Alternatives to Trustpage

Compare Trustpage alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Trustpage in 2024. Compare features, ratings, user reviews, pricing, and more from Trustpage competitors and alternatives in order to make an informed decision for your business.

  • 1
    StandardFusion

    StandardFusion

    StandardFusion

    A GRC solution for technology-focused SMB and Enterprise Information Security teams. StandardFusion eliminates spreadsheet pain by using a single system of record. Identify, assess, treat, track and report on risks with confidence. Turn audit-based activities into a standardized process. Conduct audits with certainty and direct access to evidence. Manage compliance to multiple standards; ISO, SOC, NIST, HIPAA, GDPR, PCI-DSS, FedRAMP and more. Manage vendor and 3rd party risk, and security questionnaires easily in one place. StandardFusion is a Cloud-Based SaaS or on-premise GRC platform designed to make InfoSec compliance simple, approachable and scalable. Connect what your organization does, with what your organization needs to do.
    Compare vs. Trustpage View Software
    Visit Website
  • 2
    Fusion Framework System

    Fusion Framework System

    Fusion Risk Management

    Fusion Risk Management's software, the Fusion Framework System, enables you to understand how your business works, how it breaks, and how to put it together again. Our platform provides easy, visual, and interactive ways to explore every aspect of your business so you can identify single points of failure and key risks. Achieve resilience with greater speed and efficiency with Fusion’s flexible and integrated suite of platform capabilities that can be tailored to best fit the needs of your organization. We meet you wherever you are on your journey for more resilient operations. - Map critical service and product delivery processes as they actually are - Leverage objective risk insights that help you audit, analyze, and improve your business operations - Plan, orchestrate, and measure risk management and resilience activities with confidence - Leverage automation to reduce the burden of manual, time-consuming, repetitive tasks, freeing teams for higher value activities
  • 3
    Secureframe

    Secureframe

    Secureframe

    Secureframe helps organizations get SOC 2 and ISO 27001 compliant the smart way. We help you stay secure at every stage of growth. Get SOC 2 ready in weeks, not months. Preparing for a SOC 2 can be confusing and full of surprises. We believe achieving best-in-class security should be transparent at every step. With our clear pricing and process, know exactly what you’re getting from the start. You don’t have time to fetch your vendor data or manually onboard employees. We’ve streamlined every step for you, automating hundreds of manual tasks. Your employees can easily onboard themselves through our seamless workflows, saving you both time. Maintain your SOC 2 with ease. Our alerts and reports notify you when there’s a critical vulnerability, so you can fix it quickly. Get detailed guidance for correcting each issue, so you know you’ve done it right. Get support from our team of security and compliance experts. We strive to respond to questions in 1 business day or less.
  • 4
    Scrut Automation
    With Scrut, automate your risk assessment and monitoring, build your own unique risk-first infosec program, effortlessly manage multiple compliance audits, and demonstrate trust with your customers, all from a single window. Discover cyber assets, set up your infosec program and controls, continuously monitor your controls for 24/7 compliance, and manage multiple compliance audits simultaneously, all through a single window on Scrut. Monitor risks across your infrastructure and application landscape in real-time and continuously stay compliant with 20+ compliance frameworks. Collaborate with team members, auditors, and pen-testers with automated workflows and seamless artifact sharing. Create, assign, and monitor tasks to manage daily compliance with automated alerts and reminders. With the help of 70+ integrations with commonly used applications, make continuous security compliance effortless. Scrut’s intuitive dashboards provide quick overviews and insights.
  • 5
    ThirdPartyTrust

    ThirdPartyTrust

    ThirdPartyTrust

    TPRM by ThirdPartyTrust is your one pane of glass risk dashboard: An end-to-end document repository and workflow automation tool to scale your vendor risk management program. Leverage a network of 17,000+ existing vendor profiles to fast forward your reviews and stay proactive with continuous monitoring. Beacon is the one source of truth for third party vendors: A centralized security profile comprising all your questionnaires, certifications, and attestations. Answer them once and easily share the latest versions any time your team receives a security assessment request. The tool will help you manage your end-to-end process, reducing the time spent on requesting and reviewing security documents.
    Starting Price: $120000.00/year
  • 6
    Panorays

    Panorays

    Panorays

    The fastest way to securely do business together. Automating Third Party Security Lifecycle Management. Gain a 360° view of the supplier through a combination of the hacker’s view and internal policy. The hacker’s view tests the posture just like a hacker would evaluate a company. The internal policy ensures that the supplier complies with security policies and practices. The most seamless end-to-end third party security workflow solution. Panorays’ rapid security ratings are based on an “outside-in” simulated hacker’s view of assets, combined with an “inside-out” view that checks that the supplier adheres to your internal company security policies. Panorays’ automated customized security questionnaires include only the questions that are relevant for each supplier, and you can track progress with a click. Choose from a built-in template or create your own.
  • 7
    UpGuard

    UpGuard

    UpGuard

    The new standard in third-party risk and attack surface management. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day. Continuously monitor your vendors, automate security questionnaires, and reduce third and fourth-party risk. Monitor your attack surface, prevent data breaches, discover leaked credentials, and protect customer data. Scale your third-party risk program with UpGuard analysts, and let us monitor your organization and vendors for data leaks. UpGuard builds the most powerful and flexible tools for cybersecurity. Whether you’re looking to prevent third-party data breaches, continuously monitor your vendors, or understand your attack surface, UpGuard’s meticulously designed platform, and unmatched functionality helps you protect your most sensitive data. Hundreds of the world’s most data-conscious companies are scaling faster and more securely.
    Starting Price: $5,249 per year
  • 8
    Rescana

    Rescana

    Rescana

    Successful risk programs rely on accuracy in the process of discovering and managing assets and only then assessing the risks. Rescana's artificial intelligence preforms asset attribution, thereby keeping false positives to a minimum. Rescana's form engine gives you the flexibility you need to conduct your risk surveys. Use and customize our built in forms, or upload your own to make the perfect survey. Infinitely scalable, our army of collector bots scour the deepest corners of the web in search of your assets and data on a daily basis. With Rescana you are always up to date. Integrate into your procurement system, and make sure vendors are classified correctly from the beginning. Rescana's flexible survey will ingest any existing questionnaire, and is feature rich - providing the best experience for you and your vendor. Communicate the vulnerabilities to your vendors with ease, re-certify them quickly with pre filled forms.
    Starting Price: $25 per month
  • 9
    SecurityScorecard

    SecurityScorecard

    SecurityScorecard

    SecurityScorecard has been recognized as a leader in cybersecurity risk ratings. Download now to see the new cybersecurity risk rating landscape. Understand the principles, methodologies, and processes behind how our cybersecurity ratings work. Download the data sheet to learn more about our security ratings. Claim, improve, and monitor your scorecard for free. Understand your vulnerabilities and make a plan to improve over time. Get started with a free account and suggested improvements. Gain a holistic view of any organization's cybersecurity posture with security ratings. Leverage security ratings for a variety of use cases, including risk and compliance monitoring, M&A due diligence, cyber insurance underwriting, data enrichment, and executive-level reporting.
  • 10
    Conveyor

    Conveyor

    Conveyor

    Build trust with customers around data security. Conveyor is a platform that provides cloud-based companies what they need to prove they are trustworthy to their customers and ensure their vendors are trustworthy. Join the network and simplify building trust around data security. Conveyor is building the largest network of companies who know data security is a business driver not a cost center. We are creating a more trustworthy internet by simplifying the exchange of security information. Move compliance earlier in the sales cycle by streamlining sharing your security posture to customers and prospects. Spend 60% less time responding to customer security reviews by quickly answering questionnaires and enabling instant, self-serve access to security documents.
  • 11
    VISO TRUST

    VISO TRUST

    VISO TRUST

    VISO TRUST's AI-powered third-party risk platform lets your security team effortlessly access risk intelligence for any number of third parties. Instantly assess all your third parties without hiring additional analysts and take action to reduce risk without reading documents and analyzing surveys. Leverage data from thousands of vendors to gain unparalleled risk intelligence. VISO TRUST is the only SaaS third-party cyber risk management platform that delivers the rapid security intelligence needed for modern companies to make critical risk decisions early in the procurement process. Frictionless due diligence simplifies an otherwise complex process and allows companies to effortlessly assess any number of third parties. Leverage curated AI to extract insights from source artifacts and automatically determine vendor security posture without any user interaction. Gain a comprehensive overview of your organization's cyber risk posture and make data-driven decisions to reduce risk.
  • 12
    Whistic

    Whistic

    Whistic

    The best way to assess, publish, and share vendor security information. Automate vendor assessments, share security documentation, and create trusted connections—all from the Whistic Vendor Security Network. Once companies start using Whistic, they can’t imagine how they managed vendor security assessments or responded to questionnaire requests before. Avoid the black box security reviews of the past by openly sharing vendor security requirements and publishing profiles. Focus on establishing trust rather than chasing down spreadsheets. Initiate assessments, assign inherent risk, engage vendors, calculate risk scores and trigger reassessments—automatically. In the fast-paced business environment we’re living in, no one has time for the slow, outdated security review processes of the past. Access the security posture of thousands of businesses immediately with Whistic.
  • 13
    RiskRecon

    RiskRecon

    RiskRecon

    Automated risk assessments tuned to match your risk appetite. Get the intimate risk performance assessments you need to efficiently manage your third-party risk. RiskRecon’s deep transparency and risk contextualized insights enable you to understand the risk performance of each vendor. RiskRecon’s workflow enables you to easily engage your vendors to realize good risk outcomes. RiskRecon knows a lot about your systems. Know what RiskRecon knows. Get continuous objective visibility of your entire internet risk surface, spanning managed, shadow and forgotten IT. RiskRecon knows a lot about your systems. Know what RiskRecon knows. Get continuous objective visibility of your entire internet risk surface, spanning managed, shadow and forgotten IT. See the intimate details of every system, the detailed IT profile and security configuration. We’ll even show you the data types at risk in every system. RiskRecon’s asset attribution is independently certified to 99.1% accuracy.
  • 14
    ProcessUnity

    ProcessUnity

    ProcessUnity

    ProcessUnity Vendor Risk Management is a software-as-a-service (SaaS) application that helps companies identify and remediate risks posed by third-party service providers. Combining a powerful vendor services catalog with risk process automation and dynamic reporting, ProcessUnity VRM streamlines third-party risk activities while capturing key supporting documentation that ensures compliance and fulfills regulatory requirements. ProcessUnity VRM provides powerful capabilities that automate tedious tasks and free risk managers to focus on higher-value mitigation strategies. Powerful capabilities for real risk reduction. A proven track record of customer success. Schedule your personalized demo of our award-winning software and start your journey to a more mature, automated program. ProcessUnity Vendor Risk Management protects corporate brands by reducing risk from third parties, vendors and suppliers.
  • 15
    ClearOPS

    ClearOPS

    ClearOPS

    ClearOPS helps buyers and sellers manage their vendors and satisfy due diligence requirements. ClearOPS is a full-circle third-party risk platform. With ClearOPS you can track and monitor all of your vendors, send assessments and upload evidence, and respond to their customer's vendor management processes. Vendor security questionnaires are like a hot potato, no one wants to do them. So our A.I. takes the first pass saving massive amounts of time. As a system of record, you never have to watch the information about your own business walk out the door. You won the customer, now what? Well, you have to retain them, and maintaining that healthy trust is what we are all about. ClearOPS manages privacy and security operations information so that it is easily accessible and up to date. Simple third-party risk management software solution. Inspire your colleagues with empowerment and assess your vendors on your schedule.
    Starting Price: $500 per month
  • 16
    Blue Umbrella GRC

    Blue Umbrella GRC

    Blue Umbrella

    Identify and manage third-party risk. A modular, best-in-class, plug & play compliance platform to effectively manage multiple areas of third-party risk. Buy Only What You Need. Blue Umbrella GRC is designed to scale as your third-party risk management program matures and expands. Get started today with one module or create a bundle and build from there. Streamline your data. Forget using multiple tools and systems to manage third-party risk. Blue umbrella grc centralizes it all. Get started today. Sign up online and get started within minutes with a hassle-free setup and friendly user interface. Trusted expertise. Tap into the gold standard of third-party risk management questionnaires, including anti-bribery and corruption, data privacy, ccpa, it security and more. Automate the process Each module is built so you can easily identify risk in your vendor relationships and take actionable steps to remediate.
    Starting Price: $325 per month
  • 17
    Avetta

    Avetta

    Avetta

    Avetta connects the world's leading organizations with qualified suppliers, contractors and vendors. Avetta’s expertise is contractor management services. When you hire a contractor, you want to know they have the qualifications you need—the experience, the workforce, the certifications. With Avetta’s software you can find all the information you need to manage your supply chain in one central, customizable location, instead of having to gather it from several departments. Prequalifying suppliers is an important first step to managing supply chain risk. But collecting all the right documentation, verifying the data, and managing the process for a large number of suppliers is both complicated and costly. When you work with Avetta, our team of professionals does all the heavy lifting. We’ll streamline your qualification process, saving you time and money.
  • 18
    Counself

    Counself

    Counself

    Counself Risk™ is designed for legal, making onboarding a breeze and due diligence an easy check-in. Take advantage of Counself’s library of legal industry best-practice forms, questionnaires, documents, and request templates to expedite your compliance gathering and monitoring processes. Counself RFP™ leverages and compares AFAs to increase price predictability and cost optimization for your legal department. Host sealed bidding events, perform conflict checks, attach custom forms and documents, and send requests to as many firms you want at once, securely and separately. We put data security at the forefront of everything we do because we understand how valuable your data is – to you and to cybercriminals.
  • 19
    3rdRisk

    3rdRisk

    3rdRisk

    Whether it concerns cyber, sustainability, compliance, or continuity risks, your supplier (third-party) relationships are a growing area of concern. The occurrence and impact of third-party incidents and compliance obligations are increasing. Our platform serves as a secure, all-in-one hub, facilitating multidisciplinary collaboration among all internal risk disciplines, business teams, and third-party partners. It enables the seamless and secure sharing of documents and questionnaires, while also providing a collaborative space for working on shared requirements. While working on one platform, internal teams can choose what information they would like to share with other teams and external parties. Our third-party catalog connects seamlessly with your internal procurement systems and external data feeds, creating a centralized overview of your entire third-party landscape. This comprehensive view includes everything you need to know about contracts and specific characteristics.
  • 20
    VivoSecurity

    VivoSecurity

    VivoSecurity

    Regulators and management need 3rd party assessment that are accurate and not based upon opinions or assumptions. VivoSecuiry enables our customers to satisfy regulators by assessing true 3rd party risk, which is the probability that one of their vendors will have a data breach, obsoleting the use of questionnaires, maturity scores and SOC2 reports. The risk from 3rd parties is from breaches caused by the sheer number of vendors. VivoSecurity quantifies this risk twice per year, with an aggregate forecast. We help senior management set risk appetite goals with a testable forecast of data breach frequency. We help cybersecurity teams identify the few vendors that represent most of the risk, we then quantify the value of mitigation. Finally, we satisfy regulators with an accurate and documented process for vendor assessment using an empirical and transparent regression model for probability of data breach.
  • 21
    Venminder

    Venminder

    Venminder

    Venminder is loaded with all the features you need for effective third-party risk management. Complete inherent risk assessments to determine which of your vendors require attention. Streamline the onboarding, ongoing management and offboarding of your vendors with dedicated workspaces. Manage each stage in our purpose-built configurable software platform. Risk assessments are an extremely important activity to complete on your vendor's products as they provide you with the level of risk a product will or is posing to your organization. The Venminder platform enables you to create custom risk assessment questions, invite unlimited internal users to contribute answers, apply scoring preferences, create clear and concise risk rating reports and more. Features also include template creation, progress monitoring and residual risk capabilities.
  • 22
    C1Risk

    C1Risk

    C1Risk

    C1Risk is a technology company and the leading cloud-based, AI, enterprise risk and compliance management platform. Ou vision is to demystify and take the complexity out of risk management. We aim to To simplify your risk and compliance management for you to build and maintain the trust of your stakeholders. C1Risk sets the standard for companies that lead with risk, to win, with a full suite of solutions for a single, affordable price. GRC Regulations and Standards Library Policy Management Compliance Automation Enterprise Asset Management Risk Register and Risk Management Auto-calculated inherent and residual risk scoring Issue Management Incident Management Internal Audit Vulnerability Management Vendor Onboarding and Security Review Vendor Risk Scorecards REST API Integrations
    Starting Price: $18,000 per year
  • 23
    TrustMAPP

    TrustMAPP

    TrustMAPP

    TrustMAPP provides customers with a continuous process of measuring, reporting, planning and cintinuous improvement. Provides information security leaders with a real-time view of the effectiveness of their cybersecurity program while aligning to business objectives and risk. TrustMAPP provides the story of where you are, where you’re going, and what it will take to get there. From a single source of data, or from multiple integrations, an organization’s security posture is visible based on stakeholder perspectives: CISO, C-Suite, and Board. TrustMAPP gives organizations the ability to manage security as a business, quantifying and prioritizing remediation actions and costs.
  • 24
    Black Kite

    Black Kite

    Black Kite

    The Black Kite RSI follows a process of inspecting, transforming, and modeling collected from a variety of OSINT sources (internet wide scanners, hacker forums, the deep/dark web and more). Using the data and machine learning, the correlation between control items is identified to provide approximations. Operationalize with a platform that integrates with questionnaires, vendor management systems and process workflows. Automate adherence to cybersecurity compliance requirements and reduce the risk of a breach with a defense in depth approach. The platform uses Open-Source Intelligence (OSINT) and non-intrusive cyber scans to identify potential security risks, without ever touching the target customer. Vulnerabilities and attack patterns identified using 20 categories and 400+ controls, making the Black Kite platform 3x more comprehensive than competitors’.
  • 25
    Tandem Software
    Tandem is an online solution that eases the burden of regulatory compliance and, more importantly, improves security posture. This is your all-in-one information security and compliance solution. We named our product Tandem because it works in partnership - in tandem - with you. You bring your knowledge of your organization and your needs, Tandem brings software built by information security experts to help you organize and manage your information security program. Let Tandem carry the burden of new guidance, data tracking, document structure, and report generation. See what you are capable of when using the right tool for the right job.
  • 26
    TrustElements

    TrustElements

    TrustElements

    TrustElements helps to mitigate risk and prioritize investments. Your cyber resiliency score is defined in a percentage after analyzing all loads of data your company owns. TrustElements maps your results to industry frameworks (NIST, CIS, MITRE) and helps to establish a golden standard of cyber resilience by continuously assessing your organization exposure to risks. The TE platform enhances decision making based on your business context and helps to better allocate financial resources. Communicate cybersecurity strategy to the C-level and Board of Directors to strengthen the decision making in Security, IT, and Risk Management. Whether your challenge is vendor risk management, tight security budgets, overcoming resource obstacles or applying the right level of protection and risk management, we have your back to make your company propel.
  • 27
    Risk Ledger

    Risk Ledger

    Risk Ledger

    The Risk Ledger platform gives clients all the tools they need to run a comprehensive, cyber security-led, third-party risk management programme against their entire supply chain at speed and at scale while making it simple, free and fast for third parties to engage with the process and improve their risk management maturity. Our unique secure network model allows every organisation to both run a third-party risk management programme and respond to client risk assessments, facilitating a network of trust relationships between organisations on the platform. Organisations running a third-party risk management programme on the Risk Ledger platform benefit from: - continuous monitoring of risk controls implemented in their supply chain - visibility beyond third-parties to fourth, fifth and sixth parties - procurement cycles reduced by up to 80% - Increased supplier engagement - low per-supplier costs
  • 28
    SecurityStudio

    SecurityStudio

    SecurityStudio

    Simplify your vendor risk management program to ease the burden on your company and its employees. Standardize the process to easily locate all third and fourth-party vendors and keep track of those that pose a risk to your company. Defend against any risk created by your vendors, and against lawyers, regulators and customers if a breach occurs. Unlike other vendor risk management tools on the market, SecurityStudio doesn’t simply communicate risk. Through an easy-to-use automated workflow, SecurityStudio evaluates all third-party vendors and brings your weakest links to the surface. Then you have the power to accept, avoid or request remediation of each vendor.
  • 29
    Proteus NextGen Data Privacy
    Proteus NextGen Data Privacy software provides DPOs, Privacy teams and Legal teams with the data privacy management tools required to manage GDPR compliance, CCPA compliance or other data privacy compliance programme, comprehensively and effectively. Designed for enterprise organisations using current, secure technologies, Proteus NextGen is often regarded as the most highly configurable and comprehensive data privacy software on the market. Covering Privacy Impact Assessments, DPIAs, Transfer Impact Assessments, data mapping, reporting (eg Records of Processing Activity reports), Subject Access Request management, breach notification, vendor management, risk assessment and even automated SCC generation to help with Schrems II compliance, plus other features you would and would not expect. With training and consultancy available to get you up and running quickly, we aim for ultimate customer satisfaction. Go to our website to request a demo www.proteuscyber.com
  • 30
    D&B Onboard

    D&B Onboard

    Dun & Bradstreet

    Deliver on your internal policies and processes. Minimize regulatory and reputational risks and start working with clients more quickly. Define the purpose of your check: this applies to any new customer or supplier. Identify the company or person you want to audit. Compliance-related information such as sanction lists, media sources and PEP lists becomes available. Add your notes - eg categorization and surveillance reminders. Each run is filed and fully traceable to the employees who handled the process. The runs can then be followed up regularly to secure and automate the department’s processes. Search the data and add your own notes in the system. Keep a dated and timestamped record of the search for compliance purposes. Make faster compliant decisions because you really know your customers.
  • 31
    Contingent

    Contingent

    Contingent

    Streamline global due-diligence by importing your existing database or seamlessly searching across millions of companies for verified and compliant ownership, financial data, certifications, and much more. Helping your team understand the risks across your entire supply chain or third-party network, whilst complying with regulations. Ease the burden with real-time and relevant alerts any time your supplier or third-party is at risk. Surface relevant data by selecting tolerance criteria, disruption events or metrics you want to monitor, and receive these alerts in a channel of your choice. Uncover efficiencies and savings with deep insights and reporting at your fingertips, making the path to digital transformation fast and cost-effective. Whilst improving compliance by following the exact process that meets your standards.
  • 32
    Resilinc

    Resilinc

    Resilinc

    Got data? We do, down to the nth-tier. Gain access to 10+ years of supply chain disruptions and in-depth supplier assessments based on autonomous and human research. Whether disruption due to labor issues, cyber attacks, financial health, or natural disasters, you’ll have everything you need to know about your suppliers. By mapping your suppliers, and their suppliers – down to the nth-tier – you can visualize your entire supply chain and keep a pulse on all the potential vulnerabilities down to the site and part level. So, when disruption strikes or is on the horizon, you’ll have a lot of information at your fingertips to make an informed decision within minutes. Disruptions happen. Be the first to know and respond. Our EventWatchAI removes the noise so your alerts are 100% relevant and our team provides well-researched, actionable notifications. We monitor millions of news and social feeds daily across 100+ languages.
    Starting Price: $1,400 per month
  • 33
    SAP Ariba Supplier Risk Management
    With SAP Ariba Supplier Risk, you can help your buyers make smarter, safer decisions before purchase, simply by making risk due diligence a natural part of the procurement process. And when your buyers are well-informed, they’ll make decisions that prevent supply chain disruptions. That helps you avoid damage to your revenue or reputation. Also, you’ll gain a high degree of confidence that your supplier information is correct and up to date. This market-leading supplier risk solution lets you tailor risk views and alerts to your business, to each supplier relationship, and to your role. You can also segment suppliers based on your risk exposure. With a complete view of each supplier, you can make more timely, contextual, and accurate business decisions, and improve collaboration with your trading partners. Easily understand your supply base with data provided by integration with SAP ERP, SAP Ariba Procurement, and Ariba Network.
  • 34
    OneTrust GRC & Security Assurance Cloud
    Scale your risk and security functions so you can operate through challenges with confidence. The global threat landscape continues to evolve each day, bringing new and unexpected risks to people and organizations. The OneTrust GRC and Security Assurance Cloud brings resiliency to your organization and supply chain in the face of continuous cyber threats, global crises, and more – so you can operate with confidence. Manage increasingly complex regulations, security frameworks, and compliance needs with a unified platform for prioritizing and managing risk. Gain regulatory intelligence and manage first- or third-party risk based on your chosen methodology. Centralize policy development with embedded business intelligence and collaboration capabilities. Automate evidence collection and manage GRC tasks across the business with ease.
  • 35
    Certa

    Certa

    Certa

    Certa is a no-code workflow platform. Certa brings people, processes and data sources together within a unified platform and seamlessly integrates with your enterprise ecosystem. Certa’s workflow designer toolkit enables you to build dynamic third party solutions that can adapt with your business. A Software as Service platform for business to business interactions, including on-boarding, due diligence, risk mitigation and monitoring of their third party relationships. Highly configurable so that your organization doesn't have to change its business rules, and easy ongoing changes ensure continuous process improvement. Native integrations with major enterprise systems and over 50+ data sources. Plus our no-code open API and RPA framework enables us to integrate with new APIs in minutes. Personalized dashboards inform the process, ensuring that each users groups know what to do at all times, and what's waiting on them for review and approval.
  • 36
    Shared Assessments

    Shared Assessments

    Shared Assessments

    We’ve harnessed the collective intelligence of world’s top risk assessment and management experts to create our industry leading SIG Questionnaire and the most recognized third party risk certification, CTPRP. The VRMMM, SIG, SCA and Privacy tools are designed to meet the needs across the vendor risk management lifecycle. Certification classes and exams establish a knowledge base and verify third party risk professionals’ expertise. Studies, papers and our blog are member-driven, industry-informed and forward looking. Premier global, multi-industry event to shed light on the processes, technologies, and efficiencies in TPRM.
  • 37
    COBRA

    COBRA

    C2 Cyber

    Supply chains are complex, organic networks of relationships that grow extensively over time. Statistics show that two-thirds of security breaches originate from third parties. C2 Cyber’s Cobra platform immediately assesses the inherent risk of a supplier, saving time from the start. It then recommends a tier of service for each supplier that matches both the risk presented and the client’s risk appetite.
  • 38
    CanQualify

    CanQualify

    CanQualify

    A better way to qualify and manage suppliers, contractors, sub-contractors, and vendors. CanQualify is a cloud-based service that provides supplier risk management and compliance through pre-qualification, data collection, employee assessments, and audits. Our goal is to collaborate with our clients to build an evergreen platform that provides the necessary qualification tools that can be modified when needed to meet current and future needs. A well-informed supply chain builds teamwork, lays the groundwork for improved culture, and is one of the keys to reducing and eliminating incidents. We challenge the status quo of supplier management and provide a simpler, customizable, adaptable, and cost-effective alternative. With CanQualify, hiring clients can rest easy knowing their contractors, vendors, and suppliers comply with safety and sustainability requirements.
    Starting Price: $99 annually
  • 39
    Ion Channel
    Analyze vendor and contractor SBOMs, perform pre-purchase due diligence and ongoing verification of compliance with cybersecurity terms and conditions. Generate SBOMs for customers, enhance risk protection, provide third-party certification of supply chain assurance. Enforce enterprise policies consistently across internal development, outsourced software development and commercial products. Automate verification of compliance with security SLAs. The Ion Channel platform tames the complexity of supply chain risk management. Ion Channel enriches software inventories, manifests and SBOMs with supply chain intelligence and proprietary analytics to support low false positives, clear actions and unparalleled insights.
  • 40
    Sphera Supply Chain Risk Management
    Sphera Supply Chain Risk Management helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help. The Sphera Supply Chain Risk Management Solution helps you proactively identify, analyze and mitigate all types of supply chain risk. You can turn risk into opportunity to rise above the competition—and we can help. Prevent risk from costing you by strengthening your categories with Impact Analyzer. Assess supplier criticality and detect vulnerabilities at the category. Save valuable time by making the right moves with Action Planner. Collaborate across your organization and with your suppliers to proactively mitigate risk. For certain areas of your risk exposure, your suppliers themselves are the only ones who can provide the answers. This is where you need a professional. Establish a new level of collaboration by inviting your suppliers to join you in the next frontier of supply chain risk visibility.
  • 41
    Supply Chain Catalyst

    Supply Chain Catalyst

    Moody's Analytics

    Supply Chain Catalyst, provides a 360-degree view of suppliers across financial, sustainability, reputational and operational risk factors to assist the user to analyze vulnerabilities and anticipate potential disruptions across the supply chain. It helps organizations with complex supply chains and distribution networks to make better decisions when onboarding and monitoring their suppliers, and to mitigate exposure to risk in their supply chains. Powered by the award-winning Orbis database, Supply Chain Catalyst helps organizations to focus on specific risk factors such as financial deterioration, reputational risks, and exposure to major climate events, as well as enterprise-wide risk. It allows firms to combine their own knowledge of suppliers with our extensive company information, robust risk metrics, and extensive analytical tools.
  • 42
    GRMS

    GRMS

    GRMS | Global Risk Management Solutions

    Leveraging an advanced technology platform, GRMS is a risk assessment service that provides customizable Supplier Risk Assessment Programs. GRMS offers companies the ability to proactively manage and continuously monitor suppliers. GRMS is different than data only providers like D&B, Thomson Reuters, and others that just provide raw data. GRMS’ services include the validation of data, physical review of documents and a support system that assists suppliers to obtain compliance with a client’s unique risk assessment requirements. Available in over 120 countries, GRMS’ Supplier Risk Assessment Programs can be delivered via a SaaS model or seamlessly integrated with leading Supplier Management Platforms. Risk assessment services can include: Financial Stability, Cyber Security, Digital Insurance Verification, Document Verification, Reputational Protection, Social Responsibility, Regulatory Compliance, and Health and Safety.
  • 43
    Beroe LiVE.Ai
    Beroe LiVE.Ai is an AI-Powered Procurement Intelligence Platform that helps companies minimize risk and maximize opportunities with intelligence, data, and alerts across 1,600+ sourcing categories. Beroe LiVE.Ai can help companies: 1) Discover Market Information: Get market data for 1,600+ categories (more than 95% of NAICS spend codes are covered globally). 2) Manage Supply Risk: Determine the impact of event-led disruptions on supply chains along with multi-tier supplier mapping and associated risks. 3) Measure Category Performance 4) Track Category Cost & Prices: Monitor and forecast real-time price changes across products, services, and commodities on a real-time basis. 5) Discover Suppliers: Identify suppliers from our database of more than 4.2 million suppliers. 6) Get Category Alerts 7) Improve Your Supply Chain Visibility 8) Monitor Supplier Carbon Footprint 9) Build Skills 10) Ask Abi Anything (AI-powered digital market analyst)
  • 44
    Docutrax

    Docutrax

    Risk Toolbox Inc.

    The Docutrax online system for tracking certificates of insurance and documents is designed to successfully address best-practices risk management objectives. The system facilitates much of the repetitive, time-consuming and error-prone processes for obtaining and tracking COIs and other documents. Docutrax has been consistently proven to obtain higher rates of insurance coverage compliance at lower expense while providing previously unavailable business process efficiencies. Its highly flexible interface adapts to any business organizational requirement. Customized vendor/broker notifications and pushed email alerts to designated personnel automatically communicate with all related parties. Our professionally licensed insurance and support personnel ensure informed customer service to our client, its insureds (tenants, vendors, suuppliers, contractors, franchisees, etc.) and their insurance agents.
    Starting Price: $4,500 per year
  • 45
    Allgress

    Allgress

    Allgress

    Allgress strives to provide the best Risk Management solutions and your feedback can help us be better. We invite you to add your voice to the mix by creating a new or updating an existing review. Evaluate our IT Risk Management and/or IT Vendor Risk Management Tools solutions on Gartner Peer Insights. In 15 minutes or less, help your peers find the best Risk Management Solutions.
  • 46
    Abriska

    Abriska

    Ultima Risk Management

    Abriska is a Web-based tool (think software as a service) with a number of modules all focused on helping organizations implement a best practice approach to managing risk. The first module URM developed addressed information security risk and was followed with others looking at business continuity, supplier risk and operational risk. URM is a Microsoft partner and, as you would naturally expect, Abriska has been developed utilizing standard Microsoft technologies (e.g. .net core, SQL server). Abriska is, also, hosted within Azure, Microsoft’s cloud computing environment. Abriska has been adopted by a wide range of organizations in different industry sectors, most typically when looking to certify or comply with an International Standard (e.g. ISO 27001 and ISO 22301) and are looking for a purpose-designed risk management product that is guaranteed to meet the Standard’s requirements. URM has worked with organizations starting their risk management journey.
  • 47
    ISG GovernX
    ISG GovernX® is the first third-party management platform that allows you to proactively optimize the value of your supplier relationships, mitigate risks and manage the contract lifecycle with speed and agility. Get control of your third-party environment, improve supplier performance and decrease spend. Leverage ISG’s knowledge and insights borne from more than $460 billion worth of enterprise client-supplier transactions. Automate the entire lifecycle of third-party risk management. Minimize exposure to financial, reputation, operational, and identify risk exposure from your third parties. From onboarding, assessments, and remediations to performance monitoring and reviews, gain efficiency by automating your workflow, integration, and on-going notifications. Maintain insight and oversight of your third-party portfolio. Orchestrate and manage your complex environment of third-party relationships in one easy-to-use dashboard.
  • 48
    DoubleCheck

    DoubleCheck

    DoubleCheck Software

    DoubleCheck Risk Management system is a powerful, cloud-based platform for managing enterprise risks independently or in an integrated governance, compliance, and audit suite. Highly flexible and fully configurable, DoubleCheck’s Enterprise Risk Management software enables all stakeholders to identify, manage, and rate diverse risks that arise from various sources. Some key benefits of DoubleCheck Risk Management system include policy and document management, testing, issue creation, and the ability to carry out risk surveys to establish status. Record, monitor and review vendors or partners that interact with a firm. Vendors and suppliers are critical to your business’s success. It is important that we know everything about them and can also be prepared in case these third parties are not up to expectations or fail to perform, which can have a negative effect on your operations, profitability, and good reputation.
  • 49
    Diligent One Platform
    The Diligent One Platform (formerly HighBond by Diligent) is the end-to-end GRC platform, designed by industry experts, to create stronger IT security, risk management, compliance, and assurance. Built by industry experts who wanted a better way to work. Diligent One Platform streamlines collaboration across organizations, automates repetitive tasks, and delivers best practices in a seamless, award-winning interface—all powered by ACL Robotics and Rsam technology. Diligent One Platform is made up of a number of different products, each covering a different area of your organizational governance. All together, these products create the collective HighBond software platform. The Diligent One Platform is the only unified solution designed to centralize and unify all your board management and GRC activities. Get a consolidated view of risk across your entire organization. Curate and deliver it right to the board — so they can make better decisions.
  • 50
    Vendorly

    Vendorly

    Altisource

    Vendorly is a vendor management solution that helps meet the regulatory compliance requirements as outlined by the OCC and CFPB relating to third-party risk management. Our vendor oversight services can be managed by Vendorly or your internal team. SIMPLIFY OVERSIGHT: Centralize and consolidate all your vendors in a single repository with an intuitive SaaS-based solution and best in class operational support. RISK MANAGEMENT: Seamlessly integrated fraud prevention tool that helps mitigate third-party wire fraud risks for lending and banking industries. POWER OF THE NETWORK: With over 60,000 registered vendors, we bring new efficiencies from real-world experiences.