Alternatives to Privva Vendor Risk Management

Compare Privva Vendor Risk Management alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Privva Vendor Risk Management in 2024. Compare features, ratings, user reviews, pricing, and more from Privva Vendor Risk Management competitors and alternatives in order to make an informed decision for your business.

  • 1
    Predict360

    Predict360

    360factors

    Predict360 is an integrated risk and compliance management software platform for financial and insurance organizations. It integrates risk and compliance processes and industry best practices content into a single platform that streamlines regulatory compliance, improves efficiency, predicts risk, and provides best-in-class business intelligence reporting. Predict360 includes the following Risk Management applications: Enterprise Risk Management (ERM), Risk Management and Assessments, Risk Insights, Issues Management, Peer Insights, Third-Party Risk Management, and Quarterly Certifications and Attestations. Compliance applications are: Compliance Management, Compliance Monitoring & Testing, Complaints Management, Regulatory Change Management, Regulatory Examination and Findings Management, Policy & Procedure Management, and more. 360factors also offers Lumify360 - a KPI and KRI predictive analytics platform that enriches data, predicts performance, and works alongside any GRC.
    Partner badge
    Compare vs. Privva Vendor Risk Management View Software
    Visit Website
  • 2
    Onspring

    Onspring

    Onspring GRC Software

    Onspring is an award-winning GRC automation and reporting software. Our SaaS platform is known for flexibility and ease of use for end-users and administrators. Simple, no-code, drag-and-drop functionality makes it easy to create new applications, workflows, and reports independently without IT or developers. - Manage a centralized risk register with multiple hierarchies - Keep tabs on financial impacts & probabilities based on risk tolerance - Capture & relate financial, operational, reputational & third-party risks - Map controls to regulations, frameworks, incidents & risks - Remediate findings through workflows or the POA&M process Ready-made products get you started in as quickly as 30 days: - Governance, Risk & Compliance Suite - Risk Management - Third-party Risk - Controls & Compliance - Audit & Assurance - Policy Lifecycles - CMMC - BC/DR FedRAMP moderate environment available.
    Compare vs. Privva Vendor Risk Management View Software
    Visit Website
  • 3
    KYC Portal

    KYC Portal

    Aqubix Ltd / Finopz

    KYC Portal focuses on streamlining and automating the back-office of any due diligence process. It allows you to define and manage all your regulatory and policy requirements within the system and it then provides the operational capacity to automate and manage the entire process from on-boarding relationship management all throughout the automation of ongoing aspects of KYC such as risk-based approach, reporting, document requests, automated risk-based questionnaires etc. KYCP hooks up with any 3rd party provider/s that you might choose on the market, giving you a centralised, due diligence workflow solution.
    Partner badge
    Compare vs. Privva Vendor Risk Management View Software
    Visit Website
  • 4
    ConnectWise Identify Assessment
    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
    Compare vs. Privva Vendor Risk Management View Software
    Visit Website
  • 5
    StandardFusion

    StandardFusion

    StandardFusion

    A GRC solution for technology-focused SMB and Enterprise Information Security teams. StandardFusion eliminates spreadsheet pain by using a single system of record. Identify, assess, treat, track and report on risks with confidence. Turn audit-based activities into a standardized process. Conduct audits with certainty and direct access to evidence. Manage compliance to multiple standards; ISO, SOC, NIST, HIPAA, GDPR, PCI-DSS, FedRAMP and more. Manage vendor and 3rd party risk, and security questionnaires easily in one place. StandardFusion is a Cloud-Based SaaS or on-premise GRC platform designed to make InfoSec compliance simple, approachable and scalable. Connect what your organization does, with what your organization needs to do.
    Compare vs. Privva Vendor Risk Management View Software
    Visit Website
  • 6
    ClusterSeven

    ClusterSeven

    Mitratech

    With ClusterSeven Shadow IT Manager, gain control over the hidden spreadsheets and other data assets that put your enterprise at risk. Discover and manage the hidden, sensitive spreadsheets, applications, and data assets that lie outside of IT’s control – and create risk. Now you can easily and efficiently capture and maintain an inventory of the files your organization relies upon and monitor who’s making changes, helping you meet audit and compliance requirements and prevent problems before they impact your enterprise. Classify the risks associated with your newly discovered EUC files and organize them in a centralized database. Once you’ve established the spreadsheets your organization is using, you can carry out a deeper risk analysis on critical files using rules that matter to your business, such as the complexity of a formula or macro, use of sensitive terms in the file like “confidential,” inclusion of unprotected client or personal data, or the presence of hidden worksheets.
  • 7
    TOPIA

    TOPIA

    Vicarius

    With hundreds of new software and OS vulnerabilities detected each month, reducing organizational security risk can become overwhelming. TOPIA's vulnerability management toolbox provides a quick and efficient way to analyze, prioritize, and remediate cyber threats before they're exploited—with or without a security patch. TOPIA's is a cloud-based cost-effective vulnerability assessment tool, actively identifies risks, and eliminates threats using proprietary xTags™ and Patchless Protection™ that go beyond traditional vulnerability management. TOPIA continuously conducts real-time risk analysis and tracks each phase of remediation, so you're always in the loop about your organization's cyber health. TOPIA allows you to get more done faster with risk-prioritization parameters, auto-security patch and efficient reports on your team's progress and performance.
  • 8
    Prevalent

    Prevalent

    Prevalent

    The Prevalent Third-Party Risk Management Platform is a single solution that enables customers to automate the critical tasks required to manage, assess and monitor their third parties across the entire life cycle. The solution combines the following integrated capabilities to ensure third parties are secure and compliant: • Automated onboarding and offboarding • Profiling, tiering and inherent risk scoring • Standardized and custom vendor risk assessments with built-in workflow, task and evidence management • Continuous vendor threat monitoring • A network community of completed standardized assessments and risk intelligence • Compliance and risk reporting • Remediation management The solution is backed by expert professional services to help optimize and mature third-party risk management programs, and managed services to outsource the collection and analysis of vendor assessments.
  • 9
    SecurityGate.io

    SecurityGate.io

    SecurityGate.io

    Attackers move at the speed of bleeding-edge tech & open-source knowledge. Corporations drag an anchor of legacy GRCs & spreadsheet assessments. SecurityGate.io is the risk management acceleration platform industrial companies use to improve cybersecurity faster. Fast SaaS assessment workflows & reporting automation replace slow, disruptive processes. Blend risk assessments with real-time security data to see where risk is today and forecast where it will be tomorrow. Remediation workflows, supplier risk management, audits, progress tracking & notifications, are all simplified in one place. They have difficulty understanding what’s valuable in the data and what to do next. They often have trouble translating cyber risk into business terms. The risk management activities seem to go on forever, they’re expensive, and it’s difficult to show the ROI. The platform automatically visualizes the data and highlights what’s important, making next-step decisions easier.
  • 10
    SecurityStudio

    SecurityStudio

    SecurityStudio

    Simplify your vendor risk management program to ease the burden on your company and its employees. Standardize the process to easily locate all third and fourth-party vendors and keep track of those that pose a risk to your company. Defend against any risk created by your vendors, and against lawyers, regulators and customers if a breach occurs. Unlike other vendor risk management tools on the market, SecurityStudio doesn’t simply communicate risk. Through an easy-to-use automated workflow, SecurityStudio evaluates all third-party vendors and brings your weakest links to the surface. Then you have the power to accept, avoid or request remediation of each vendor.
  • 11
    ProcessUnity

    ProcessUnity

    ProcessUnity

    ProcessUnity Vendor Risk Management is a software-as-a-service (SaaS) application that helps companies identify and remediate risks posed by third-party service providers. Combining a powerful vendor services catalog with risk process automation and dynamic reporting, ProcessUnity VRM streamlines third-party risk activities while capturing key supporting documentation that ensures compliance and fulfills regulatory requirements. ProcessUnity VRM provides powerful capabilities that automate tedious tasks and free risk managers to focus on higher-value mitigation strategies. Powerful capabilities for real risk reduction. A proven track record of customer success. Schedule your personalized demo of our award-winning software and start your journey to a more mature, automated program. ProcessUnity Vendor Risk Management protects corporate brands by reducing risk from third parties, vendors and suppliers.
  • 12
    Vendor360
    Vendor360, CENTRL’s Vendor Risk Management Software, streamlines the entire process of managing the 3rd party risk lifecycle. Through centralized, easy-to-use workflows, and powerful internal and external collaboration capabilities, Vendor360 provides you with the tools and content needed to identify, manage, assess and mitigate third party risks across all stages of your organization’s vendor life-cycle. Advanced and flexible third party risk management platform for aggregating your vendor data, automating your assessments and getting control over your vendor risk management process.
  • 13
    Ncontracts

    Ncontracts

    Ncontracts

    Ncontracts is a leading provider of SaaS-based risk management and compliance solutions financial services companies. Our GRC solutions help more than 4,000 banks, credit unions, mortgage companies, fintechs, and trusts achieve their risk management and compliance goals with a powerful combination of user-friendly, cloud-based software and expert services. Our suite of solutions covers all aspects of enterprise risk management, including vendor management, compliance, lending compliance, business continuity, audit and findings management, company culture alignment, and cybersecurity. Ncontracts was named to the Inc. 5000 fastest-growing private companies in America for the fourth consecutive year in 2022.
  • 14
    RiskRecon

    RiskRecon

    RiskRecon

    Automated risk assessments tuned to match your risk appetite. Get the intimate risk performance assessments you need to efficiently manage your third-party risk. RiskRecon’s deep transparency and risk contextualized insights enable you to understand the risk performance of each vendor. RiskRecon’s workflow enables you to easily engage your vendors to realize good risk outcomes. RiskRecon knows a lot about your systems. Know what RiskRecon knows. Get continuous objective visibility of your entire internet risk surface, spanning managed, shadow and forgotten IT. RiskRecon knows a lot about your systems. Know what RiskRecon knows. Get continuous objective visibility of your entire internet risk surface, spanning managed, shadow and forgotten IT. See the intimate details of every system, the detailed IT profile and security configuration. We’ll even show you the data types at risk in every system. RiskRecon’s asset attribution is independently certified to 99.1% accuracy.
  • 15
    DoubleCheck

    DoubleCheck

    DoubleCheck Software

    DoubleCheck Risk Management system is a powerful, cloud-based platform for managing enterprise risks independently or in an integrated governance, compliance, and audit suite. Highly flexible and fully configurable, DoubleCheck’s Enterprise Risk Management software enables all stakeholders to identify, manage, and rate diverse risks that arise from various sources. Some key benefits of DoubleCheck Risk Management system include policy and document management, testing, issue creation, and the ability to carry out risk surveys to establish status. Record, monitor and review vendors or partners that interact with a firm. Vendors and suppliers are critical to your business’s success. It is important that we know everything about them and can also be prepared in case these third parties are not up to expectations or fail to perform, which can have a negative effect on your operations, profitability, and good reputation.
  • 16
    Diligent One Platform
    The Diligent One Platform (formerly HighBond by Diligent) is the end-to-end GRC platform, designed by industry experts, to create stronger IT security, risk management, compliance, and assurance. Built by industry experts who wanted a better way to work. Diligent One Platform streamlines collaboration across organizations, automates repetitive tasks, and delivers best practices in a seamless, award-winning interface—all powered by ACL Robotics and Rsam technology. Diligent One Platform is made up of a number of different products, each covering a different area of your organizational governance. All together, these products create the collective HighBond software platform. The Diligent One Platform is the only unified solution designed to centralize and unify all your board management and GRC activities. Get a consolidated view of risk across your entire organization. Curate and deliver it right to the board — so they can make better decisions.
  • 17
    Tandem Software
    Tandem is an online solution that eases the burden of regulatory compliance and, more importantly, improves security posture. This is your all-in-one information security and compliance solution. We named our product Tandem because it works in partnership - in tandem - with you. You bring your knowledge of your organization and your needs, Tandem brings software built by information security experts to help you organize and manage your information security program. Let Tandem carry the burden of new guidance, data tracking, document structure, and report generation. See what you are capable of when using the right tool for the right job.
  • 18
    TrustElements

    TrustElements

    TrustElements

    TrustElements helps to mitigate risk and prioritize investments. Your cyber resiliency score is defined in a percentage after analyzing all loads of data your company owns. TrustElements maps your results to industry frameworks (NIST, CIS, MITRE) and helps to establish a golden standard of cyber resilience by continuously assessing your organization exposure to risks. The TE platform enhances decision making based on your business context and helps to better allocate financial resources. Communicate cybersecurity strategy to the C-level and Board of Directors to strengthen the decision making in Security, IT, and Risk Management. Whether your challenge is vendor risk management, tight security budgets, overcoming resource obstacles or applying the right level of protection and risk management, we have your back to make your company propel.
  • 19
    Rubix

    Rubix

    Rubix

    You can use Rubix to assess the risk of your counter-party right throughout your business relationship. Rubix helps you take prudent credit risks, build a robust supply chain and monitor compliance for your business partners in India and around the world. At the time you are considering taking on a new distributor, dealer, customer, franchisee, supplier, vendor or service provider, it is important to undertake an on-boarding risk assessment of the firm. If you are a Bank/ Fintech/ NBFC, you should conduct an Identity check (KYC, AML and Compliance) at the time of loan origination followed by an independent credit risk assessment at the loan decisioning stage. A firm’s risk profile changes quite rapidly, especially in today’s interconnected world and volatile business environment. Once you sign up with Rubix to monitor your portfolio, you will be able to track changes in the firm’s risk profile and key developments impacting it on the Rubix automated risk management system.
  • 20
    Allgress

    Allgress

    Allgress

    Allgress strives to provide the best Risk Management solutions and your feedback can help us be better. We invite you to add your voice to the mix by creating a new or updating an existing review. Evaluate our IT Risk Management and/or IT Vendor Risk Management Tools solutions on Gartner Peer Insights. In 15 minutes or less, help your peers find the best Risk Management Solutions.
  • 21
    C1Risk

    C1Risk

    C1Risk

    C1Risk is a technology company and the leading cloud-based, AI, enterprise risk and compliance management platform. Ou vision is to demystify and take the complexity out of risk management. We aim to To simplify your risk and compliance management for you to build and maintain the trust of your stakeholders. C1Risk sets the standard for companies that lead with risk, to win, with a full suite of solutions for a single, affordable price. GRC Regulations and Standards Library Policy Management Compliance Automation Enterprise Asset Management Risk Register and Risk Management Auto-calculated inherent and residual risk scoring Issue Management Incident Management Internal Audit Vulnerability Management Vendor Onboarding and Security Review Vendor Risk Scorecards REST API Integrations
  • 22
    Panorays

    Panorays

    Panorays

    The fastest way to securely do business together. Automating Third Party Security Lifecycle Management. Gain a 360° view of the supplier through a combination of the hacker’s view and internal policy. The hacker’s view tests the posture just like a hacker would evaluate a company. The internal policy ensures that the supplier complies with security policies and practices. The most seamless end-to-end third party security workflow solution. Panorays’ rapid security ratings are based on an “outside-in” simulated hacker’s view of assets, combined with an “inside-out” view that checks that the supplier adheres to your internal company security policies. Panorays’ automated customized security questionnaires include only the questions that are relevant for each supplier, and you can track progress with a click. Choose from a built-in template or create your own.
  • 23
    ClearOPS

    ClearOPS

    ClearOPS

    ClearOPS helps buyers and sellers manage their vendors and satisfy due diligence requirements. ClearOPS is a full-circle third-party risk platform. With ClearOPS you can track and monitor all of your vendors, send assessments and upload evidence, and respond to their customer's vendor management processes. Vendor security questionnaires are like a hot potato, no one wants to do them. So our A.I. takes the first pass saving massive amounts of time. As a system of record, you never have to watch the information about your own business walk out the door. You won the customer, now what? Well, you have to retain them, and maintaining that healthy trust is what we are all about. ClearOPS manages privacy and security operations information so that it is easily accessible and up to date. Simple third-party risk management software solution. Inspire your colleagues with empowerment and assess your vendors on your schedule.
  • 24
    A1 Tracker

    A1 Tracker

    A1 Enterprise

    A1 Tracker is presented by the vendor as a robust & configurable risk management software offering either stand-alone or fully-integrated risk management software covering many business segments across an organization. Claims & Incident Management Claims & incident reporting for claims of any type: injuries, medical, commercial, customer, insurance, work comp, asset, auto, liability. Risk Management & Threat Assessment: Risk register for tracking risks at any level in an organization, including by entity, project, asset, contract, vendor, division, business, unit, region, and more. Real-time risk reports & heat maps, dashboard metrics, alerts, & notifications. Contract Management: Contract module for tracking contracts of any type with vendors, employees, customers, and any other parties. Insurance Policies & Certificates: Policies & certificates of insurance tracking with reminders & renewals. For agencies & carriers policy management includes tracking clients.
  • 25
    ShieldRisk

    ShieldRisk

    ShieldRisk AI

    ShieldRisk is an Artificial Intelligent powered platform for third-party vendor risk assessment with speed and accuracy. The platform is a single, unified platform, executing vendor audits on global security & regulatory framework including GDPR, ISO 27001, NIST, HIPAA, COPPA, CCPA, SOC 1, SOC 2. ShieldRisk AI enables the analysis of auditing and advisory functions, involving time savings, faster data analysis, increased levels of accuracy, more in-depth insight into vendor security posture. ShieldRisk, in consistence with global compliance standards, helps the organizations transform cybersecurity programs to enable and provide risk free digital business strategies. We help organizations measure their vendors’ digital resilience, maximize recoveries, and lower their total cost of risk, while providing cybersecurity build-or-buy decisions. Our family of single and dual view platforms are easy to use and provide the clearest, most accurate screening and security analysis.
  • 26
    Diligent Risk Intelligence Data
    Automated real-time monitoring and search tool for negative news, watchlist, sanction, and politically exposed person data. Protect your institution from reputational, AML, and financial crime risks. Diligent’s patented search and monitoring capability offers real-time, accurate negative news and risk information using machine learning and relevancy score calculation. Screen against 1400+ watchlists, sanctions, and embargo lists in real-time with our comprehensive screening capability. Utilize automated monitoring for sanctions, watchlists, and state-owned entities. Map beneficial ownership and detect risks during crises for customers and vendors. We are committed to providing a robust and secure service that protects all our customers’ data. Diligent’s Security Program is governed based on the NIST Cybersecurity Framework and Diligent follows ISO/IEC 27001 standards to keep information assets secure by implementing an Information Security Management System (ISMS).
  • 27
    Whistic

    Whistic

    Whistic

    The best way to assess, publish, and share vendor security information. Automate vendor assessments, share security documentation, and create trusted connections—all from the Whistic Vendor Security Network. Once companies start using Whistic, they can’t imagine how they managed vendor security assessments or responded to questionnaire requests before. Avoid the black box security reviews of the past by openly sharing vendor security requirements and publishing profiles. Focus on establishing trust rather than chasing down spreadsheets. Initiate assessments, assign inherent risk, engage vendors, calculate risk scores and trigger reassessments—automatically. In the fast-paced business environment we’re living in, no one has time for the slow, outdated security review processes of the past. Access the security posture of thousands of businesses immediately with Whistic.
  • 28
    Riskpro

    Riskpro

    Riskpro India

    Third party risk management (TPRM) is a structured approach to analyze and control risks arising to the organization from third parties. Mainly third parties are: Vendors Customers Joint ventures Counterparties Fourth Parties Third-party relationships can be a significant source of enterprise risk. The propagation of third-party partners, regulatory pressure, and the complexity of cyber-related risks has led companies to dedicate more time and attention to the potential risks by third parties. They enable companies to be flexible and competitive in a global business environment. These relationships often allow companies to delegate important tasks so that they can focus on their core competencies. With the benefits gained from third parties comes related risks that pose significant threats to a business, such as cyber breaches, business continuity challenges, or reputational damage.
  • 29
    Venminder

    Venminder

    Venminder

    Venminder is loaded with all the features you need for effective third-party risk management. Complete inherent risk assessments to determine which of your vendors require attention. Streamline the onboarding, ongoing management and offboarding of your vendors with dedicated workspaces. Manage each stage in our purpose-built configurable software platform. Risk assessments are an extremely important activity to complete on your vendor's products as they provide you with the level of risk a product will or is posing to your organization. The Venminder platform enables you to create custom risk assessment questions, invite unlimited internal users to contribute answers, apply scoring preferences, create clear and concise risk rating reports and more. Features also include template creation, progress monitoring and residual risk capabilities.
  • 30
    Risk Ledger

    Risk Ledger

    Risk Ledger

    The Risk Ledger platform gives clients all the tools they need to run a comprehensive, cyber security-led, third-party risk management programme against their entire supply chain at speed and at scale while making it simple, free and fast for third parties to engage with the process and improve their risk management maturity. Our unique secure network model allows every organisation to both run a third-party risk management programme and respond to client risk assessments, facilitating a network of trust relationships between organisations on the platform. Organisations running a third-party risk management programme on the Risk Ledger platform benefit from: - continuous monitoring of risk controls implemented in their supply chain - visibility beyond third-parties to fourth, fifth and sixth parties - procurement cycles reduced by up to 80% - Increased supplier engagement - low per-supplier costs
  • 31
    Veriforce

    Veriforce

    Veriforce

    Veriforce® is a recognized leader in delivering comprehensive, integrated supply chain risk management solutions that help bring workers home safely and optimize business performance. The company’s SaaS safety and compliance platform, data integrity and verification practices, and standardized safety training programs empower leading organizations to drive safety and compliance into their supply chains and down to the worker level. As the world’s largest supply chain risk management network, Veriforce partners with over 3,200 hiring companies in over 130 countries, serving more than 80,000 contractors, over 7,000 authorized instructors and evaluators, and millions of individual workers. This network makes Veriforce the preferred partner for companies that strive to ensure a safe, qualified third-party workforce. Company offices are in the U.S., Canada, South Africa, and the United Kingdom. For more information, visit veriforce.com.
  • 32
    Global Risk Exchange
    Protect your third-party digital ecosystem with a data-driven approach that provides complete portfolio visibility and predictive capabilities. Global Risk Exchange (formerly CyberGRX) delivers rich, dynamic assessments of third-party vendors at speed and scale so you can manage your evolving third-party ecosystem with a collaborative, crowd-sourced Exchange featuring a repository of validated and predictive assessment data. Using sophisticated data analytics, real-world attack scenarios, and real-time threat intelligence, we provide a complete portfolio analysis of your third-party ecosystem, helping you to prioritize your risks and make smarter decisions. Identify trends and create benchmarks by leveraging structured data and actionable intelligence.
  • 33
    VISO TRUST

    VISO TRUST

    VISO TRUST

    VISO TRUST's AI-powered third-party risk platform lets your security team effortlessly access risk intelligence for any number of third parties. Instantly assess all your third parties without hiring additional analysts and take action to reduce risk without reading documents and analyzing surveys. Leverage data from thousands of vendors to gain unparalleled risk intelligence. VISO TRUST is the only SaaS third-party cyber risk management platform that delivers the rapid security intelligence needed for modern companies to make critical risk decisions early in the procurement process. Frictionless due diligence simplifies an otherwise complex process and allows companies to effortlessly assess any number of third parties. Leverage curated AI to extract insights from source artifacts and automatically determine vendor security posture without any user interaction. Gain a comprehensive overview of your organization's cyber risk posture and make data-driven decisions to reduce risk.
  • 34
    KCM GRC Platform
    You have challenging compliance requirements, not enough time to get audits done, and keeping up with risk assessments is a continuous problem. The KCM GRC platform helps you get audits done in half the time, is easy to use, and is surprisingly affordable. Reduce the time you need to satisfy requirements to meet compliance goals with pre-built requirements templates for the most widely used regulations. Save time when you manage distribution of policies and track attestation through campaigns. Simplify risk initiatives with an easy-to-use wizard with risk workflow based on the well-recognized NIST 800-30. Easily prequalify, assess, and conduct remediation to continually monitor and keep track of your vendors’ risk requirements. KCM effectively reduces the time you need to satisfy all of the requirements necessary to meet risk and compliance goals. Spend significantly less time and money when dealing with your compliance and audit initiatives.
  • 35
    RiskThinking.AI

    RiskThinking.AI

    RiskThinking.AI

    We collect, codify, align and analyze billions of data-points. We create the derived data needed to calculate Climate-related Financial Risk and make all of our data available to subscribers via a secure API. We algorithmically generate multi-factor scenarios that are used to stress-test an assets climate-related exposure to Policy, Economic, Carbon, Physical, and Social Risks. We measure and rank exposure by magnitude and materiality for each risk variable, and generate Exposure Scores and Climate Risk RatingsTM for every asset, portfolio, corporate, sector, region, country and more. We help regulators, governments, financial institutions, asset managers and large corporations worldwide identify, evaluate and stress-test the potential financial impacts of climate change on industries, economies, portfolios and assets.
  • 36
    Auditive

    Auditive

    Auditive

    Auditive is a Third-Party Risk Management (TPRM) platform with continuous monitoring, empowering buyers and sellers to confidently engage with each other, like never before. Auditive's unique network approach eliminates 80% of the risk review work for businesses and their vendors. Buyers can complete third-party risk reviews four times faster, continuously monitor risk across their entire vendor portfolio, and gain near-instant visibility into third-party risk, resulting in a 35% increase in vendor response rates. Sellers benefit by avoiding repetitive questionnaires, focusing on high-value initiatives, marketing their security posture on the Auditive network, and building trust with customers. The platform supports evaluation against industry-specific frameworks, ensuring accurate risk assessment. Auditive integrates seamlessly with procurement and productivity workflows, enabling rapid onboarding and continuous monitoring of all vendors in one place.
  • 37
    VivoSecurity

    VivoSecurity

    VivoSecurity

    Regulators and management need 3rd party assessment that are accurate and not based upon opinions or assumptions. VivoSecuiry enables our customers to satisfy regulators by assessing true 3rd party risk, which is the probability that one of their vendors will have a data breach, obsoleting the use of questionnaires, maturity scores and SOC2 reports. The risk from 3rd parties is from breaches caused by the sheer number of vendors. VivoSecurity quantifies this risk twice per year, with an aggregate forecast. We help senior management set risk appetite goals with a testable forecast of data breach frequency. We help cybersecurity teams identify the few vendors that represent most of the risk, we then quantify the value of mitigation. Finally, we satisfy regulators with an accurate and documented process for vendor assessment using an empirical and transparent regression model for probability of data breach.
  • 38
    D&B Risk Analytics

    D&B Risk Analytics

    Dun & Bradstreet

    Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
  • 39
    Rival Risk

    Rival Risk

    Rival Systems

    Rival Risk is a multi-asset, enterprise risk management solution built for professional risk managers and traders on a fully hosted, cloud-based platform. Voted Best Risk Solutions Provider by Waters Ranking 2022. Rival risk is already integrated with the major clearing firms and brokers to pull in your start of day positions, account balances and listen to real-time trades so on-boarding is easy. With Rival Risk, you can easily analyze market risk from every angle and scale your business with real-time risk management on a single cloud-based platform. In addition, our proprietary options pricing algorithms automatically calculate accurate volatility, theoretical prices and greeks even when the options markets are wide or there is no market, so you always know where you stand.
  • 40
    LiveSource

    LiveSource

    LiveSource

    LiveSource manages the entire launch process: Supplier Risk Management, Product Launch and Collaborative Manufacturing. LiveSource is the first end-to-end product launch portal. It ensures all departments and stakeholders are working with the latest, up-to-date information. Sure, there are other products that may cover pieces of what we do, but no other solution supports the entire launch process — and data — in a single application. Not an ERP. Not a QMS. Not a PLM. LiveSource is specifically designed for direct materials manufacturing. Solutions designed for indirect sourcing just can’t handle complex cost breakdowns or downstream processes needed for industry-specific, highly engineered parts. But LiveSource does it for 18,000 manufacturers every day. LiveSource connects your internal departments to your suppliers, managing the continuous change during the launch process. LiveSource centralizes, streamlines and documents your entire process.
  • 41
    Triplicity

    Triplicity

    Phinity Risk Solutions

    With Triplicity’s powerful cloud software, you can easily automate your third-party risk management. Our third-party risk manager helps ensure that your company’s risks are fully understood and well managed, applying a risk-based approach to your third-party vendors. Triplicity automates all your processes, dramatically reducing your risk and improving strategic relationships with your key third-party vendors. Compare and rate your third parties by risk, category, business unit, or even the application of their agreed service. Improve reliability and reduce your risk by ensuring you continue to work only with parties that comply with industry best practices. Improve your performance by running several thousand third-party assessments simultaneously, and ensure all parties are assessed. Triplicity is an IT Vendor Risk Management (IVRM) solution with a difference. We first profile each third party to provide their inherent risk specific to your business.
  • 42
    Vendorvue

    Vendorvue

    Vendorvue

    Cut the email chaos and spreadsheet headaches. Manage vendor interactions with ease. We understand the headaches that come with vendor compliance. Leverage AI to pinpoint which compliance standards apply to each vendor, ensuring you're focused on the right regulations from the start. Automate and simplify communication with vendors. Vendorvue creates a seamless portal where vendors can easily access and complete their compliance requests. Let AI handle the heavy lifting by identifying inaccuracies, conducting quality checks, and ensuring all required information is provided so you maintain complete compliance integrity. Maintain document validity effortlessly with automated annual updates, ensuring no manual work and continuous compliance. Our platform leverages AI to revolutionize compliance management, enhancing efficiency and accuracy throughout the entire process. By automating and aligning compliance requests in a unified vendor portal, Vendorvue ensures consistent communication.
  • 43
    ThirdPartyTrust

    ThirdPartyTrust

    ThirdPartyTrust

    TPRM by ThirdPartyTrust is your one pane of glass risk dashboard: An end-to-end document repository and workflow automation tool to scale your vendor risk management program. Leverage a network of 17,000+ existing vendor profiles to fast forward your reviews and stay proactive with continuous monitoring. Beacon is the one source of truth for third party vendors: A centralized security profile comprising all your questionnaires, certifications, and attestations. Answer them once and easily share the latest versions any time your team receives a security assessment request. The tool will help you manage your end-to-end process, reducing the time spent on requesting and reviewing security documents.
  • 44
    UpGuard

    UpGuard

    UpGuard

    The new standard in third-party risk and attack surface management. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day. Continuously monitor your vendors, automate security questionnaires, and reduce third and fourth-party risk. Monitor your attack surface, prevent data breaches, discover leaked credentials, and protect customer data. Scale your third-party risk program with UpGuard analysts, and let us monitor your organization and vendors for data leaks. UpGuard builds the most powerful and flexible tools for cybersecurity. Whether you’re looking to prevent third-party data breaches, continuously monitor your vendors, or understand your attack surface, UpGuard’s meticulously designed platform, and unmatched functionality helps you protect your most sensitive data. Hundreds of the world’s most data-conscious companies are scaling faster and more securely.
  • 45
    STREAM Integrated Risk Manager

    STREAM Integrated Risk Manager

    Acuity Risk Management

    STREAM Integrated Risk Manager is an award-winning GRC platform that allows organizations to centralize, automate, quantify and report on risk. It can be used for a variety of applications including cyber / IT risk management, enterprise risk management, operational risk management, BCM and vendor risk management. STREAM has been around for over 10 years and is available as a SaaS or on-premise deployment. It has been adopted by organizations around the world, across various industries including finance, energy, healthcare, manufacturing, legal and IT. Please contact us to discuss specific requirements or visit the Acuity website for more information.
  • 46
    COBRA

    COBRA

    C2 Cyber

    Supply chains are complex, organic networks of relationships that grow extensively over time. Statistics show that two-thirds of security breaches originate from third parties. C2 Cyber’s Cobra platform immediately assesses the inherent risk of a supplier, saving time from the start. It then recommends a tier of service for each supplier that matches both the risk presented and the client’s risk appetite.
  • 47
    Blue Umbrella GRC

    Blue Umbrella GRC

    Blue Umbrella

    Identify and manage third-party risk. A modular, best-in-class, plug & play compliance platform to effectively manage multiple areas of third-party risk. Buy Only What You Need. Blue Umbrella GRC is designed to scale as your third-party risk management program matures and expands. Get started today with one module or create a bundle and build from there. Streamline your data. Forget using multiple tools and systems to manage third-party risk. Blue umbrella grc centralizes it all. Get started today. Sign up online and get started within minutes with a hassle-free setup and friendly user interface. Trusted expertise. Tap into the gold standard of third-party risk management questionnaires, including anti-bribery and corruption, data privacy, ccpa, it security and more. Automate the process Each module is built so you can easily identify risk in your vendor relationships and take actionable steps to remediate.
  • 48
    Aravo

    Aravo

    Aravo Solutions

    Harness the power of Aravo’s flexible, end-to-end workflow automation and AI decision making support. Built on our award-winning Saas platform, you’ll always be agile in a rapidly changing business and regulatory environment. Whether you’re just coming off spreadsheets and need to stand up a program quickly and confidently, or you need a solution mapped to your own defined third-party governance framework, we have the right solution for your program maturity, size, and budget. Leverage our unparalleled experience of delivering successful third-party risk management programs for many of the world’s most respected brands. No other provider has the scope of coverage across supplier risk and performance, third-party management and IT vendor risk management.
  • 49
    Proteus GDPReady

    Proteus GDPReady

    Proteus-Cyber

    Proteus® GDPReady™ is an itteration of Proteus® NextGen Data Privacy™ and uses the same code set. If you are only interested in GDPR then we simply deliver Proteus® NextGen configured to show only the functionality required for GDPR: Comprehensive view of where Personal Identifiable Information (PII) resides in your organisation - Scored readiness evaluation and graphical illustration of compliance gaps - Roadmap for compliance with recommendations for immediate action - Insights to start building a robust data protection framework and inform your future technology choices - Helps meet the regulation requirements at a reduced cost and potentially huge fines mitigated, not to mention reputational damage averted - Snapshot of legal landscape and your potential exposure - Easy, fast breach reporting - Vendor risk management for audits To see the full capabilities of Proteus NextGen Data Privacy see here https://sourceforge.net/software/product/Proteus-NextGen-Data-Privacy/
  • 50
    ISG GovernX
    ISG GovernX® is the first third-party management platform that allows you to proactively optimize the value of your supplier relationships, mitigate risks and manage the contract lifecycle with speed and agility. Get control of your third-party environment, improve supplier performance and decrease spend. Leverage ISG’s knowledge and insights borne from more than $460 billion worth of enterprise client-supplier transactions. Automate the entire lifecycle of third-party risk management. Minimize exposure to financial, reputation, operational, and identify risk exposure from your third parties. From onboarding, assessments, and remediations to performance monitoring and reviews, gain efficiency by automating your workflow, integration, and on-going notifications. Maintain insight and oversight of your third-party portfolio. Orchestrate and manage your complex environment of third-party relationships in one easy-to-use dashboard.