Alternatives to Perimeter

Compare Perimeter alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Perimeter in 2026. Compare features, ratings, user reviews, pricing, and more from Perimeter competitors and alternatives in order to make an informed decision for your business.

  • 1
    Intelex

    Intelex

    Intelex Technologies

    Intelex is an integrated software solution for managing Environmental, Health, Safety and Quality (EHSQ) programs. Intelex’s scalable platform is designed to store, manage and analyze EHS and Quality data in one place. The solution works on any device to meet the realities of your workplace. With Intelex, your organization can: - Drive better results in your EHSQ program by monitoring workflows to achieve top performance and gain control. - Identify trends and tendencies by setting goals to gain greater insight into your EHSQ program to enhance judgement. - Reduce incidents and administrative work by easily monitoring, managing, optimizing and drawing insights from your safety data with our user-friendly safety software solution. - Streamline air, water and waste emissions management and reporting, and track and manage environmental outputs to achieve sustainability goals. - Drive continuous quality improvement activities across multiple departments, sites or locations.
    Leader badge
    Partner badge
    Compare vs. Perimeter View Software
    Visit Website
  • 2
    D&B Risk Analytics

    D&B Risk Analytics

    Dun & Bradstreet

    Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
    Compare vs. Perimeter View Software
    Visit Website
  • 3
    StandardFusion

    StandardFusion

    StandardFusion

    A GRC solution for technology-focused SMB and Enterprise Information Security teams. StandardFusion eliminates spreadsheet pain by using a single system of record. Identify, assess, treat, track and report on risks with confidence. Turn audit-based activities into a standardized process. Conduct audits with certainty and direct access to evidence. Manage compliance to multiple standards; ISO, SOC, NIST, HIPAA, GDPR, PCI-DSS, FedRAMP and more. Manage vendor and 3rd party risk, and security questionnaires easily in one place. StandardFusion is a Cloud-Based SaaS or on-premise GRC platform designed to make InfoSec compliance simple, approachable and scalable. Connect what your organization does, with what your organization needs to do.
    Starting Price: $1800 per month
  • 4
    Netwrix Auditor
    Netwrix Auditor is an IT audit software solution designed to provide visibility into user activity and system changes across IT environments. It helps organizations track who is accessing data, what actions are being taken, and when those actions occur. The platform monitors systems such as Active Directory, file servers, Microsoft 365, databases, and network devices. It provides real-time alerts to notify teams of suspicious activity or potential security risks. Netwrix Auditor also helps identify excessive permissions and other vulnerabilities that could lead to data breaches. The solution includes built-in reports that support compliance with standards like HIPAA, PCI, and SOX. It simplifies audit processes by automating data collection and reporting tasks. By centralizing audit data, it helps organizations improve security and respond to incidents faster.
  • 5
    Scrut Automation

    Scrut Automation

    Scrut Automation

    Scrut is an AI-powered GRC (Governance, Risk, and Compliance) platform designed to help organizations manage security and compliance programs more effectively. It provides real-time visibility into risks across cloud infrastructure, applications, employees, and third-party vendors. The platform automates tasks such as control monitoring, evidence collection, and audit preparation to reduce manual effort. Scrut includes pre-built compliance frameworks and templates to simplify implementation and accelerate readiness. Its AI-driven features guide users through remediation, risk assessments, and compliance processes. The system also integrates with existing tools to streamline workflows and improve efficiency. Overall, Scrut enables businesses to build stronger, scalable, and security-first compliance programs.
  • 6
    Resilinc

    Resilinc

    Resilinc

    Resilinc is a leading supply chain risk management platform that uses agentic AI to monitor, detect, and solve supply chain risks proactively. It helps companies safeguard their operations and balance sheets by providing real-time visibility and actionable insights across multi-tier supplier networks. Resilinc’s AI agents continuously scan for disruptions, enabling rapid response and mitigation before issues escalate. The platform serves Fortune 500 companies and federal agencies, offering comprehensive risk mapping and event monitoring. Key products include the Agentic AI Suite, Multi-Tier Mapping, RiskShield, and EventWatch. Trusted by industry leaders such as Nvidia, IBM, and Honeywell, Resilinc empowers organizations to gain a competitive advantage by protecting their supply chains.
    Starting Price: $1,400 per month
  • 7
    RiskRecon

    RiskRecon

    RiskRecon

    Automated risk assessments tuned to match your risk appetite. Get the intimate risk performance assessments you need to efficiently manage your third-party risk. RiskRecon’s deep transparency and risk contextualized insights enable you to understand the risk performance of each vendor. RiskRecon’s workflow enables you to easily engage your vendors to realize good risk outcomes. RiskRecon knows a lot about your systems. Know what RiskRecon knows. Get continuous objective visibility of your entire internet risk surface, spanning managed, shadow and forgotten IT. RiskRecon knows a lot about your systems. Know what RiskRecon knows. Get continuous objective visibility of your entire internet risk surface, spanning managed, shadow and forgotten IT. See the intimate details of every system, the detailed IT profile and security configuration. We’ll even show you the data types at risk in every system. RiskRecon’s asset attribution is independently certified to 99.1% accuracy.
  • 8
    ProcessUnity

    ProcessUnity

    ProcessUnity

    ProcessUnity Vendor Risk Management is a software-as-a-service (SaaS) application that helps companies identify and remediate risks posed by third-party service providers. Combining a powerful vendor services catalog with risk process automation and dynamic reporting, ProcessUnity VRM streamlines third-party risk activities while capturing key supporting documentation that ensures compliance and fulfills regulatory requirements. ProcessUnity VRM provides powerful capabilities that automate tedious tasks and free risk managers to focus on higher-value mitigation strategies. Powerful capabilities for real risk reduction. A proven track record of customer success. Schedule your personalized demo of our award-winning software and start your journey to a more mature, automated program. ProcessUnity Vendor Risk Management protects corporate brands by reducing risk from third parties, vendors and suppliers.
  • 9
    Prevalent

    Prevalent

    Prevalent

    The Prevalent Third-Party Risk Management Platform is a single solution that enables customers to automate the critical tasks required to manage, assess and monitor their third parties across the entire life cycle. The solution combines the following integrated capabilities to ensure third parties are secure and compliant: • Automated onboarding and offboarding • Profiling, tiering and inherent risk scoring • Standardized and custom vendor risk assessments with built-in workflow, task and evidence management • Continuous vendor threat monitoring • A network community of completed standardized assessments and risk intelligence • Compliance and risk reporting • Remediation management The solution is backed by expert professional services to help optimize and mature third-party risk management programs, and managed services to outsource the collection and analysis of vendor assessments.
  • 10
    UpGuard

    UpGuard

    UpGuard

    The new standard in third-party risk and attack surface management. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day. Continuously monitor your vendors, automate security questionnaires, and reduce third and fourth-party risk. Monitor your attack surface, prevent data breaches, discover leaked credentials, and protect customer data. Scale your third-party risk program with UpGuard analysts, and let us monitor your organization and vendors for data leaks. UpGuard builds the most powerful and flexible tools for cybersecurity. Whether you’re looking to prevent third-party data breaches, continuously monitor your vendors, or understand your attack surface, UpGuard’s meticulously designed platform, and unmatched functionality helps you protect your most sensitive data. Hundreds of the world’s most data-conscious companies are scaling faster and more securely.
    Starting Price: $5,249 per year
  • 11
    Proof&Trust

    Proof&Trust

    Proof&Believe LLC

    We’ve dedicated 6 years to crafting the perfect algorithm for vendor risk assessment. This algorithm has been meticulously refined and enhanced with cutting-edge AI technologies, ensuring unparalleled accuracy and efficiency. Vendors provide evidence and answer 32 straightforward questions covering various aspects of their operations, compliance, and security measures. With our user-friendly interface, 95% of vendors complete the assessment in under 30 minutes, minimizing disruption to their operations. Our algorithm thoroughly analyzes vendor-provided evidence and responses, leveraging AI to identify risks, vulnerabilities, and compliance issues. Businesses receive a comprehensive report with actionable insights and recommendations, enabling informed decision-making and proactive risk management.
  • 12
    Rescana

    Rescana

    Rescana

    Successful risk programs rely on accuracy in the process of discovering and managing assets and only then assessing the risks. Rescana's artificial intelligence preforms asset attribution, thereby keeping false positives to a minimum. Rescana's form engine gives you the flexibility you need to conduct your risk surveys. Use and customize our built in forms, or upload your own to make the perfect survey. Infinitely scalable, our army of collector bots scour the deepest corners of the web in search of your assets and data on a daily basis. With Rescana you are always up to date. Integrate into your procurement system, and make sure vendors are classified correctly from the beginning. Rescana's flexible survey will ingest any existing questionnaire, and is feature rich - providing the best experience for you and your vendor. Communicate the vulnerabilities to your vendors with ease, re-certify them quickly with pre filled forms.
    Starting Price: $25 per month
  • 13
    Panorays

    Panorays

    Panorays

    The fastest way to securely do business together. Automating Third Party Security Lifecycle Management. Gain a 360° view of the supplier through a combination of the hacker’s view and internal policy. The hacker’s view tests the posture just like a hacker would evaluate a company. The internal policy ensures that the supplier complies with security policies and practices. The most seamless end-to-end third party security workflow solution. Panorays’ rapid security ratings are based on an “outside-in” simulated hacker’s view of assets, combined with an “inside-out” view that checks that the supplier adheres to your internal company security policies. Panorays’ automated customized security questionnaires include only the questions that are relevant for each supplier, and you can track progress with a click. Choose from a built-in template or create your own.
  • 14
    Vendor360
    Vendor360, CENTRL’s Vendor Risk Management Software, streamlines the entire process of managing the 3rd party risk lifecycle. Through centralized, easy-to-use workflows, and powerful internal and external collaboration capabilities, Vendor360 provides you with the tools and content needed to identify, manage, assess and mitigate third party risks across all stages of your organization’s vendor life-cycle. Advanced and flexible third party risk management platform for aggregating your vendor data, automating your assessments and getting control over your vendor risk management process.
  • 15
    CyberStrong

    CyberStrong

    CyberSaint Security

    CISOs of the Fortune 500 rely on CyberSaint's CyberStrong platform to achieve real-time cyber and IT risk management and continuous compliance from assessment to Boardroom. CyberStrong uses risk quantification, intuitive workflows, and executive reports to build cyber resilience through measurement and improved communication. Patented AI and ML automation eliminate manual effort, saving enterprises millions annually. The platform aligns cyber and business risk for faster, informed decision-making. Enterprises use CyberStrong as a competitive differentiator, mitigating even the most unprecedented risks while automating assessments across frameworks. CyberSaint is a Gartner Cool Vendor for Cyber & IT Risk Management, is named in Gartner's Security Operations, Cyber & IT Risk Management, and Legal & Compliance Hype Cycles, and won numerous awards including 2021 CRN Emerging Vendor, 2021 Cybersecurity Excellence Gold Winner, and 2021 Cyber Defense Magazine Global InfoSec Awards Winner
  • 16
    ShieldRisk

    ShieldRisk

    ShieldRisk AI

    ShieldRisk is an Artificial Intelligent powered platform for third-party vendor risk assessment with speed and accuracy. The platform is a single, unified platform, executing vendor audits on global security & regulatory framework including GDPR, ISO 27001, NIST, HIPAA, COPPA, CCPA, SOC 1, SOC 2. ShieldRisk AI enables the analysis of auditing and advisory functions, involving time savings, faster data analysis, increased levels of accuracy, more in-depth insight into vendor security posture. ShieldRisk, in consistence with global compliance standards, helps the organizations transform cybersecurity programs to enable and provide risk free digital business strategies. We help organizations measure their vendors’ digital resilience, maximize recoveries, and lower their total cost of risk, while providing cybersecurity build-or-buy decisions. Our family of single and dual view platforms are easy to use and provide the clearest, most accurate screening and security analysis.
  • 17
    BitSight

    BitSight

    Bitsight

    Bitsight is a leading Cyber Risk Intelligence platform that helps organizations identify, quantify, and reduce cybersecurity risk across their entire digital ecosystem. Powered by advanced AI and the industry’s largest external cybersecurity dataset, Bitsight delivers real-time visibility into security posture, threat exposure, and attack surface risk. Trusted by more than 3,500 customers worldwide and over 68,000 organizations on its platform, Bitsight enables security teams, risk leaders, and executives to proactively manage cyber risk through continuous security monitoring, third-party risk management (TPRM), vulnerability intelligence, and external attack surface management (EASM). Bitsight uncovers critical security gaps across cloud environments, digital identities, and complex third- and fourth-party vendor ecosystems. Bitsight is a unified cyber risk intelligence platform designed to support compliance, improve security posture, and drive data-informed risk decisions.
  • 18
    Risk Ledger

    Risk Ledger

    Risk Ledger

    The Risk Ledger platform gives clients all the tools they need to run a comprehensive, cyber security-led, third-party risk management programme against their entire supply chain at speed and at scale while making it simple, free and fast for third parties to engage with the process and improve their risk management maturity. Our unique secure network model allows every organisation to both run a third-party risk management programme and respond to client risk assessments, facilitating a network of trust relationships between organisations on the platform. Organisations running a third-party risk management programme on the Risk Ledger platform benefit from: - continuous monitoring of risk controls implemented in their supply chain - visibility beyond third-parties to fourth, fifth and sixth parties - procurement cycles reduced by up to 80% - Increased supplier engagement - low per-supplier costs
  • 19
    TrustElements

    TrustElements

    TrustElements

    TrustElements helps to mitigate risk and prioritize investments. Your cyber resiliency score is defined in a percentage after analyzing all loads of data your company owns. TrustElements maps your results to industry frameworks (NIST, CIS, MITRE) and helps to establish a golden standard of cyber resilience by continuously assessing your organization exposure to risks. The TE platform enhances decision making based on your business context and helps to better allocate financial resources. Communicate cybersecurity strategy to the C-level and Board of Directors to strengthen the decision making in Security, IT, and Risk Management. Whether your challenge is vendor risk management, tight security budgets, overcoming resource obstacles or applying the right level of protection and risk management, we have your back to make your company propel.
  • 20
    SecurityStudio

    SecurityStudio

    SecurityStudio

    Simplify your vendor risk management program to ease the burden on your company and its employees. Standardize the process to easily locate all third and fourth-party vendors and keep track of those that pose a risk to your company. Defend against any risk created by your vendors, and against lawyers, regulators and customers if a breach occurs. Unlike other vendor risk management tools on the market, SecurityStudio doesn’t simply communicate risk. Through an easy-to-use automated workflow, SecurityStudio evaluates all third-party vendors and brings your weakest links to the surface. Then you have the power to accept, avoid or request remediation of each vendor.
  • 21
    SecurityGate.io

    SecurityGate.io

    SecurityGate.io

    Attackers move at the speed of bleeding-edge tech & open-source knowledge. Corporations drag an anchor of legacy GRCs & spreadsheet assessments. SecurityGate.io is the risk management acceleration platform industrial companies use to improve cybersecurity faster. Fast SaaS assessment workflows & reporting automation replace slow, disruptive processes. Blend risk assessments with real-time security data to see where risk is today and forecast where it will be tomorrow. Remediation workflows, supplier risk management, audits, progress tracking & notifications, are all simplified in one place. They have difficulty understanding what’s valuable in the data and what to do next. They often have trouble translating cyber risk into business terms. The risk management activities seem to go on forever, they’re expensive, and it’s difficult to show the ROI. The platform automatically visualizes the data and highlights what’s important, making next-step decisions easier.
  • 22
    Riskpro

    Riskpro

    Riskpro India

    Third party risk management (TPRM) is a structured approach to analyze and control risks arising to the organization from third parties. Mainly third parties are: Vendors Customers Joint ventures Counterparties Fourth Parties Third-party relationships can be a significant source of enterprise risk. The propagation of third-party partners, regulatory pressure, and the complexity of cyber-related risks has led companies to dedicate more time and attention to the potential risks by third parties. They enable companies to be flexible and competitive in a global business environment. These relationships often allow companies to delegate important tasks so that they can focus on their core competencies. With the benefits gained from third parties comes related risks that pose significant threats to a business, such as cyber breaches, business continuity challenges, or reputational damage.
    Starting Price: $750 per year
  • 23
    Z2Data

    Z2Data

    Z2Data

    Get instant access to 1 Billion+ components' data ranging from lifecycle status, lifecycle forecast, regulatory compliance, market availability, cross references and more. Easily upload your Bill of Materials and Approved Vendor Lists to run detailed reports and risk analyses. Exporting data to a variety of formats is simple and you can even automatically integrate with leading PLM tools. Monitor your supply chain instantly by mapping your components to suppliers' manufacturing sites such as FABs, factories and assemblies. Compare location site risk and conduct disaster mitigation planning easily with Z2Data's Risk Scores for supply chain. What-if analysis for supplier sites enable you to prepare for disaster recovery and comply with business continuity goals. Manage supplier selection risk by accessing data on over 20,000+ suppliers.
    Starting Price: Custom Options Available
  • 24
    Kroll Compliance
    Third parties, customers, and partners present legal, reputational, and compliance risks to your organization. The Kroll Compliance Portal arms you with the capabilities to control those risks at scale. Relative risk can dictate the need for a closer look. Emailing back and forth with analysts and downloading and saving files can slow you down, create a gap in the audit trail, and leave you vulnerable to information security risks. Take the due diligence process out of emails and file folders and bring order with the Kroll Compliance Portal. Many compliance programs become time and resource intensive because of manual processes or inflexible software. Put an end to that with the Kroll Compliance Portal’s Workflow Automation. Your business demands efficient third party onboarding. You need an accurate risk assessment. The Kroll Compliance Portal Questionnaire accelerates the onboarding process through automation, tracking and scoring in line with your risk model.
  • 25
    SecurityScorecard

    SecurityScorecard

    SecurityScorecard

    SecurityScorecard has been recognized as a leader in cybersecurity risk ratings. Download now to see the new cybersecurity risk rating landscape. Understand the principles, methodologies, and processes behind how our cybersecurity ratings work. Download the data sheet to learn more about our security ratings. Claim, improve, and monitor your scorecard for free. Understand your vulnerabilities and make a plan to improve over time. Get started with a free account and suggested improvements. Gain a holistic view of any organization's cybersecurity posture with security ratings. Leverage security ratings for a variety of use cases, including risk and compliance monitoring, M&A due diligence, cyber insurance underwriting, data enrichment, and executive-level reporting.
  • 26
    Ostendio

    Ostendio

    Ostendio

    Ostendio is the only integrated security and risk management platform that leverages the strength of your greatest asset. Your people. Ostendio delivers an easy-to-use, cost-effective platform that allows you to assess risk, create and manage critical policies and procedures, educate and empower your people to be secure with security awareness training, and monitor continuous compliance across 250+ security frameworks. With deep customization, advanced intelligence, and flexible controls, you’re always audit-ready, always secure, and always able to take on what’s next. For more information about Ostendio, visit ostendio.com.
  • 27
    DoubleCheck

    DoubleCheck

    DoubleCheck Software

    DoubleCheck Risk Management system is a powerful, cloud-based platform for managing enterprise risks independently or in an integrated governance, compliance, and audit suite. Highly flexible and fully configurable, DoubleCheck’s Enterprise Risk Management software enables all stakeholders to identify, manage, and rate diverse risks that arise from various sources. Some key benefits of DoubleCheck Risk Management system include policy and document management, testing, issue creation, and the ability to carry out risk surveys to establish status. Record, monitor and review vendors or partners that interact with a firm. Vendors and suppliers are critical to your business’s success. It is important that we know everything about them and can also be prepared in case these third parties are not up to expectations or fail to perform, which can have a negative effect on your operations, profitability, and good reputation.
  • 28
    Ncontracts

    Ncontracts

    Ncontracts

    Ncontracts is a leading provider of SaaS-based risk management and compliance solutions financial services companies. Our GRC solutions help more than 4,000 banks, credit unions, mortgage companies, fintechs, and trusts achieve their risk management and compliance goals with a powerful combination of user-friendly, cloud-based software and expert services. Our suite of solutions covers all aspects of enterprise risk management, including vendor management, compliance, lending compliance, business continuity, audit and findings management, company culture alignment, and cybersecurity. Ncontracts was named to the Inc. 5000 fastest-growing private companies in America for the fourth consecutive year in 2022.
  • 29
    Secure Forte

    Secure Forte

    Secure Forte

    Secure Forte is a cyber supply chain risk management platform built to help organizations proactively manage cybersecurity, data privacy, compliance, and ESG (environmental/social/governance) risks across their entire supply chain, from upstream customers, through their own internal operations, down to third- and even fourth-party suppliers. Its “Forte Vendor Risk Management” module helps you identify, profile, assess, and continuously monitor risks tied to suppliers and partners; you can issue assessment questionnaires (or customize them), collect supplier responses, verify evidence for high-impact vendors, and generate detailed assessment reports, management dashboards, and issue-tracking workflows. It goes beyond one-time audits, offering live monitoring of threat intelligence, exposure on the dark web, credit-score changes, ESG ratings, and other risk indicators, which helps you stay informed about evolving supplier vulnerabilities.
  • 30
    Whistic

    Whistic

    Whistic

    The best way to assess, publish, and share vendor security information. Automate vendor assessments, share security documentation, and create trusted connections—all from the Whistic Vendor Security Network. Once companies start using Whistic, they can’t imagine how they managed vendor security assessments or responded to questionnaire requests before. Avoid the black box security reviews of the past by openly sharing vendor security requirements and publishing profiles. Focus on establishing trust rather than chasing down spreadsheets. Initiate assessments, assign inherent risk, engage vendors, calculate risk scores and trigger reassessments—automatically. In the fast-paced business environment we’re living in, no one has time for the slow, outdated security review processes of the past. Access the security posture of thousands of businesses immediately with Whistic.
  • 31
    Auditive

    Auditive

    Auditive

    Auditive is a Third-Party Risk Management (TPRM) platform with continuous monitoring, empowering buyers and sellers to confidently engage with each other, like never before. Auditive's unique network approach eliminates 80% of the risk review work for businesses and their vendors. Buyers can complete third-party risk reviews four times faster, continuously monitor risk across their entire vendor portfolio, and gain near-instant visibility into third-party risk, resulting in a 35% increase in vendor response rates. Sellers benefit by avoiding repetitive questionnaires, focusing on high-value initiatives, marketing their security posture on the Auditive network, and building trust with customers. The platform supports evaluation against industry-specific frameworks, ensuring accurate risk assessment. Auditive integrates seamlessly with procurement and productivity workflows, enabling rapid onboarding and continuous monitoring of all vendors in one place.
    Starting Price: $800 per month
  • 32
    C1Risk

    C1Risk

    C1Risk

    C1Risk is a technology company and the leading cloud-based, AI, enterprise risk and compliance management platform. Ou vision is to demystify and take the complexity out of risk management. We aim to To simplify your risk and compliance management for you to build and maintain the trust of your stakeholders. C1Risk sets the standard for companies that lead with risk, to win, with a full suite of solutions for a single, affordable price. GRC Regulations and Standards Library Policy Management Compliance Automation Enterprise Asset Management Risk Register and Risk Management Auto-calculated inherent and residual risk scoring Issue Management Incident Management Internal Audit Vulnerability Management Vendor Onboarding and Security Review Vendor Risk Scorecards REST API Integrations
    Starting Price: $18,000 per year
  • 33
    Trustpage

    Trustpage

    Trustpage

    Hundreds of teams use Trustpage to automate questionnaires, share documents, manage security reviews, and more. Determine if vendors meet your security requirements and compare solutions to determine which tools you can trust with your data. No need for contractors to answer security questionnaires, leverage Trustpage's question-answering extension to complete entire questionnaires in minutes. Empower everyone on your team to accurately answer security questions when they source approved answers using the Trustpage browser extension. Beat out the competition when you streamline the review process and provide a seamless InfoSec experience from start to finish. Automate NDAs, gain visibility into the security process, and reduce back-and-forth between teams so deals move more quickly. Connect your Trust Center with Slack, Salesforce, and Hubspot to incorporate security processes into the tools your team is already using.
    Starting Price: $50 per month
  • 34
    ARC Cyber Risk Management
    It is a cyber information risk management tool aligned with ISO 27001:2013. It saves time spent on risk management and gives you results that can be audited on yearly basis. It is web based tool that allows you to conduct an information security risk assessment quickly and easily. It supports multiple devices (desktop, laptop, ipad or mobile) and can be accessed from anywhere and anytime. An organisation should be aware of the risks it faces when managing its information. It should be aware of its information assets (applications, services, processes, location etc.), the importance of these assets and the risks associated with them. The arc tool supports the organisation to achieve the above and more by providing modules targeting: Asset Management, Business Impact Assessment, Risk Assessment & User Administration. It helps you to produce consistent, repeatable and reliable risk assessments that save time and money.
  • 35
    ThirdPartyTrust

    ThirdPartyTrust

    ThirdPartyTrust

    TPRM by ThirdPartyTrust is your one pane of glass risk dashboard: An end-to-end document repository and workflow automation tool to scale your vendor risk management program. Leverage a network of 17,000+ existing vendor profiles to fast forward your reviews and stay proactive with continuous monitoring. Beacon is the one source of truth for third party vendors: A centralized security profile comprising all your questionnaires, certifications, and attestations. Answer them once and easily share the latest versions any time your team receives a security assessment request. The tool will help you manage your end-to-end process, reducing the time spent on requesting and reviewing security documents.
    Starting Price: $120000.00/year
  • 36
    Allgress

    Allgress

    Allgress

    Allgress strives to provide the best Risk Management solutions and your feedback can help us be better. We invite you to add your voice to the mix by creating a new or updating an existing review. Evaluate our IT Risk Management and/or IT Vendor Risk Management Tools solutions on Gartner Peer Insights. In 15 minutes or less, help your peers find the best Risk Management Solutions.
  • 37
    Cyber360

    Cyber360

    CENTRL

    Streamline cybersecurity assessments and transform your practice to serve more clients with a best-in-class cloud platform. Identify, analyze, and mitigate cybersecurity risks with full transparency and control. Comprehensive out-of-the-box yet highly configurable workflows and controls framework provide flexibility while driving efficiencies. Design a repeatable cybersecurity assessment process that maps to your organization needs. Gain visibility if your organization’s risk profile across business units, third parties, regions. Collect and store all assessments, documents, policies, issues in a centralized repository. Proactively manage exceptions through analytics, alerts and collaboration. Start with pre-built and pre-seeded industry assessment templates, or upload your own standard practice questionnaire. Multiple modes for assessments to suit business needs, self assessments, onsite assessments, and more.
  • 38
    SECTARA

    SECTARA

    SECTARA

    SECTARA™ (Security Threat And Risk Assessor) was created for security consultants and corporate security managers frustrated with the lack of advanced security risk assessment (specific) software and tools. Performing risk assessments using MS Office products, in particular, can be a tedious process, plagued by styling / formatting problems, layout selection and the routine need for reverse engineering to assure logic throughout. Such methods are not particularly collaborative, present data security concerns and often drift beyond the bounds of recommended security standards and their assessment methodologies (because we are all human). Moreover, enterprise risk systems are necessarily generic and security risk consultant’s needs are very specific. It’s also difficult to get IT and expenditure approval for internally hosted systems, especially ones that are not part of ‘core’ business. SECTARA™ was developed in response to those problems, providing a security risk assessment.
  • 39
    Vendorapp

    Vendorapp

    Vendorapp

    Vendorapp is a powerful, fully automated vendor and supplier risk management platform that unifies vendor discovery, continuous risk assessment, contract lifecycle management, compliance onboarding, and strategic reporting into a single, intuitive interface. With one-click vendor assessments, Vendorapp Intelligence conducts real-time checks for sanctions, blacklists, ESG criteria, security posture, exposure risks, contract access, and more, powered by the largest global screening lists and a 22 million-vendor asset repository. Users can instantly search by name or URL, add preferred vendors, and receive smart alerts for upcoming expiries, cancellations, or breaches through a dynamic contract calendar. Automated smart assessments balance risk mitigation with operational efficiency, while smart contract management extracts key terms, type, value, renewal, and cancellation deadlines from uploaded agreements.
    Starting Price: $149 per month
  • 40
    Cortex Xpanse
    Cortex Xpanse continuously discovers and monitors assets across the entire internet to ensure your security operations team has no exposure blind spots. Get an outside-in view of your attack surface. Identify and attribute all internet connected assets, discover sanctioned and unsanctioned assets, monitor for changes and have a single source of truth. Prevent breaches and maintain compliance by detecting risky communications in global data flow. Reduce third-party risk by identifying exposures potentially caused by misconfigurations. Don’t inherit M&A security issues. Xpanse provides a complete, accurate and continuously updated inventory of all global internet-facing assets. This allows you to discover, evaluate and mitigate attack surface risks. You can also flag risky communications, evaluate supplier risk and assess the security of acquired companies. Catch exposures and misconfigurations before a breach.
  • 41
    STREAM Integrated Risk Manager

    STREAM Integrated Risk Manager

    Acuity Risk Management

    STREAM Integrated Risk Manager is an award-winning GRC platform that allows organizations to centralize, automate, quantify and report on risk. It can be used for a variety of applications including cyber / IT risk management, enterprise risk management, operational risk management, BCM and vendor risk management. STREAM has been around for over 10 years and is available as a SaaS or on-premise deployment. It has been adopted by organizations around the world, across various industries including finance, energy, healthcare, manufacturing, legal and IT. Please contact us to discuss specific requirements or visit the Acuity website for more information.
  • 42
    COBRA

    COBRA

    C2 Cyber

    Supply chains are complex, organic networks of relationships that grow extensively over time. Statistics show that two-thirds of security breaches originate from third parties. C2 Cyber’s Cobra platform immediately assesses the inherent risk of a supplier, saving time from the start. It then recommends a tier of service for each supplier that matches both the risk presented and the client’s risk appetite.
  • 43
    Global Risk Exchange
    Protect your third-party digital ecosystem with a data-driven approach that provides complete portfolio visibility and predictive capabilities. Global Risk Exchange (formerly CyberGRX) delivers rich, dynamic assessments of third-party vendors at speed and scale so you can manage your evolving third-party ecosystem with a collaborative, crowd-sourced Exchange featuring a repository of validated and predictive assessment data. Using sophisticated data analytics, real-world attack scenarios, and real-time threat intelligence, we provide a complete portfolio analysis of your third-party ecosystem, helping you to prioritize your risks and make smarter decisions. Identify trends and create benchmarks by leveraging structured data and actionable intelligence.
  • 44
    TrustMAPP

    TrustMAPP

    TrustMAPP

    TrustMAPP provides customers with a continuous process of measuring, reporting, planning and cintinuous improvement. Provides information security leaders with a real-time view of the effectiveness of their cybersecurity program while aligning to business objectives and risk. TrustMAPP provides the story of where you are, where you’re going, and what it will take to get there. From a single source of data, or from multiple integrations, an organization’s security posture is visible based on stakeholder perspectives: CISO, C-Suite, and Board. TrustMAPP gives organizations the ability to manage security as a business, quantifying and prioritizing remediation actions and costs.
  • 45
    Centraleyezer
    Integrates and correlates vulnerability scanners data and multiple exploit feeds combined with business and IT factors and to prioritize cyber security risks. Helps CISO, Red Teams and Vulnerability Assessment Teams reduce time-to-fix, prioritize and report risks. Used by Governments, Military, Banking, Finance, and E-Commerce companies
    Starting Price: $599 per month
  • 46
    RiskProfiler

    RiskProfiler

    RiskProfiler

    RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber risk ratings, Recon RiskProfiler for External Attack Surface Management (EASM) capabilities, Cloud RiskProfiler for Cloud Attack Surface Management (CASM) that identifies actually exposed cloud resources and prioritizes risks, and Brand RiskProfiler for brand protection. Recon RiskProfiler is an advanced EASM and CASM solution with robust integrations across major cloud providers like AWS, Azure, and Google Cloud. It delivers comprehensive visibility into external cloud resources, enabling efficient identification, assessment, and management of vulnerabilities and risks. Vendor RiskProfiler is a comprehensive Cyber Risk and Vendor Risk Management solution that delivers company cyber risk ratings while enabling efficient sending, receiving, and validation of third-party vendor security.
    Starting Price: $4999
  • 47
    ClearOPS

    ClearOPS

    ClearOPS

    ClearOPS helps buyers and sellers manage their vendors and satisfy due diligence requirements. ClearOPS is a full-circle third-party risk platform. With ClearOPS you can track and monitor all of your vendors, send assessments and upload evidence, and respond to their customer's vendor management processes. Vendor security questionnaires are like a hot potato, no one wants to do them. So our A.I. takes the first pass saving massive amounts of time. As a system of record, you never have to watch the information about your own business walk out the door. You won the customer, now what? Well, you have to retain them, and maintaining that healthy trust is what we are all about. ClearOPS manages privacy and security operations information so that it is easily accessible and up to date. Simple third-party risk management software solution. Inspire your colleagues with empowerment and assess your vendors on your schedule.
    Starting Price: $500 per month
  • 48
    Venminder

    Venminder

    Venminder

    Venminder is loaded with all the features you need for effective third-party risk management. Complete inherent risk assessments to determine which of your vendors require attention. Streamline the onboarding, ongoing management and offboarding of your vendors with dedicated workspaces. Manage each stage in our purpose-built configurable software platform. Risk assessments are an extremely important activity to complete on your vendor's products as they provide you with the level of risk a product will or is posing to your organization. The Venminder platform enables you to create custom risk assessment questions, invite unlimited internal users to contribute answers, apply scoring preferences, create clear and concise risk rating reports and more. Features also include template creation, progress monitoring and residual risk capabilities.
  • 49
    Vendifi

    Vendifi

    Vendifi

    Vendifi is a cutting-edge third-party risk management (TPRM) platform built for regulated industries like healthcare, finance, and government. Designed to simplify vendor compliance, Vendifi automates the entire due diligence process—from creating regulatory-compliant questionnaires to distributing them, chasing third parties for documentation, and validating responses. Alongside automated due diligence, Vendifi provides advanced cybersecurity monitoring, including real-time threat detection, vulnerability assessments, and ransomware alerts. Built on Microsoft SharePoint and Azure, Vendifi integrates seamlessly with your existing ecosystem, ensuring data security and compliance within your Office 365 environment. Whether you're managing 10 vendors or 10,000, Vendifi scales with your needs, offering a centralized solution for third-party risk management, compliance tracking, and vendor lifecycle management.
    Starting Price: $11499/annual
  • 50
    GRMS

    GRMS

    GRMS | Global Risk Management Solutions

    Leveraging an advanced technology platform, GRMS is a risk assessment service that provides customizable Supplier Risk Assessment Programs. GRMS offers companies the ability to proactively manage and continuously monitor suppliers. GRMS is different than data only providers like D&B, Thomson Reuters, and others that just provide raw data. GRMS’ services include the validation of data, physical review of documents and a support system that assists suppliers to obtain compliance with a client’s unique risk assessment requirements. Available in over 120 countries, GRMS’ Supplier Risk Assessment Programs can be delivered via a SaaS model or seamlessly integrated with leading Supplier Management Platforms. Risk assessment services can include: Financial Stability, Cyber Security, Digital Insurance Verification, Document Verification, Reputational Protection, Social Responsibility, Regulatory Compliance, and Health and Safety.