Alternatives to Gutsy

Compare Gutsy alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Gutsy in 2024. Compare features, ratings, user reviews, pricing, and more from Gutsy competitors and alternatives in order to make an informed decision for your business.

  • 1
    Finite State

    Finite State

    Finite State

    Finite State manages risk across the software supply chain with comprehensive SCA and SBOMs for the connected world. By providing end-to-end SBOM solutions, Finite State enables Product Security teams to meet regulatory, customer, and security demands. Finite State's best-in-class binary SCA creates visibility into any-party software that enables Product Security teams to understand their risk in context and shift right on vulnerability detection. With visibility, scalability, and speed, Finite State correlates data from all of your security tools into a single pane of glass for maximum visibility.
  • 2
    Minit

    Minit

    Microsoft

    Uncover opportunities for continuous process improvement and higher operational efficiency by transforming the way you analyze, monitor, and optimize processes. We help businesses uncover opportunities for continuous process improvement and higher operational efficiency. We believe that every organization can achieve digital transformation and operational excellence. That's why we are on a mission to create a world where every process is easily and automatically analyzed and improved. Via our solution, we are encouraging everyone to explore the benefits of the Process Mining technology for their organization. You don't need to be a data or process expert to be able to do this. We have built our solution for every user who is eager to understand their processes, empowering them to make data-driven decisions from day one.
  • 3
    ARIS Process Mining
    Get a 360-degree view of your supply chain, customer service, IoT, or any other business. ARIS Process Mining lets you understand your process data and their dependencies to find patterns, anomalies and opportunities for improvement. Explore the process mining basics, learning how to compare designed processes to as-is processes, seeing if they execute as planned and make changes before they impact your bottom line. Simulate and analyze process optimization scenarios to determine the best path to improvement. Mine your data for process optimization and discover how your business really operates. Use these insights to check for variations and to examine your processes as designed. Analyze your process KPIs and automatically identify the patterns that influence them via AI. Use analyses to discover weaknesses and resolve deviations.
  • 4
    Worksoft Certify
    Achieve Better Business Outcomes with 360-Degree Process Insights to Inform and Scale Automated Testing and extend automation for maximum value. Known by leading global enterprises as the "gold standard" for automated testing, Worksoft is a long-time leader in driving innovation for automation. Together with our customers, we’ve recognized an evolution of automation with a natural convergence of test automation, process discovery and intelligence, and RPA. Worksoft is the only automation software provider delivering a single platform that spans these functions to deliver unprecedented capabilities to understand and de-risk complex business processes, gain insights on how to maximize automation ROI, and track ongoing process optimization results. Worksoft Certify allows you to easily create, maintain, share, and consume automated end-to-end business process tests as part of continuous testing, integration, and delivery cycles.
  • 5
    Mimica

    Mimica

    Mimica

    Mimica sits on the employee’s computer and observes the work directly for 1-2 weeks. It analyzes the data, categorizes the work into processes and highlights the best candidates for automation. The output is an interactive procedure design document (PDD) that contains high-level complexity metrics and a low-level process map of all recorded variations and exceptions. Miner discovers the most automatable parts of a team’s work. It sits on an employee’s computer for 1 week and automatically categorizes their tasks into named processes. Miner cuts through the noise to tell you how much time is spent in each process, and how automatable it is, focusing your process automation efforts and maximizing ROI. Record all applications used in your process, including Citrix and Mainframe. Automatically discover the best opportunities for automation with no manual effort. Data security and privacy are paramount; all data is anonymized and retained on-premise.
  • 6
    Magnitude Angles
    Empower your business to answer the questions that matter most with self-service operational analytics and ready-to-run business reports across core processes. What if there was a way to really understand what’s going on in your organization? A way to not only report on events, but to react in real time to insights surfaced from deep within your supply chain, finance, manufacturing and distribution processes? Change the way you respond to the ever-shifting business landscape. Magnitude Angles helps you uncover insights previously locked deep in your SAP or Oracle ERP system and streamlines the data analysis process. Traditional BI tools understand rows, tables, and columns, but they have no concept of materials, orders, or cash. Angles is built on top of a context-aware, process-rich business data model that translates complex ERP data architectures into self-service business analytics, putting data closer to decision and helping turn data into insight, and insight into action.
  • 7
    FortressIQ

    FortressIQ

    Automation Anywhere

    FortressIQ enables enterprises to decode work, transform experiences, and enhance workflows with the industry’s most advanced process intelligence platform. Using innovative computer vision and artificial intelligence, FortressIQ delivers unprecedented process insights, extremely fast, and with detail and accuracy unattainable with traditional methods. The platform autonomously acquires process data at scale even as processes extend across systems, empowering enterprises to understand, monitor, and improve operations, employee and customer experiences, and every business process. FortressIQ was founded in 2017, and is backed by Lightspeed Venture Partners, Boldstart Ventures, Comcast Ventures, Eniac Ventures, M12 and Tiger Global. Pinpoint inefficiencies and process variations continuously and automatically to reveal optimal process paths and reduce time to automation.
  • 8
    BitSight

    BitSight

    BitSight

    Make data-driven decisions to reduce cyber risk with the world's leading security ratings platform. BitSight offers the most widely adopted Security Ratings solution with a mission to change the way the world addresses cyber risk. BitSight provides data-driven, dynamic measurements of an organization’s cybersecurity performance: derived from objective, verifiable information, material and validated measurements, created by a trusted, independent organization. BitSight for Security Performance Management helps security and risk leaders take a risk-based, outcome-driven approach to managing the performance of their organization’s cybersecurity program through broad measurement, continuous monitoring, and detailed planning and forecasting in an effort to measurably reduce cyber risk. Have the confidence to make faster, more strategic cyber risk management decisions.
  • 9
    Haystax

    Haystax

    Haystax Technology

    Our platform analytically monitors threats and prioritizes risk — enabling leaders and operators to act with confidence when it matters most. Instead of starting with a massive pool of data and then mining it for usable threat intelligence, we first build a system for transforming human expertise into models that can evaluate complex security problems. With further analytics we can then automatically score the highest-priority threat signals and rapidly deliver them to the right people at the right time. We have also built a tightly integrated ‘ecosystem’ of web and mobile apps to enable our users to manage their critical assets and incident responses. The result is our on-premises or cloud-based Haystax Analytics Platform for early threat detection, situational awareness and information sharing. Read on to learn more!
  • 10
    RiskRecon

    RiskRecon

    RiskRecon

    Automated risk assessments tuned to match your risk appetite. Get the intimate risk performance assessments you need to efficiently manage your third-party risk. RiskRecon’s deep transparency and risk contextualized insights enable you to understand the risk performance of each vendor. RiskRecon’s workflow enables you to easily engage your vendors to realize good risk outcomes. RiskRecon knows a lot about your systems. Know what RiskRecon knows. Get continuous objective visibility of your entire internet risk surface, spanning managed, shadow and forgotten IT. RiskRecon knows a lot about your systems. Know what RiskRecon knows. Get continuous objective visibility of your entire internet risk surface, spanning managed, shadow and forgotten IT. See the intimate details of every system, the detailed IT profile and security configuration. We’ll even show you the data types at risk in every system. RiskRecon’s asset attribution is independently certified to 99.1% accuracy.
  • 11
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 12
    QAD Process Intelligence
    Your organization’s efficiency, agility, and resilience goals can only be met by having visibility into your actual processes and where they can be improved. QAD Process Intelligence, formerly Livejourney, combines leading-edge process mining with industry best practices to enable radical and actionable business transparency: - Monitor processes around-the-clock and receive deviation alerts without adding headcount - Eliminate the inefficiencies inherent to processes designed around assumption-based models - Predict continuous improvement outcomes with greater confidence - Ensure relevant results around real business processes through out-of-the-box use cases
  • 13
    Paxray

    Paxray

    Paxray

    Paxray, is a hybrid platform combining process and task mining functionality with no integration headaches (as required by traditional process mining solutions) and all on-premise or in a client's private cloud, alleviating security concerns when sensitive data is handled. All data is processed and analyzed on site. Accurately identify business process improvements, automation potential, check compliance, check software license overspends, automatically create workflow and RPA documentation, time factoring, case ID tracking. Automatic detection of all current live workflows Extensive anonymization rules
    Starting Price: $10,000
  • 14
    LANA Process Mining
    Discover the possibilities of the best Process Mining tool for your processes. LANA maps processes as they actually occur. And as you have never seen them before. The target/actual comparison automatically shows critical deviations in the process flow. Thanks to Machine Learning, LANA not only finds deviations, but also their causes. All relevant data at a glance, flexible dashboards allow precise control of processes. LANA Process Mining builds a complete process model from your process data in a matter of seconds. Here you can see not only how and in how many variants your processes are actually executed in daily business. The intuitive visualization also draws your attention directly to critical values: bottlenecks, high processing times and long idle times. Whether you upload your own target model of your process or have LANA simply create a new one, the tool automatically detects all discernible process deviations by comparing the target and actual states.
  • 15
    Logpickr Process Explorer 360
    Logpickr Process Explorer 360 makes use of digital footprints left behind your Information System. Are they in conformance with your forecasts? You will be able to check. Wondering why are some deliveries longer than others? With Logpickr Process Explorer 360, you will quickly identify key factors influencing your processes. Understand the customer journey and estimate waiting times? Having a view on the customer journey, and your internal processes, is possible with the prediction algorithms of Logpickr Process Explorer 360. Logpickr Process Explorer 360 is intended for all business analysts, and does not require expert knowledge of data science or Process Mining. You can easily navigate through the tool to understand and answer your questions. Logpickr Process Explorer 360 brings you all the answers on your processes, by simply exploiting your operational data. Logpickr Process Explorer 360 reveals the actual processes from your existing data.
  • 16
    Soroco Scout
    Soroco Scout is a powerful process discovery and task mining tool developed by Soroco. It helps organizations understand how their teams work by analyzing digital interactions across multiple platforms. Scout gathers detailed insights into the workflows and patterns of daily tasks, revealing inefficiencies and bottlenecks in business processes. Using AI and machine learning, it provides data-driven recommendations to optimize operations, streamline workflows, and improve productivity. Soroco Scout empowers companies to make more informed decisions by mapping out how work is truly done, offering a comprehensive view of employee activity and areas for potential automation. This leads to more efficient processes and cost savings across the organization.
  • 17
    Bloomfilter

    Bloomfilter

    Bloomfilter

    The first step to improving a process is to understand it. Bloomfilter uses process mining to analyze time-series data from your entire stack and build a model of your team's unique software development process – and then helps you optimize it. Visualize cost breakdown between build, run, and maintain. While software development is both an art and a science, data-driven teams ship more often and innovate faster. Translate sprints and points into dollars and cents. Understand where your process breaks down, and get best practices on how to improve it. Increase predictability when scoping work and estimating when new features will ship. Get objective analysis on your development process in a language everyone understands.
  • 18
    Celonis

    Celonis

    Celonis

    Celonis turns business processes into extraordinary experiences. Discover how your processes really run. Use your digital footprint to understand the root causes of process deviations and inefficiency. Enhance processes with AI-powered tools. Intelligent recommended actions allow every employee to remove process friction. Monitor process improvement over time. Track, measure, and celebrate process transformation business impact. Celonis has one very simple goal: to analyze today’s processes to make tomorrow’s world more efficient. We are dedicated to pursuing this vision with passion and purposefulness. In our opinion, any company can achieve great things, regardless of its size, industry, or history. Celonis process mining is the new standard in Big Data Analytics designed to help companies around the world save valuable time and money through improved process transparency and efficiency. We hope you will join us on this journey.
  • 19
    KYP.ai

    KYP.ai

    KYP.ai

    KYP.ai fills every data gap in your organization by capturing and identifying how processes, tasks, and the human elements of your workforce can achieve peak efficiency with sustainable outcomes. The KYP.ai platform enhances enterprise efficiency by capturing and analyzing operational data. Enterprise-grade AI identifies the most effective ways to improve, streamline, or automate work, helping organizations prioritize digital transformation at scale. Real-time data is continuously collected and transformed into actionable insights that support decision-making and long-term strategies using leading AI. Use KYP.ai to calculate your business case in a few clicks. Help build successful transformation across the entire organization by continuously mining your data for valuable business cases. Access personalized dashboards that give teams and individuals precise, clutter-free insights. Interactive intelligence pinpoints high-impact areas for business growth and success.
  • 20
    Worksoft Process Intelligence
    Gain unprecedented insights designed to power your process optimization with 360-degree views of your automated process mining, discovery, and documentation data. That's the goal of enterprises everywhere. Automation is one viable solution. Yet to take full advantage of strategies like robotic process automation, you must understand what to automate and when. Process Intelligence from Worksoft delivers unprecedented insights by combining data from process discovery, test automation, and multiple other sources to provide a holistic view of your processes, plus actionable insights to determine strategic next steps. Worksoft's Process Intelligence delivers real-world insights so you can seize the benefits of process automation at speed and scale. The Worksoft Process Intelligence dashboard uses artificial intelligence and machine learning to bring together multi-source, multi-variant data, offering a 360-degree view of your end-to-end processes.
  • 21
    UiPath

    UiPath

    UiPath

    Become a fully automated enterprise™ with the UiPath Platform. A fully automated enterprise is a digitally transformed enterprise. Create business resilience, speed, and agility, and unburden people from mundane work with the automation platform that has it all. Use the data from your business applications (like ERP and CRM) to give you a detailed understanding of complex business processes. You’ll know what to automate and how to do it best—and be able to prove impact, too. UiPath is an innovative Robotic Process Automation (RPA) and process mining enterprise platform that empowers organizations to efficiently automate business processes, helping companies become digital businesses faster and gain a valuable advantage on their path to AI. Scalable, extensible, and sustainable, UiPath lets users design their own workflows visually--no scripting or coding required. The platform also features full auditing capabilities, advanced analytical reporting, and customizable dashboards.
    Leader badge
    Starting Price: $3990.00/year/user
  • 22
    MySmartAutomation

    MySmartAutomation

    MySmartAutomation

    Process mining is the art of automatically mapping processes to understand where we can gain in efficiency. Automation is the art of creating virtual assistants that handle low value-added tasks. Data visualization is the art of turning data into insights comprehensible by everyone. Through machine learning and artificial intelligence, we can use your data to predict and to extract insights. Our technology can digitalize files to extract relevant information and automatically integrate it to your information systems. Financial services are turning to automation for one reason, they are overwhelmed. With numerous steps, it is easy to forget operations, make errors and to lose time. We can automatically generate structured and coherent reports with neural language generation. A report that required 3 days of work can now be created in 30 minutes.
  • 23
    QPR Cloud

    QPR Cloud

    QPR Software

    QPR Cloud provides solutions as a service for Process Mining, Enterprise Architecture, Business Process Management, Performance Management & Quality Management. QPR has chosen Amazon Web Services (AWS) as the cloud computing platform for delivering QPR solutions as a service to our Customers. AWS is the world’s most comprehensive and broadly adopted cloud platform, offering over 175 fully featured services from data centers globally. AWS is architected to be the most flexible and secure cloud computing environment available today. AWS core infrastructure is built to satisfy the security requirements for the military, global banks, and other high-sensitivity organizations. This is backed by a deep set of cloud security tools, with 230 security, compliance, and governance services and features. AWS supports 90 security standards and compliance certifications.
    Starting Price: $15000.00/one-time
  • 24
    Datricks

    Datricks

    Datricks

    Finances are the pulse of enterprises, yet their integrity is exposed to human errors, non-compliance, and fraud. Datricks eliminate these vulnerabilities, transforming your business from a state of exposure into a beacon of financial integrity. Today, employees are facing more pressure than ever to meet financial targets in an environment of surging complexity, creating more exposure for your business. Honest mistakes happen all the time. Without needing any input, Datricks automatically and continuously analyzes your financial processes in order to understand your business context. Problems and anomalies are identified across all business transactions and analyzed by our AI in the context of their financial processes in real-time. Finance leaders get a comprehensive control tower to understand the overall financial health of their organizations, see the issues that matter, and achieve peak performance.
  • 25
    Inverbis

    Inverbis

    Inverbis

    Take a peek at what is really going on in your company without the stress of a complex project. It doesn’t matter how many systems and data sources your processes traverse, with data virtualization and our partnership with Denodo, we can follow them from start to finish. With our flexible APIs and our connectors, you can be up and running in no time. User-friendly interface, pre-built filters, and an easy-to-learn query language let you focus on what’s important: the processes, not the tool. Discover how your processes behave. Start with the most frequent execution and expand your view to incorporate all variants. Choose how many variants you want to aggregate and display frequencies and duration metrics. You will have unprecedented insights into the actual performance of your process model. Identify outliers and extreme variants in the blink of an eye thanks to the contextual information panel and you will soon be discovering the secret life of the firm.
    Starting Price: €500 per month
  • 26
    Panaseer

    Panaseer

    Panaseer

    Panaseer’s continuous controls monitoring platform sits above the tools and controls within your organisation. It provides automated, trusted insight into the security and risk posture of the organisation. We create an inventory of all entities across your organisation (devices, apps, people, accounts, databases). The inventory highlights assets missing from different sources and where security controls are missing from assets. The platform equips you with metrics and measures to understand your security and compliance status at any level. The platform ingests data from any source in the cloud or on-premises, across security, IT and business domains through out-of-the-box data connectors. It uses entity resolution to clean, normalise, aggregate, de-duplicate and correlate this data, creating a continuous feed of unified asset and controls insights across devices, applications, people, databases and accounts.
  • 27
    SecurityScorecard

    SecurityScorecard

    SecurityScorecard

    SecurityScorecard has been recognized as a leader in cybersecurity risk ratings. Download now to see the new cybersecurity risk rating landscape. Understand the principles, methodologies, and processes behind how our cybersecurity ratings work. Download the data sheet to learn more about our security ratings. Claim, improve, and monitor your scorecard for free. Understand your vulnerabilities and make a plan to improve over time. Get started with a free account and suggested improvements. Gain a holistic view of any organization's cybersecurity posture with security ratings. Leverage security ratings for a variety of use cases, including risk and compliance monitoring, M&A due diligence, cyber insurance underwriting, data enrichment, and executive-level reporting.
  • 28
    Templarbit

    Templarbit

    Templarbit

    Monitor and defend Apps with data-driven security. Templarbit is redefining runtime security by building it from the ground up to be cloud native and powered by data intelligence. This modern, data-driven approach allows you to secure APIs and Web Apps faster and more effectively. Templarbit Sonar provides you with blazing fast security monitoring that delivers insights into the availability, performance, and security configuration of websites, APIs, and Web Applications. It's a beautiful and fast way to establish continuous security monitoring on your apps, enabling you to measure everything out of the box without having to install any packages, agents, or libraries. Sonar covers a wide range of checks that every software company should have in place including uptime, response time, and a deep scan of your security configuration.
    Starting Price: $99 per month
  • 29
    Apiiro

    Apiiro

    Apiiro

    Complete risk visibility with every change, from design to code to cloud. Industry-first Code Risk Platform™ A 360° view of security & compliance risks across applications, infrastructure, developers’ knowledge & business impact. Data-driven decisions are better decisions. Understand your security & compliance risks with a real-time inventory of apps & infra code behavior, devs knowledge, 3rd-party security alerts & business impact. From design to code to cloud. Security architects don’t have time to review every change & investigate every alert. Make the most of their expertise by analyzing context across developers, code & cloud to identify risky material changes & automatically build an actionable workplan. No one likes manual risk questionnaires, security & compliance reviews - they’re tedious, inaccurate & not synced with the code. When the code is the design, we must do better - trigger contextual & automatic workflows.
  • 30
    Cymptom

    Cymptom

    Cymptom

    Continuously monitor and measure the risk of attack paths. Prioritize their urgency level to know exactly where you need to focus. Quantify future risk to get the resources you need to succeed. Agent-less deployment, up-and-running in minutes. Cymptom helps security teams quantify risk across all on-prem or cloud-based networks without installing agents or running attacks. Automate the priority assessment of your cybersecurity risks by verifying the viability of all attack paths in your network. Continuously reduce your internal attack surface. The growing complexity of relying on both IT networks and cloud-based systems has made visibility a challenge. Fortunately, Cymptom delivers a consolidated view of your security posture to require only one tool to understand your most urgent mitigation needs. Identify attack paths without agents or simulations. Map attack paths to the MITRE ATT&CK® Framework to be scored & prioritized for urgent mitigation.
  • 31
    process.science

    process.science

    process.science

    Process mining is the digital way to combine business data analysis and process optimization. Whenever an activity takes place in the company, it is assigned to a unique process instance, the 'Cases'. All relevant transaction data of this process are saved in log files by the ERP system - the 'event logs'. A minimal event log consists of the following three information. If this information is available, you can start right away. The case identifier links all events of a concrete business case to a unique sequence. The activity name describes which process step was executed. The timestamp describes at what time a certain activity took place. Process mining links the data of Case ID, Activity and Timestamp to a process flow in the correct sequence and visualizes them in a corresponding path with evaluable information on process efficiency. The possibilities of process analysis are almost unlimited and only depend on the data that is fed to the process mining software.
  • 32
    IBM Process Mining
    IBM Process Mining enables organizations to identify the business processes that may benefit most from automation by using business system data to create and visualize an end-to-end process to uncover derivations, bottlenecks, and inefficiencies that are hidden in business processes. IBM Process Mining provides users an objective view to analyze business processes, identify areas to focus automation initiatives and create what-if scenarios on prioritizing automation projects. As a foundational capability of IBM Cloud Paks for Automation, IBM Process Mining finds the best process candidates for automation, calculates expected ROI, and shows the impact of automation initiatives on the entire process before implementation. Apply data analysis patterns to discovered processes, visually verifying metrics like frequency, duration, cost, compliance and conformance with advanced data visualizations on custom drag-and-drop dashboards.
  • 33
    ServiceNow Process Mining
    Optimize business processes. Uncover trends and patterns using in-platform process mining. Get deep insight into processes to understand the root cause of how and why issues occur. View and analyze team performance across your organization and improve workgroup results. Streamline work by uncovering and removing redundant tasks and bottlenecks in business processes. Drive service excellence with an easy visual map for mining real-time process performance. Uncover hidden inefficiencies with the push of a button using process data. See a visual representation of process flows to identify bottlenecks and make improvements quickly. Optimize processes fast with AI-powered analysis to detect undesired process behavior. Establish greater regulatory compliance by proactively identifying process deviations and anomalies.
  • 34
    Workfellow

    Workfellow

    Workfellow

    Workfellow is AI-powered process intelligence software. It's unique Work API combines elements of process mining and task mining providing up to 10x faster insights and detailed opportunities for improving workflows, processes and operational efficiency. Key features: - End-to-end process visibility - automated process discovery and insights across all tasks, processes and key workflows. - No data integration hassle - Workfellow creates unified event logs based on business objects in any software applications. - Privacy-first task analysis - GDPR-free solution built in the European Union with enterprise-grade data privacy. - Faster speed to insight - utilize ready-made dashboards and fast implementation typically within 30 days.
  • 35
    Automation Hero

    Automation Hero

    Automation Hero

    Automation Hero's end-to-end platform takes a democratized, bottom-up approach to intelligent automation. With a no-code GUI, users can easily build automations ranging from mundane and manual works tasks and complex business processes, adding in AI at any point without relying on data scientists or IT. The platform includes Hero_Sonar for process mining, Hero_Go for screen scraping, AI Studio to upload or build/train AI models and Flow Studio to build automation flows (with optional AI models) and Robin, Automation Hero’s personal automation assistant, for human-in-the-loop integration. Robin also serves as a feedback loop to improve AI models. Automation Hero is available on-premise or in the cloud. Pricing is consumption-based and includes built-in orchestration.
    Starting Price: $6 per node
  • 36
    PragmaDev Process
    PragmaDev Process is a simple and powerful tool that aims at helping business process modelers to verify their models. Complex organizations or systems operations are based on processes described in graphical models. The most popular notation is BPMN (Business Process Model and Notation). It describes what the different participants in a process do and how they interact with each other. These processes must be thoroughly discussed before they are applied in a real situation. Any misunderstanding of the process might lead to a catastrophic situation in operation. Based on BPMN standard semantic, the modeler can execute the process step by step. The tool will outline the possible choices at each step of execution. There is no possible human interpretation leading to misunderstanding. PragmaDev Process is a BPMN editor, executor, and verifier. It is the outcome of a 2 years research project with the French Army, Eurocontrol, and Airbus DS.
    Starting Price: €90 per month
  • 37
    ProcessLenz

    ProcessLenz

    ProcessLenz

    Companies are having a hard time identifying the processes to automate for digital transformation. ProcessLenz is a cloud software that provides decision makers visibility and collaboration on ROI and project complexity to quickly pick the right processes to automate. ProcessLenz gives you a single-click overview of your RPA lifecycle and is the ideal starting point for all automation projects. To understand the strengths and weaknesses of your CoE, perform a detailed assessment. With full transparency about the complexity of automation and expectations for ROI, you can track your projects from conception to completion. To help you find the right candidate for your automation journey, use our taxonomy which includes thousands of processes that have been enhanced with NLP. ProcessLenz helps you optimize your automation budget. Choose the right process based on complexity and ROI.
  • 38
    ABBYY Timeline
    ABBYY Timeline is a Process Intelligence platform that allows businesses to use the information contained within their systems to create a visual model of their processes, analyze them in real time to identify bottlenecks, and predict future outcomes to facilitate decision-making of technology investments. The vast majority of process execution today is tracked, managed, and performed through any number of IT systems of record. That means you already have a record of just about every aspect of any of your processes. You just need the right tool to recreate an end-to-end view of process execution. Traditional business intelligence tools, dashboards, and reports can’t create this for you. ABBYY Timeline can. When properly ingested, merged, and analyzed, this wealth of data can be used to discover patterns and insights that illuminate paths to better customer experiences and new operational efficiencies.
    Starting Price: $1000 per month
  • 39
    Atlas Play
    Businesses too often have offline systems that fail to reflect what really happens in their company. Using intelligent business process management (iBPM), Atlas Play moves beyond just mapping business processes and enables mapping processes that can learn, grow and ultimately adapt to companies’ development and future goals. Data is key and with Atlas Play, data leads decision making. The processes created in Atlas Play can collect, analyse and utilise data. This enables mapped processes to intelligently improve themselves as they’re run, highlighting areas for attention and minimising wasted time and resources. Atlas Play enables a holistic understanding and control of business roles and responsibilities. Within Atlas Play business roles can be assigned to the right people and the responsibility for completing tasks within mapped processes can be assigned intelligently. Deadlines can be met, priorities understood, and tasks carried out when they should be.
    Starting Price: €45 per user
  • 40
    Skan

    Skan

    Skan

    Skan is a cognitive technology startup redefining business process discovery to empower large enterprises to uncover, untangle & unleash their business processes. Skan’s offering accelerates and optimizes intelligent automation, digital transformation, and helps define the future of work. Skan’s unique approach leverages computer vision, deep learning & machine intelligence to observe, learn, assemble, and optimize business processes without intrusion or integration. The output in the form of a process metamodel & digital process twins makes it a breeze to model, simulate, and measure the future state in a sandbox. Skan’s founding team is a blend of entrepreneurs, technologists, data scientists & AI experts – all well versed in the challenges and opportunities at large enterprises with complex business and IT landscapes. The genesis of Skan is rooted in the practical experience of our founders while working on automation and transformation projects for Fortune 500 companies
  • 41
    Microsoft Power Automate
    Be more productive. Automatically. Take productivity to new heights by automating business processes across your entire organization. Discover a better way to get things done. Improve individual, team, and organizational effectiveness by combining Digital Process Automation (DPA), Robotic Process Automation (RPA), and Artificial Intelligence (AI). Build time-saving workflows into everything from individual tasks to large-scale systems with seamless integration using hundreds of prebuilt connectors. Enable everyone to build secure workflows with a no-code guided experience and cloud-based data loss prevention, identity, and access management services. Automate time-consuming manual tasks with built-in AI capabilities, giving you more time to focus on strategic, high-value opportunities. Start automating common business processes immediately with thousands of prebuilt templates.
    Starting Price: $15 per user/month
  • 42
    Brinqa

    Brinqa

    Brinqa

    Present a complete and accurate picture of your IT and security ecosystem with Brinqa Cyber Risk Graph. Deliver actionable insights, intelligent tickets, and timely notifications to all your stakeholders. Protect every attack surface with solutions that evolve with your business. Build a stable, robust, and dynamic cybersecurity foundation that supports and enables true digital transformation. Experience the power of Brinqa Risk Platform with a free trial - discover unparalleled risk visibility and improved security posture within minutes. The Cyber Risk Graph is a real-time representation of an organization’s infrastructure and apps, delineation of interconnects between assets and to business services, and the knowledge source for organizational cyber risk.
  • 43
    Centraleyezer
    Integrates and correlates vulnerability scanners data and multiple exploit feeds combined with business and IT factors and to prioritize cyber security risks. Helps CISO, Red Teams and Vulnerability Assessment Teams reduce time-to-fix, prioritize and report risks. Used by Governments, Military, Banking, Finance, and E-Commerce companies
    Starting Price: $599 per month
  • 44
    ASPIA

    ASPIA

    ASPIA

    To offer intelligent security and vulnerability management, ASPIA's security orchestration automation comprises data collection, alerting, reporting, and ticketing. ASPIA can help you improve enterprise security by providing a comprehensive picture of security status. ASPIA reduces time-consuming human data processing by combining asset information and vulnerability data from scanning technologies. ASPIA consolidates assets, correlates vulnerabilities, and deduplicates data, lowering the cost of risk management and giving meaningful insights into your organization's security posture. Users may assess, prioritize, and administer corporate security controls using ASPIA's management dashboard. The platform gives near-real-time information regarding the security state of an organization.
    Starting Price: $0
  • 45
    Celerium

    Celerium

    Celerium

    In use by thousands of security professionals across industries and governments, Celerium solutions are changing the way we manage cyber threats. As a community, we need to sift through the quagmire of data to find relevant intelligence. We need to use that intelligence proactively to defend our networks and organizations and make our communities safer. And we need to help each other prioritize the volume of activity to understand the hierarchy of threat actors. With Celerium’s Cyber Defense Network, private and public organizations are proactive about cyber defense, faster to respond to threats and smarter about their response. In order to defend against threats, we must first know what's important. Together we can identify important threats, automate our reaction to those threats and proactively keep our networks and industries safer. Celerium provides a variety of solutions that empower our customers to take a proactive, aggressive stance on cyber security.
  • 46
    BowTieXP

    BowTieXP

    A-RisC

    BowTieXP is a next generation risk assessment tool that uses the Bowtie Method to assess risks. BowTieXP is unique in its ability to visualise complex risks in a way that is understandable. The power of a BowTieXP diagram is that it gives you an overview of multiple plausible scenarios, in a single picture. In short, it provides a simple, visual explanation of a risk that would be much more difficult to explain otherwise. Where the power of BowTie is that is very easy to understand for everybody, from top management to shop floor, developing a good BowTie is a completely different story. It requires a good knowledge of the BowTie concept, an understanding of the guidelines and how to apply them and a good overview of the subject that is being assessed.
  • 47
    OneTrust GRC & Security Assurance Cloud
    Scale your risk and security functions so you can operate through challenges with confidence. The global threat landscape continues to evolve each day, bringing new and unexpected risks to people and organizations. The OneTrust GRC and Security Assurance Cloud brings resiliency to your organization and supply chain in the face of continuous cyber threats, global crises, and more – so you can operate with confidence. Manage increasingly complex regulations, security frameworks, and compliance needs with a unified platform for prioritizing and managing risk. Gain regulatory intelligence and manage first- or third-party risk based on your chosen methodology. Centralize policy development with embedded business intelligence and collaboration capabilities. Automate evidence collection and manage GRC tasks across the business with ease.
  • 48
    Axio

    Axio

    Axio

    The only platform that rapidly aligns security initiatives to address risks that matter and actually protect the business. Analyze the unique risks to your business and calculate how individual scenarios would impact the bottom line. Plan for the cyber threats that will have the largest financial impact across your organization. Get actionable results fast with transparent pre-built calculations. Facilitate meaningful communication without training in statistical analysis methods. Continuously model how security decisions will impact business strategy. Improve your cybersecurity program’s posture in a single dashboard. Assessments can be completed 70% faster so you can spend more time addressing priorities on your roadmap. Cybersecurity risk assessments readily available (NIST CSF, C2M2, CIS20, CMMC, and Ransomware Preparedness) with the option to custom configure your own mode.
  • 49
    FortifyData

    FortifyData

    FortifyData

    FortifyData uses non-intrusive active assessments to assess both your external and internal infrastructure, including considerations to security and compliance controls implemented. Fully manage your cyber rating and the factors affecting your risk profile using FortifyData, ensuring your risk rating is accurate-free of misattributions and false positives. You need the freedom to customize what is most important to you for each risk factor so you can measure what really matters. This results in a more accurate rating. Assess all aspects of risks within an organization’s security posture, including external and internal systems, policies and compliance. One-size-fits-all security ratings are neither accurate nor meaningful; Tune your risk profile to accurately represent your risk level. Manage and mitigate first- or third-party risks efficiently through integrated task management and FortifyData partner services.
  • 50
    Tenable

    Tenable

    Tenable

    Tenable’s Cyber Exposure Platform gives you all the insight, research and data you need to uncover weaknesses across your entire attack surface. See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk and aligning business goals with security initiatives. Products include: - Tenable.ep - Tenable.io - Tenable.sc - Tenable.ad - Tenable.ot - Tenable Lumin