Alternatives to Segmantics

Compare Segmantics alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Segmantics in 2024. Compare features, ratings, user reviews, pricing, and more from Segmantics competitors and alternatives in order to make an informed decision for your business.

  • 1
    Resolver

    Resolver

    Resolver

    Resolver gathers all risk data and analyzes it in context — revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks — whether compliance or audit, incidents or threats — and translates those effects into quantifiable business metrics. Finally, risk becomes a key driver of opportunity instead of being disconnected from the business. Choose the risk intelligence software used by over 1000 of the world’s largest organizations. Resolver makes it easy to collaborate and collect data from across the enterprise, allowing teams to fully understand their risk landscape and control effectiveness. Understanding your data is one thing; being able to use it to drive vital action. Resolver automates workflows and reporting to ensure risk intelligence turns into risk reduction. Welcome to the new world of Risk Intelligence.
    Compare vs. Segmantics View Software
    Visit Website
  • 2
    Predict360

    Predict360

    360factors

    Predict360 is an integrated risk and compliance management software platform for financial and insurance organizations. It integrates risk and compliance processes and industry best practices content into a single platform that streamlines regulatory compliance, improves efficiency, predicts risk, and provides best-in-class business intelligence reporting. Predict360 includes the following Risk Management applications: Enterprise Risk Management (ERM), Risk Management and Assessments, Risk Insights, Issues Management, Peer Insights, Third-Party Risk Management, and Quarterly Certifications and Attestations. Compliance applications are: Compliance Management, Compliance Monitoring & Testing, Complaints Management, Regulatory Change Management, Regulatory Examination and Findings Management, Policy & Procedure Management, and more. 360factors also offers Lumify360 - a KPI and KRI predictive analytics platform that enriches data, predicts performance, and works alongside any GRC.
    Partner badge
    Compare vs. Segmantics View Software
    Visit Website
  • 3
    Onspring

    Onspring

    Onspring GRC Software

    Onspring is an award-winning GRC automation and reporting software. Our SaaS platform is known for flexibility and ease of use for end-users and administrators. Simple, no-code, drag-and-drop functionality makes it easy to create new applications, workflows, and reports independently without IT or developers. - Manage a centralized risk register with multiple hierarchies - Keep tabs on financial impacts & probabilities based on risk tolerance - Capture & relate financial, operational, reputational & third-party risks - Map controls to regulations, frameworks, incidents & risks - Remediate findings through workflows or the POA&M process Ready-made products get you started in as quickly as 30 days: - Governance, Risk & Compliance Suite - Risk Management - Third-party Risk - Controls & Compliance - Audit & Assurance - Policy Lifecycles - CMMC - BC/DR FedRAMP moderate environment available.
    Compare vs. Segmantics View Software
    Visit Website
  • 4
    Hyperproof

    Hyperproof

    Hyperproof

    Hyperproof makes building out and managing your information security frameworks easy by automating repetitive compliance operation tasks so your team can focus on the bigger things. The Hyperproof solution also offers powerful collaboration features that make it easy for your team to coordinate efforts, collect evidence, and work directly with auditors in a single interface. Gone are the days of uncertainty around audit preparation and compliance management process. With Hyperproof you get a holistic view of your compliance programs with progress tracking, program health monitoring, and risk management.
    Compare vs. Segmantics View Software
    Visit Website
  • 5
    StandardFusion

    StandardFusion

    StandardFusion

    A GRC solution for technology-focused SMB and Enterprise Information Security teams. StandardFusion eliminates spreadsheet pain by using a single system of record. Identify, assess, treat, track and report on risks with confidence. Turn audit-based activities into a standardized process. Conduct audits with certainty and direct access to evidence. Manage compliance to multiple standards; ISO, SOC, NIST, HIPAA, GDPR, PCI-DSS, FedRAMP and more. Manage vendor and 3rd party risk, and security questionnaires easily in one place. StandardFusion is a Cloud-Based SaaS or on-premise GRC platform designed to make InfoSec compliance simple, approachable and scalable. Connect what your organization does, with what your organization needs to do.
    Compare vs. Segmantics View Software
    Visit Website
  • 6
    LogicGate Risk Cloud
    LogicGate’s leading GRC process automation platform, Risk Cloud™, enables organizations to transform disorganized risk and compliance operations into agile process applications, without writing a single line of code. LogicGate believes that flexible, easy-to-use enterprise technology can change the trajectory of organizations and the lives of their employees. We are dedicated to transforming the way companies manage their governance, risk, and compliance (GRC) programs, so they can manage risk with confidence. LogicGate’s Risk Cloud platform and cloud-based applications, combined with raving fan service and expertly crafted content, enable organizations to transform disorganized risk and compliance operations into agile processes, without writing a single line of code.
  • 7
    6clicks

    6clicks

    6clicks

    6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRamp and many other standards. Hundreds of businesses trust 6clicks to set up and automate their risk and compliance programs and streamline audit, vendor risk assessment, incident and risk management and policy implementation. Easily import standards, laws, regulations or templates from our massive content library, use AI-powered features to automate manual tasks, and integrate 6clicks with over 3,000 apps you know and love. 6clicks has been built for businesses of all shapes and sizes and is also used by advisors with a world-class partner program and white label capability available. 6clicks was founded in 2019 and has offices in the United States, United Kingdom, India and Australia.
  • 8
    Accountable

    Accountable

    Accountable HQ

    Accountable can supercharge your risk management and empower your team by simplifying the process of managing risk across all levels of your organization, become compliant with HIPAA, GDPR, CCPA and more privacy laws, and build trust with your customers and partners. Easily comply with global privacy laws such as HIPAA, GDPR, CPRA and more using Accountable's easy-to-use solution for privacy compliance. Manage risk by identifying and mitigating vulnerabilities by using Accountable's security risk and data protection impact assessments, giving you confidence in risk management. Monitor 3rd and 4th party vendor risk with ease with built in questionnaires and business agreement templates. The employee portal gives your team a way to stay up to date on security awareness and HIPAA training as well as the ability to review policies or report potential security issues. Share compliance, security, and privacy reports with those inside and outside your organization.
    Starting Price: $399.00/month
  • 9
    MasterControl

    MasterControl

    MasterControl

    Bringing breakthrough products to market in highly regulated industries can feel like an endless series of trade-offs. MasterControl's software simplifies GxP workflows so you never have to sacrifice quality for cost or innovation for regulation. Complete and connected meets fast and flexible. From quality event management to document control and integrated training - MasterControl Quality Excellence transforms your quality data and processes into a competitive advantage. Modernizing your manufacturing operations starts with modern software. From work orders to work instructions and production records (EBR or eDHR) to logbooks, MasterControl Manufacturing Excellence is the simplest way to digitalize manufacturing.
    Starting Price: $25,000 / 1st year
  • 10
    AvePoint

    AvePoint

    AvePoint

    AvePoint is the only full-suite data management solutions provider for digital collaboration platforms. Our AOS platform boasts the largest software-as-a-service user base in the Microsoft 365 ecosystem. Over 7 million users worldwide trust AvePoint to migrate, manage, and protect their cloud investments. Our SaaS platform is enterprise-grade with hyper scale, robust security and support. We are available across 12 Azure data centers, our products are in 4 languages, we offer 24/7 support and boast market-leading security credentials such as ISO 27001 and FedRAMP in-process. Our comprehensive and integrated product portfolio provides extra value to organizations leveraging Microsoft that want a consistent experience without the pain of having to manage multiple vendors. Automate governance to scale adoption and IT operations while simplifying oversight and collaboration. Reduce more risk by improving process, content security, and compliance across more collaboration platforms.
  • 11
    ServiceNow Integrated Risk Management
    ServiceNow Integrated Risk Management allows you to manage risk and compliance enterprise-wide through change and disruption created by evolving global regulations including privacy and ESG, human error, cyberattacks, digital transformation, and more. By seamlessly embedding risk management and compliance into your daily workflows and familiar user experiences you can enable a common language to improve risk-informed decisions, reduce costs, gain real-time visibility into risk, and effectively communicate with stakeholders at all levels. Only ServiceNow can connect the business, security, and IT with an integrated risk framework that transforms manual, siloed, and unfamiliar processes into a user-friendly, unified program built on a single platform.
  • 12
    Assess360

    Assess360

    CENTRL

    Streamline due diligence work and risk assessments and transform your practice to serve more clients with a best-in-class cloud platform. Identify, analyze, and mitigate risks with full transparency and control. Comprehensive out-of-the-box yet highly configurable workflows and controls framework provide flexibility while driving efficiencies. Through the cloud platform, process & assessment automation. Upload proprietary questionnaire or use standard templates from library and customize. Schedule questionnaires and automatically publish to partners. Automate grading with proprietary scale. Assess360 is a single application for all parties (responders use Assess360 at no cost) making the process more efficient for you and your third parties. Third parties can assign different sections to different groups with complete approval workflows. Third parties can collaborate internally and with you. They can easily attach documents and track their progress.
  • 13
    Perium

    Perium

    Perium BV

    Perium; the most user-friendly platform for complete risk management Perium is the all-in-one platform for risk management. In no time at all you will be equipped with an intuitive and flexible system for risk management and reporting. From now on, meet all standards for security, privacy, and digital resilience. Protect the data of your employees, customers, suppliers, and your organization quickly, simply, and smartly with Perium. Standards available (new ones added all the time): ISO27001, ISO27002, BIO, NEN7510, NTA7516, NEN7512, NEN7513, ISO27701, HKZ, ISO9001, ISO50001, DigiD, DNB Good Practice, BIC, ISQM, PCI-DSS, Suwinet, Wpg, IBP Onderwijs, NIS2 Directive, DORA, PIMS, ISMS, NCSC Handreiking, NIST CSF, NIST AI, NVZ Gedragslijn, Cloud Control Matrix, Horizontaal Toezicht
  • 14
    CyberStrong

    CyberStrong

    CyberSaint Security

    CISOs of the Fortune 500 rely on CyberSaint's CyberStrong platform to achieve real-time cyber and IT risk management and continuous compliance from assessment to Boardroom. CyberStrong uses risk quantification, intuitive workflows, and executive reports to build cyber resilience through measurement and improved communication. Patented AI and ML automation eliminate manual effort, saving enterprises millions annually. The platform aligns cyber and business risk for faster, informed decision-making. Enterprises use CyberStrong as a competitive differentiator, mitigating even the most unprecedented risks while automating assessments across frameworks. CyberSaint is a Gartner Cool Vendor for Cyber & IT Risk Management, is named in Gartner's Security Operations, Cyber & IT Risk Management, and Legal & Compliance Hype Cycles, and won numerous awards including 2021 CRN Emerging Vendor, 2021 Cybersecurity Excellence Gold Winner, and 2021 Cyber Defense Magazine Global InfoSec Awards Winner
  • 15
    TruOps

    TruOps

    TruOps

    The TruOps platform centralizes all information and connects assets to risk and compliance data, including policies, controls, vulnerabilities, issue management, exceptions, and more. TruOps is a comprehensive cyber risk management solution. Each module is designed to maximize efficiency and solve the process challenges you face today while preparing your organization for the future. Consolidate disparate information and relationships to enable intelligent and automated choices and process information through risk-based workflows. Automate and streamline oversight of vendor relationships, perform due diligence, and consistently monitor third parties with this module. Streamline and automate risk management processes. Leverage conditional questions and a scenarios engine to identify risks. Automate the identification, planning, and response processes. Easily manage plans, actions, and resources and resolve issues promptly.
  • 16
    ZenGRC

    ZenGRC

    Reciprocity

    ZenGRC by Reciprocity is an enterprise-grade security solution for compliance and risk management. Trusted by the world's leading companies, including Walmart, GitHub, airbnb, and Genesys, ZenGRC offers businesses efficient control tracking, testing, and enforcement. It comes with system-of-record for compliance, risk assessment, centralized dashboards, streamlined workflow, and unified control management.
    Starting Price: $2500.00/month
  • 17
    GlobalSUITE

    GlobalSUITE

    GlobalSuite

    Deploy and go: GlobalSUITE Solutions applications make it easy for you to comply with industry frameworks and ensure you work with best practices from a broad repository of international standards controls and specific regulations. The solution allows you to improve the management of your Security and Cybersecurity System by leaving behind manual methods that reduce the effectiveness of the equipment. Our clients start working from day one, without the need to invest time loading compliance catalogs, risk catalogs and controls, methodologies, etc. Everything is ready to optimize times and allow you to focus on the most important thing, your goals. We help you with a risk analysis adaptable to any methodology with the possibility of carrying out an assessment of them with risk maps and automatic dashboards. The solution allows you to make an automatic adequacy plan with workflows that offer you a comparison between periods, in addition to the history of compliance.
  • 18
    SecurityStudio

    SecurityStudio

    SecurityStudio

    Simplify your vendor risk management program to ease the burden on your company and its employees. Standardize the process to easily locate all third and fourth-party vendors and keep track of those that pose a risk to your company. Defend against any risk created by your vendors, and against lawyers, regulators and customers if a breach occurs. Unlike other vendor risk management tools on the market, SecurityStudio doesn’t simply communicate risk. Through an easy-to-use automated workflow, SecurityStudio evaluates all third-party vendors and brings your weakest links to the surface. Then you have the power to accept, avoid or request remediation of each vendor.
  • 19
    Oracle Risk Management and Compliance
    Automate advanced security and transaction monitoring to strengthen financial controls, ensure separation of duties (SoD), stop fraud, and streamline audit workflows. Automate the analysis required to ensure all roles are audit-ready. Utilize visualizations and simulations to make the best design decisions. Use embedded sensitive access and SoD rules to ensure your roles are compliant prior to go-live. Avoid costly user acceptance testing and audit issues by designing secure ERP roles before the system goes live. Prevent tampering by continuously monitoring transactions and sensitive ERP data with built-in AI. Enable business continuity and resilience by adopting an AI-driven approach to risk management and security. Improve financial oversight by linking risk to business results. Empower employees to balance opportunities with risks. Streamline business continuity and readiness efforts.
  • 20
    Ostendio

    Ostendio

    Ostendio

    Ostendio is the only integrated security and risk management platform that leverages the strength of your greatest asset. Your people. Ostendio delivers an easy-to-use, cost-effective platform that allows you to assess risk, create and manage critical policies and procedures, educate and empower your people to be secure with security awareness training, and monitor continuous compliance across 250+ security frameworks. With deep customization, advanced intelligence, and flexible controls, you’re always audit-ready, always secure, and always able to take on what’s next. For more information about Ostendio, visit ostendio.com.
  • 21
    SureCloud

    SureCloud

    SureCloud

    SureCloud is a leading provider of cloud based, integrated GRC (Governance, Risk & Compliance) products and cybersecurity services, which reinvent the way you manage risk.  SureCloud is underpinned by Aurora, a highly configurable no-code platform, which is simple, intuitive, and flexible. Unlike other GRC platform providers who force organizations to adapt their processes, our solutions are highly configurable. Aurora can be easily customized to fit a wide range of operating models. Continually assess, mitigate risk, stay secure.
  • 22
    Archimigo

    Archimigo

    Archimigo

    Archimigo - Security Architecture Simplified. A SaaS application incorporating Security Architecture, Design, Risk & Continuous Compliance Validation. Why Archimigo? Easy Intregration Security is a blocker. Archimigo provides deep learning based security architecture & compliance automation solution which enhances complex design and decision making processes and simplifies security architecture. With Archimigo onerous and time-consuming tasks can be completed more efficiently and effectively. Archimigo gives for information security professionals a depth of insight that was never available before. Latest Technology Blocker not an Enabler. Archimigo helps security teams to manage their security architecture, risk, and compliance functions under one platform and provides the ability to create artefacts at speed with pre-built templates and ability to fast track the decision-making process through workflow automation. With Archimigo, Security becomes an enabler instead of being
  • 23
    Reciprocity ROAR Platform
    The Reciprocity® ROAR Platform, which underpins Reciprocity ZenRisk and ZenComply, gives you the ability to see, understand and take action on your IT and cyber risks. With a unified, real-time view of risk and compliance—framed around your business priorities—you’ll have the contextual insight needed to easily and clearly communicate with key stakeholders to make smart, strategic decisions that will protect your enterprise, systems and data, earning the trust of your customers, partners and employees. Convey the risk implications of business processes and priorities in addition to the overall impact to the business to enable informed, data-driven decisions. Use expert-provided guidance and best practices to gain the confidence and know-how to create, grow and mature your risk and compliance programs. Break down the silos that cause inefficiencies, gaps and blind spots by leveraging a unified view of compliance and risk.
  • 24
    SafePaaS

    SafePaaS

    SafePaaS

    SafePaaS offers proven solutions to industry specific Governance Risk and Compliance challenges. SafePaaS Industry Controls Solutions improve margins by mitigating risk of operational losses for all major industries including Consumer Goods, Education, Energy, Financial Services, Health Care, High Tech, Life Sciences, Manufacturing, Media & Entertainment, Public Sector, Retail and Transportation, Construction, Banking. SafePaaS optimizes all significant business process with embedded controls throughout the process to help organizations move to a proactive and predictive GRC management approach from an informal or reactive approach. SafePaaS Process Controls Solutions are available for all major business areas including: Financial Management, OrderManagement, Procure-to-Pay Management, Supply Chain Management, etc. SafePaaS is a Complete Governance, Risk and Compliance platform with integrated ERP Application Controls Management for all major ERP systems.
  • 25
    Isora GRC

    Isora GRC

    SaltyCloud, PBC

    Streamline your IT Risk Assessments with Isora GRC. Leverage a lightweight, yet powerful surveying solution for conducting IT Risk Assessments. Launch self-assessment questionnaires for departments, people, facilities, devices, and applications. Leverage our library of preloaded questionnaires like NIST, HIPAA, GLBA, and more. Build or upload your custom questionnaires. Change question weights, allow partial credit, gate conditional questions, and add other question logic to simplify your questionnaires. Automatically rollup and score collected quantitative and qualitative survey data. Gain access to dynamic risk reports. Use the risk map to identify the highest-risk units or the trend graph to track risk scores year-over-year. Easily export the raw data to data analytics tools like Microsoft PowerBI using the RESTful API.
  • 26
    SecurityScorecard

    SecurityScorecard

    SecurityScorecard

    SecurityScorecard has been recognized as a leader in cybersecurity risk ratings. Download now to see the new cybersecurity risk rating landscape. Understand the principles, methodologies, and processes behind how our cybersecurity ratings work. Download the data sheet to learn more about our security ratings. Claim, improve, and monitor your scorecard for free. Understand your vulnerabilities and make a plan to improve over time. Get started with a free account and suggested improvements. Gain a holistic view of any organization's cybersecurity posture with security ratings. Leverage security ratings for a variety of use cases, including risk and compliance monitoring, M&A due diligence, cyber insurance underwriting, data enrichment, and executive-level reporting.
  • 27
    ZEVA

    ZEVA

    CodeLynx

    Zeva provides a highly intuitive interface and utilizes Microsoft’s Azure Cloud to provide a robust and secure hosted environment to scale from small organizations with fewer than 10 users to global enterprises with over 10,000 employees. What makes ZEVA a value proposition, for any organization, is the ability to create and manage an unlimited number of custom assessments, while providing real time data and analytics to decision makers and management anywhere in the world. Mitigate risk and maintain compliance with centralized secure hosting, improved reporting, and real-time dashboards and analytics. Items identified with “Findings” can be immediately assigned corrective measures to ensure timely remediations. The CodeLynx team developed the ZEVA platform to support the evolving evaluation requirements of commercial and government organizations of any size.
  • 28
    STREAM Integrated Risk Manager

    STREAM Integrated Risk Manager

    Acuity Risk Management

    STREAM Integrated Risk Manager is an award-winning GRC platform that allows organizations to centralize, automate, quantify and report on risk. It can be used for a variety of applications including cyber / IT risk management, enterprise risk management, operational risk management, BCM and vendor risk management. STREAM has been around for over 10 years and is available as a SaaS or on-premise deployment. It has been adopted by organizations around the world, across various industries including finance, energy, healthcare, manufacturing, legal and IT. Please contact us to discuss specific requirements or visit the Acuity website for more information.
  • 29
    Solver SDK

    Solver SDK

    Frontline Systems

    Use optimization and simulation models in your desktop, Web or mobile application. Use the same high-level objects (like Problem, Solver, Variable and Function), collections, properties and methods across different programming languages. The same object-oriented API is exposed "over the wire" through Web Services WS-* standards to remote clients in PHP, JavaScript, C# and other languages. Procedural languages can use conventional calls that correspond naturally to the properties and methods of the Object-Oriented API. Linear and quadratic programming, mixed-integer programming, smooth nonlinear optimization, global optimization, and non-smooth evolutionary and tabu search are all included. The world's best optimizers, from Gurobi™, XPRESS™ and MOSEK™ for linear, quadratic and conic models to KNITRO™, SQP and GRG methods for nonlinear models "plug into" Solver SDK. Easily create a sparse DoubleMatrix object with 1 million rows and columns.
    Starting Price: $2495 one-time payment
  • 30
    TrustMAPP

    TrustMAPP

    TrustMAPP

    TrustMAPP provides customers with a continuous process of measuring, reporting, planning and cintinuous improvement. Provides information security leaders with a real-time view of the effectiveness of their cybersecurity program while aligning to business objectives and risk. TrustMAPP provides the story of where you are, where you’re going, and what it will take to get there. From a single source of data, or from multiple integrations, an organization’s security posture is visible based on stakeholder perspectives: CISO, C-Suite, and Board. TrustMAPP gives organizations the ability to manage security as a business, quantifying and prioritizing remediation actions and costs.
  • 31
    ReadiNow

    ReadiNow

    ReadiNow

    ReadiNow’s no-code, agile GRC platform let's your team management functionality to automate and edit any processes you need. Boost productivity and connect your data so that you can drill down and obtain valuable data insights for reports and board-level decisions. Beautiful, professional & enterprise-grade applications are ready without the need for programmers or coding. Simply drag and drop to create forms, reports, dashboards, workflows, and integrations with your existing systems. Automate any business process with the visual workflow builder to bring your applications to life. Turn the wealth of data in your business to actionable information with custom reporting and built in data analytics. Auto generate invoices, status reports, plans, time sheets or any type of document with real time data. Instantly deploy your applications to any mobile device so you always have access to your information on the go.
  • 32
    Workscope

    Workscope

    Workscope

    What is Workscope? Workscope tackles spreadsheet sprawl by uniting discovery, streamlined governance, and workflow insights ➡️ delivering a cost-effective way to reduce data fragmentation and maximize ROI for process optimization. Who Uses Workscope? Financial Services Companies, Corporate Finance Departments, Change Management, Energy, Utility, Manufacturing, Engineering & Pharmaceutical Companies Where can Workscope be deployed? Cloud-based and On-premise
  • 33
    SmartProfiler for M365
    SmartProfiler for Office 365 assessment is an automated health & risk assessment solution to help you significantly improve your Microsoft Office 365 ecosystem health & security posture. SmartProfiler for Office 365 assessment follows CIS workbench controls and other tests designed by our Office 365 experts. The Center for Internet Security is a nonprofit entity whose mission is to ‘identify, develop, validate, promote, and sustain best practice solutions for cyberdefense.’ It draws on the expertise of cybersecurity and IT professionals from government, business, and academia from around the world. To develop standards and best practices, including CIS benchmarks, controls, and hardened images, they follow a consensus decision-making model. SmartProfiler is designed to support CIS standards designed for Office 365 and Azure assessments.
    Starting Price: $2,499 per tenant
  • 34
    Clym

    Clym

    Clym

    Clym is an affordable compliance platform that is easy to understand, looks good and protects your business immediately. Manage cookie consent, data subject requests and do not sell my private information requests for global compliance regulations such as GDPR, CCPA and LGPD. One platform for global privacy needs. Clym is the data privacy platform that helps organizations meet their data protection obligations. Cookies, consent, requests, policies and more are all managed in a secure and adaptive application. Clym helps you collect, control and manage the data that is relevant for your company in a transparent way. The platform covers 6 main areas of compliance, namely: data consent management, cookie consent management, company & DPO data management, terms, policies, agreements & procedures, data subjects’ requests, localization and consent receipts. Through all its functionalities, Clym provides a head start in data privacy compliance.
    Starting Price: $45 per month
  • 35
    Apomatix

    Apomatix

    Apomatix

    We have over ninety years of risk management and information security experience, and our products are designed to meet the unique challenges risk professionals face. Streamline and optimize your risk management activities. Identify, analyze, evaluate, and treat all your risks in one solution. Upgrade your information asset management. Record, assign, and manage your information assets in one central location. Simplify your internal control management process. Track implementation status and run control effectiveness tests for frameworks including ISO 27001 & CIS 20. We also have tools to automate the reporting process, saving you from having to manually build these in your spreadsheet. Together, these features help save time, reduce the burden of managing your risk register, and improve the quality of your risk assessments.
    Starting Price: $12.62 per user per month
  • 36
    Privva Vendor Risk Management
    Automate your vendor security assessments. Build proprietary assessments to meet your firm policies. Manage and review your vendors from a single cloud-based platform. Assign assessments to vendors, manage access, and simplify workflow. Track status without managing multiple spreadsheets. Compare vendor responses against other vendors and industry benchmarks. Quickly score vendors and evaluate overall risk. Track progress and manage communication, including remediation, throughout the process. Now let’s start using the platform to evaluate risk profiles before parties gain access to your sensitive data. Instituting Privva as part of your standard operating procedure during the evaluation, contracting, and implementation tool holds all parties more accountable.
  • 37
    MetricStream

    MetricStream

    MetricStream

    Reduce losses and risk events with forward-looking risk visibility. Enable a modern and integrated risk management approach with real-time aggregated risk intelligence and their impact on business objectives and investments. Protect brand reputation, lower the cost of compliance, and build regulators and board’s trust. Stay on top of evolving regulatory requirements, proactively manage compliance risks, policies, cases, and controls assessments. Drive risk-aware decisions and accelerate business performance by aligning audits to strategic imperatives, business objectives and risks. Provide timely insights on risks and strengthen collaboration across various functions. Reduce exposure to third-party risks, make superior sourcing decisions. Prevent third-party risk incidents with continuous third-party risk, compliance and performance monitoring. Simplify and streamline entire third-party risk management lifecycle.
  • 38
    Xyea

    Xyea

    Xyea

    Enabling vulnerable people to live a better quality of life. Ensuring that the people bring support are happy and safe and feel they get the right type and quality of support to enable them to live fulfilled lives. Those being supported can live safe, well-supported, and fulfilled lives. Families are happy that they chose well in the service provider selected and are fully engaged and up-to-date on all aspects of their loved one’s life in as much as they wish to be. Vulnerable people and their loved ones feel absolutely safe and are reassured by their services provider’s capability and track record to support them taking risks that promote positive life experiences. Providers can support individuals and their families to the standard expected in these very challenging times using the Xyea COVID-19 package. Ensuring each individual has an enhanced life experience, achieving what is important to them and supported in a personable, friendly and relaxed manner at a pace that suits.
  • 39
    BC in the Cloud

    BC in the Cloud

    Infinite Blue

    BC in the Cloud is a SaaS tool for building and maintaining an effective business continuity and disaster recovery program. For newer programs, BC in the Cloud offers a turn-key option with pre-built templates and workflows to cover all the components needed, allowing for faster onboarding and quicker implementation. For more established programs, BC in the Cloud offers the flexibility to configure and customize workflows based on any program requirements. We maintain the infrastructure and upgrades so that you can focus on what’s important. We also assure your business continuity plans and data are accessible even if your data center is down. Your organization can get started immediately with our pre-defined templates and plans but can easily add new fields and make changes as needed. Our platform grows with your needs. Built by industry experts, we offer a complete application for continuity and disaster recovery.
    Starting Price: $60 per user per month
  • 40
    Incisive Analytics Essentials
    In today’s business landscape, managing spreadsheet risk and navigating the proliferation of low-code/no-code platforms and open-source tools is critical. However, while these resources offer immense business value, each instance presents potential risks such as inaccuracies, outdated data, and compatibility issues with your core production systems. If your IT team is unaware of the extent of low-code/no-code deployments and open-source software being used within your organization, it can put your business at risk. With Incisive Analytics Essentials, you gain the knowledge and power to identify, manage, and mitigate these risks. Navigate the chaos of the "unknown unknowns" and gain up-to-date knowledge about-and management of-critical analytics assets such as spreadsheets, low-code/no-code and open-source applications. Ensure accurate, consistent and secure analysis of critical spreadsheets, low-code/no-code and open-source applications.
  • 41
    Citicus ONE

    Citicus ONE

    Citicus

    Our Citicus ONE software is available via our basic and premium hosted services. These provide a highly-responsive alternative to an in-house installation. Our basic hosted service allows you to get started immediately without having to set up the infrastructure to support the application internally. Our premium hosted service offers a very flexible approach that allows you specify the precise grade of service you require and control its method of connectivity to your corporate intranet eg using a Virtual Private Network (VPN). A hosted implementation can be migrated to an in-house installation subsequently if required. Our hosted services are used by organizations with the most stringent security requirements and have been subjected to thorough independent review.
  • 42
    Apparity

    Apparity

    Apparity

    Do you know how safe your spreadsheets are? Do you know where all your spreadsheets are? Who is using them and if they present risk? If you do know the answers to all these questions, then you are doing well. Why, because most companies do not know! In fact, most don’t even have a plan to find and track the spreadsheets that can get them into trouble. So, how do you stay out of trouble? The answer is very simple. You use Apparity. Apparity is built to find every spreadsheet you use and then tell you what you should do. Should you put it in an inventory? Does it need to be controlled? Or can it be safely ignored? Keeping your company safe from costly mistakes is never easy. But Apparity was built to help you do just that. Apparity is easy to use for both managers and users. From the moment you first build your spreadsheet, to every time it is used and changed, Apparity will let you know when you have a problem. With Apparity your spreadsheets are safe, secure and tracked.
  • 43
    Corax

    Corax

    Corax

    Justify your security budget and optimize spending by understanding what impact each cyber risk has on your financial exposure. By being able to see your true financial exposure to cyber risk, you can now determine your risk appetite and make the right informed decisions to transfer or offset each risk. See the financial risk that each 3rd party is causing you, be that an existing or potential third party, now with the financial impact cost you can control and protect your critical supply chain. With each day, our database grows by over 100,000 companies to build the world’s most comprehensive modeled view on cyber risk. Our platform not only enables you to see how you compare in your industry against your peers but also provides a customizable peer group. Born in the insurance industry, we help some of the world’s largest insurers identify risk levels and financial impact across different industry sectors and business types.
  • 44
    ShieldRisk

    ShieldRisk

    ShieldRisk AI

    ShieldRisk is an Artificial Intelligent powered platform for third-party vendor risk assessment with speed and accuracy. The platform is a single, unified platform, executing vendor audits on global security & regulatory framework including GDPR, ISO 27001, NIST, HIPAA, COPPA, CCPA, SOC 1, SOC 2. ShieldRisk AI enables the analysis of auditing and advisory functions, involving time savings, faster data analysis, increased levels of accuracy, more in-depth insight into vendor security posture. ShieldRisk, in consistence with global compliance standards, helps the organizations transform cybersecurity programs to enable and provide risk free digital business strategies. We help organizations measure their vendors’ digital resilience, maximize recoveries, and lower their total cost of risk, while providing cybersecurity build-or-buy decisions. Our family of single and dual view platforms are easy to use and provide the clearest, most accurate screening and security analysis.
  • 45
    VigiTrust

    VigiTrust

    VigiTrust

    Educate your staff on the policies and procedures and the reasons for them, with VigiTrust’s engaging and informative eLearning. Vulnerability scanning, assessment, reporting with questionnaires, surveys and check-sheets and comprehensive, interactive reports and charts. Achieve continuous compliance across a number of regulations and standards (e.g. GDPR, PCI DSS and ISO27001) with one single program and platform. VigiTrust is an award-winning provider of Integrated Risk Management (IRM) SaaS solutions to clients in 120 countries in the hospitality, retail, transportation, higher education, government, healthcare, and eCommerce industries. VigiTrust solutions allow clients and partners to prepare for, validate, and maintain compliance with legal and industry frameworks and regulations on data privacy, information governance, and compliance.
  • 46
    Kroll Compliance
    Third parties, customers, and partners present legal, reputational, and compliance risks to your organization. The Kroll Compliance Portal arms you with the capabilities to control those risks at scale. Relative risk can dictate the need for a closer look. Emailing back and forth with analysts and downloading and saving files can slow you down, create a gap in the audit trail, and leave you vulnerable to information security risks. Take the due diligence process out of emails and file folders and bring order with the Kroll Compliance Portal. Many compliance programs become time and resource intensive because of manual processes or inflexible software. Put an end to that with the Kroll Compliance Portal’s Workflow Automation. Your business demands efficient third party onboarding. You need an accurate risk assessment. The Kroll Compliance Portal Questionnaire accelerates the onboarding process through automation, tracking and scoring in line with your risk model.
  • 47
    Arctic Intelligence

    Arctic Intelligence

    Arctic Intelligence

    Innovative financial crime risk assessments to protect your business. Risk assessments are the cornerstone of any financial crime compliance program. From money laundering, terrorism financing, bribery and corruption and sanctions, Arctic Intelligence provides an enterprise-wide risk assessment solution to assess your business' vulnerabilities in line with global regulations and FATF guidelines. Our solutions can help address many challenges by providing defendable data-driven results and quickly establishing a program tailored to the organisation. Our technology can calculate and present firm wide risk profiles, identifying and highlighting high risk areas and control gaps or weaknesses. Real-time reporting can aggregate risk outcomes for both an individual business unit and organisation-wide level providing accurate, consistent and dependable results.
  • 48
    Whistic

    Whistic

    Whistic

    The best way to assess, publish, and share vendor security information. Automate vendor assessments, share security documentation, and create trusted connections—all from the Whistic Vendor Security Network. Once companies start using Whistic, they can’t imagine how they managed vendor security assessments or responded to questionnaire requests before. Avoid the black box security reviews of the past by openly sharing vendor security requirements and publishing profiles. Focus on establishing trust rather than chasing down spreadsheets. Initiate assessments, assign inherent risk, engage vendors, calculate risk scores and trigger reassessments—automatically. In the fast-paced business environment we’re living in, no one has time for the slow, outdated security review processes of the past. Access the security posture of thousands of businesses immediately with Whistic.
  • 49
    LSEG Due Diligence Centre

    LSEG Due Diligence Centre

    LSEG Data & Analytics

    An integrated, effective and practical platform that helps you manage the key areas of your compliance program and make better decisions. Manage your third parties across their entire lifecycle, including compliance risk assessments, due diligence, screening and monitoring, auditing and reporting, and offboarding. Our platform is designed by former compliance officers and has been built from the ground up with one sole purpose in mind: to meet the needs of compliance managers. The scale of our technology offerings suits enterprises with minimal requirements through to global Fortune 500 companies that regularly deal with hundreds of thousands of third parties across every continent. Configurable and personalized workflows align to your organization and third-party processes. Solution architecture that allows you to integrate with hundreds of systems – including SAP, SalesForce, Oracle and HRMS systems – using a standard API model.
  • 50
    ECOMPLY

    ECOMPLY

    ECOMPLY

    Efficient data protection management for your business. GDPR Compliance can be confusing and overwhelming. ECOMPLY.io Data Protection Management System strips down that complexity and allows small and medium sized businesses to become compliant with GDPR and national data privacy legislation, without requiring an external consultant. Try ECOMPLY.io free of charge to see how it turns GDPR compliance into a seamless process for your business. ECOMPLY.io asks you what you need to answer and tells you what to do at every step. It reminds you of upcoming data protection tasks and informs you of where you stand. ECOMPLY.io helps you identify and track your Records of Processing Activities in a legally correct, yet easy and fast manner. ECOMPLY.io allows you to respond to authorities and audits with auto-generated, up-to-date and valid GDPR documentation with one click. ECOMPLY.io covers the entire GDPR.
    Starting Price: €25 per user per month