricing, and workflow management.Starting Price: $0.08000 per month -
49
Cloud 15
FCS-live
Fire Risk Assessment and Compliance Software providing live reporting, multi-site overview and management. The software allows organisations to easily manage their compliance risks online by creating a structured process that ensures each property is legally compliant and safe. Write reports in real time and better manage your risk by using FCS Cloud compliance software. Our online Fire Risk Assessment system is carried out on the cloud 15 platform and has specifically designed to make this process as easy as possible for the assessor. The unique software provides a practical jargon-free risk management system that identifies hazards and risks, reduces the likelihood of harm or injury, and fulfils responsibilities. Our online legionella risk assessment system is carried out on the cloud 15 platform and has specifically designed to make this process as easy as possible for the assessor. -
50
ERS Data System
Branagh Information Group
Software to conduct and automatically score assessments. The ERS Data System provides the information and tools that you need to conduct and accurately score assessments. Whether your focus is providing technical assistance or conducting high-stakes assessments, the ERS Data System can save you time and improve the quality of your assessment process. The ERS Data System is integrated with the most current notes for clarification directly from the authors, supplemental materials such as USDA meal guidelines, playground safety standards, and best practice information (handwashing, sanitizing, diapering procedures). The assessor’s handwritten notes are captured in worksheets, collecting information that is necessary to properly score each item. Justification notes at the indicator level, handwritten during the assessment, are then converted into text for reporting. Reports can be created at the classroom, facility, and organization levels.Starting Price: $317.50 per month