Best Risk Management Software - Page 13

Compare the Top Risk Management Software as of October 2024 - Page 13

  • 1
    Smile

    Smile

    Smile BV

    With Smile's online software solutions you can integrally work on reducing risks. Our software solutions can be used seperately to control risks, perform audits, register and deal with incidents and complaints and to structurally improve your organization. When combined, the solutions gain strength and create a complete platform for intergral risk management for strategic topics such as Quality, Safety and Data privacy / GDPR. Why choose Smile? Integrally improve. By and for users. Easy and (GDPR) safe. Service with a smile. As Quality & Safety Staff Officer or QSHE-professional, you’re working with different departments within your organization for higher quality and increased safety. You’re responsible for several areas of focus and provide advice to the Board regarding quality and safety measures – a big responsibility, which is often underestimated. Smile’s smart software solutions offer you more structure and overview.
  • 2
    Complyon

    Complyon

    Complyon

    We help, You comply. Make compliance an asset and improve your business through Complyon’s governance, compliance and risk management software. Our tools ensure your compliance. Data mapping Reuse, optimize and connect your dataflows to save time and secure your information. Reporting. Generate up-to-date and protocol-ready reports in seconds, covering everything from systems to risks. Decentralizing compliance. A central platform allows your compliance to be trusted by management, while being simple to update, validate and administrate. Improve your compliance with our tailor-made workflows. Central governance. Central governance and business unit input provides all the right data to secure compliance for GDPR and other regulations you need to abide by. Data flow analysis. Understand the complete overview of your data through the interconnection of activities, systems and processes, including everything from third parties and policies to legal basis and retention rules.
  • 3
    BCMsoft

    BCMsoft

    KMIR Consultants

    Your entreprise faces potential threats like natural disasters, cybercriminality, etc Whatever the event, don’t put your business at risk. Make sure that your Business Continuity Plan is ready and efficient with. Synchronized with company directories and applications. Web-base Business Continuity application. Mature & complete Saas or Site license main independent modules. Risk Management Business Continuity Internal Control. Build and maintain your BCP. Follows the 4 steps PDCA wheel. Easy integration of existing BCP. Compliant with ISO 22301 BCP standard. Relies on security and crisis standards like MEHARI, EBIOS, COSO, Basel, SOX, etc. Risk Management module. Identify major company risks Assess risks in line with Basel III recommendations. Manage inherent and residual risks. Mitigate risks and manage action plan. Monitor KRI. Business Continuity Module. Assess the major company processes. Assess the major company assets. Design the BIA Design test scenario.
  • 4
    HAYAG

    HAYAG

    HAYAG

    HAYAG customizes compliance solutions as per your unique organization needs. No matter what your need is, HAYAG’s compliance solutions present the tools you require to meet your challenge. With HAYAG, you can turn compliance along with internal standards and regulatory requirements from discomfort to comfort. Accomplish strategic advantage by dealing with laws and industry-specific governance. Get the freedom to concentrate on the vital and economic aspects of your business. Rest assured that our compliance management systems are dynamic and could adapt based on modifications and updates made to the regulatory framework. Establish a culture of compliance and make meeting external and internal regulatory requirements another positive aspect of your customer engagement strategy. No matter if you are striving to respond to data protection such as GDPR, or answering industry-focused expectations, HAYAG can be your reliable compliance partner.
  • 5
    Nexo EHS

    Nexo EHS

    Nexo CS Informática

    A complete, specialized solution in Software that NEXO CS Informática offers the corporate market, designed to streamline and optimize processes associated with the areas of Occupational Health and Safety at Work Management at your company. Management Software for Health and Safety at work. NEXO Integrated Management. Nexo Integrated Management is a solution of Nexo CS Informatica for corporate market, that improve the processes. Specialized software for the areas of Occupational Health and Safety at Work. This is a complete, specialized solution that Nexo CS Informática offers the corporate market, designed to streamline and optimize processes associated with the areas of Occupational Health and Safety at Work Management at your company. Occupational Medicine Occupational Health. PCMSO (Occupational Health Medical Control Program). Audiometry – PCA (Hearing Conservation Program). Absenteeism. Ambulatory. Spirometry. Occupational Safety. Safety at Work. PPRA
  • 6
    PlexTrac

    PlexTrac

    PlexTrac

    Our mission at PlexTrac is to improve the posture of every security team. Whether you work for a SMB, are a service provider, an individual researcher, or are a part of a large security team, there's something for you here. PlexTrac Core offers all of our most popular modules, including Reports, Writeups, Asset Management, Custom Templating and more. It's perfect for smaller security teams and individual researchers. PlexTrac also has many add-on modules that boost the power of PlexTrac. These modules make PlexTrac the ultimate platform for larger security teams. Add-on modules include Assessments, Analytics, Runbooks, and more! PlexTrac provides cybersecurity teams unparalleled power when it comes to reporting security vulnerabilities and other risk-related findings. Our parsing engine allows teams to import findings from their favorite vulnerability scanners, including Nessus, Burp Suite, and Nexpose.
  • 7
    iManSys

    iManSys

    domeba distribution

    With our software solution iManSys you meet your business obligations and comply with the applicable legal regulations. For a safe, simple and effective working environment! 7 software worlds for occupational safety. With our software solution iManSys you fulfill your business obligations, increase your legal security and fulfill all compliance requirements. As a full-service provider in the areas of health protection, occupational safety and quality management, we advise and support you in the design and implementation of a compliance management system in your company. With our software solution iManSys you fulfill your business obligations, increase your legal security and fulfill all compliance requirements. In our extensive online library you will find various whitepapers on occupational health and safety, the issues of our domeba magazine with the success stories of our users as well as information material on our HSQE software solution iManSys.
  • 8
    HITRUST Assessment XChange

    HITRUST Assessment XChange

    HITRUST Assessment Exchange

    The HITRUST XChange Manager is a purposefully-built online portal which enables real-time collaboration between organizations and their entire supply chain to efficiently manage the exchange of risk assurance information and facilitate continuous monitoring of third-party risk. This innovative portal is the only TPRM solution that is both comprehensive and modular, including the three vital components of people, process, and technology. Make better informed risk decisions by leveraging the HITRUST Third Party Risk Management methodology. The HITRUST Assessment XChange is designed to be an extension of an organizations third-party risk management program. The XChange team streamlines and simplifies the process of managing and maintaining risk assessment and compliance information from third parties. Effectively engage third parties and identify the appropriate individual(s) responsible for responding to risk assessments and compliance information requests.
  • 9
    RiskReady

    RiskReady

    TEAM Software

    Built to protect businesses and profits and minimize loss and manage incidents effectively, RiskReady helps loss prevention and risk management teams collect incident, event and audit information and improve workflows. Operating more efficiently begins with simplifying processes. When it comes to productivity, a loss prevention and risk management solution like RiskReady gives your teams the tools they need to make quick, informed decisions and produce results. Dashboards report on incidents with ease, giving you real-time data and insights for better visibility over your entire loss prevention and risk management workflow. Powerful dashboards, views and reports centralize data into easily understood visuals. Using these tools, potential risk is communicated directly to your decision-makers for next steps and control.
  • 10
    Vector LiveSafe

    Vector LiveSafe

    Vector Solutions

    Vector LiveSafe is the trusted and experienced leading mobile platform for two-way safety and security risk communications, emergency notifications, and safety tools and resources. Whether it's physical safety and security threats, lone worker risks, sexual harassment and assault incidents, or COVID-19 health concerns, the LiveSafe Platform provides all of the necessary tools to keep your organization informed and safe. Based on notifications from employees, workers, and students, security personnel can rapidly respond in real-time to incidents and threats. Security personnel and operations managers can broadcast notifications across multiple channels (SMS, phone call, email and push notification) to employees and students to keep them safe and informed. Using real-time analytics and dashboards and anonymous crowd-sourced information, security personnel and risk managers can identify potential threats and risks.
  • 11
    Tessian Human Layer Risk Hub
    Tessian’s Human Layer Risk Hub enables security and risk management leaders to deeply understand their organization’s email security posture by providing granular visibility and reporting into individual user risk levels and drivers. Human error is one of the major causes of data breaches. But, to combat human error and distribute budget and resources effectively, Security and Risk Management leaders first need to understand and report the key areas of risk. What kinds of threats are the highest risk in your organization? What people are most at-risk or likely to make a mistake? Where and how can you improve your security stack and improve safer email behavior? Tessian analyzes a broad range of signals from historical and real-time email data, uses identity data from MS directory for contextual insights, and builds a Behavior Intelligence Model (BIM) – a complete picture of each individual risk profile across five key risk drivers and generates a risk score.
  • 12
    ShieldRisk

    ShieldRisk

    ShieldRisk AI

    ShieldRisk is an Artificial Intelligent powered platform for third-party vendor risk assessment with speed and accuracy. The platform is a single, unified platform, executing vendor audits on global security & regulatory framework including GDPR, ISO 27001, NIST, HIPAA, COPPA, CCPA, SOC 1, SOC 2. ShieldRisk AI enables the analysis of auditing and advisory functions, involving time savings, faster data analysis, increased levels of accuracy, more in-depth insight into vendor security posture. ShieldRisk, in consistence with global compliance standards, helps the organizations transform cybersecurity programs to enable and provide risk free digital business strategies. We help organizations measure their vendors’ digital resilience, maximize recoveries, and lower their total cost of risk, while providing cybersecurity build-or-buy decisions. Our family of single and dual view platforms are easy to use and provide the clearest, most accurate screening and security analysis.
  • 13
    TrustLayer

    TrustLayer

    TrustLayer

    Avoid claims and lawsuits that can cost your business millions. We make time-consuming manual tasks a thing of the past. TrustLayer helps you automate the management and verification of certificates of insurance with AI & machine learning technology. Our technology enables you to verify coverages, check exclusions, get insight into insurance validity in real-time, and much more than conventional tracking tools. Real-time proof of insurance for frictionless onboarding. Easily request, verify, and track vendor insurance coverage. Offer customers live, verifiable proof of insurance. Reduce repetitive tasks that are error prone and time-consuming. Easily request and verify proof of insurance from your business partners. Verify insurance coverage and other compliance documents in real-time. Create new compliance goals for any information you want to verify.
  • 14
    Kroll Compliance
    Third parties, customers, and partners present legal, reputational, and compliance risks to your organization. The Kroll Compliance Portal arms you with the capabilities to control those risks at scale. Relative risk can dictate the need for a closer look. Emailing back and forth with analysts and downloading and saving files can slow you down, create a gap in the audit trail, and leave you vulnerable to information security risks. Take the due diligence process out of emails and file folders and bring order with the Kroll Compliance Portal. Many compliance programs become time and resource intensive because of manual processes or inflexible software. Put an end to that with the Kroll Compliance Portal’s Workflow Automation. Your business demands efficient third party onboarding. You need an accurate risk assessment. The Kroll Compliance Portal Questionnaire accelerates the onboarding process through automation, tracking and scoring in line with your risk model.
  • 15
    PwC Terrain Insights
    What if there was a platform that provides complete visibility into your IT infrastructure that you could trust? The PwC Terrain Insights platform uses automation, analytics and visualization to deliver an always-current view of critical business services and the underlying IT assets required to deliver them. Terrain Insights helps reduce the risk associated with manual, out-of-date and incomplete views of critical business services and applications by providing real-time visibility into your entire environment including on-prem, cloud and mainframe. A single, validated view helps align stakeholders so they can identify gaps and resolve issues that otherwise contribute to risk in their most critical systems. Leverage data insights to accelerate digital transformation, reduce time to respond to incidences, and manage change in your environment. A unique approach that combines analytics and automation to establish a rich, visual depiction of critical business services and applications.
  • 16
    PwC Detection and Monitoring Hub
    Detection and Monitoring Hub, a PwC Product, builds on the investments you have already made and identifies compliance insights, such as fraud and corruption, quickly while learning from the results of your monitoring. Target high-risk activities in rapidly changing markets and better allocate your resources accordingly through the application of advanced analytics and machine learning. With established models, rules, and workflows, your teams can make more consistent recommendations across your risk and compliance actions. Streamline operations into a single system, optimize alerting, and help reduce false positives to lower risk management and compliance costs. We leverage advanced algorithms and AI, coupled with our unique industry experience, to help detect risks faster and with greater accuracy. Detection and Monitoring Hub connects data, systems and processes to form a single source of truth. It’s built to get off the shelf and into action quickly.
  • 17
    PwC Enterprise Insights
    PwC Enterprise Insights uses powerful automation and analytics to identify risk, errors, issues, and opportunities across multiple platforms. Enterprise Insights helps you identify the blind spots and shed light on the risks within your enterprise system so you can quickly take action early in the process. Eliminate the need for manual monitoring and testing of controls (configurations, security, transactional) with increased precision and reduced costs. Powerful, multi-ERP analytics that identify trends, errors, control failures, and issues early in the process, saving you time and money. Creates accountability by linking analytic outputs to a workflow and routes to appropriate personnel for action. Powerful automation creating a single source of truth for managing business processes and compliance documentation, analytic and manual assessment outputs, and issue management resolution.
  • 18
    HealthSafe

    HealthSafe

    HealthSafe

    HealthSafe dynamicRMS supports environmental, quality and safety and all on the most innovative and cost-effective platform unrivaled across Australasia! Welcome to the future of safety to protect your people. Access your electronic documents with no app to compliment your business operation and save significantly financially whilst improving your health and safety culture. HealthSafe is serious about health and safety and lead Australasia businesses in ensuring their greatest assets return home safe at the end of their working shift. Cyberattacks are real and happening daily accessing your business information. HealthSafe is ISO:27001 Certified Protecting Your Data. HealthSafe replace archiac pricing models dictated by user licences and costly set-up fees. No more apps, no more changing usernames and passwords and easy access to all electronic forms complimenting any business environment.
  • 19
    Cyber360

    Cyber360

    CENTRL

    Streamline cybersecurity assessments and transform your practice to serve more clients with a best-in-class cloud platform. Identify, analyze, and mitigate cybersecurity risks with full transparency and control. Comprehensive out-of-the-box yet highly configurable workflows and controls framework provide flexibility while driving efficiencies. Design a repeatable cybersecurity assessment process that maps to your organization needs. Gain visibility if your organization’s risk profile across business units, third parties, regions. Collect and store all assessments, documents, policies, issues in a centralized repository. Proactively manage exceptions through analytics, alerts and collaboration. Start with pre-built and pre-seeded industry assessment templates, or upload your own standard practice questionnaire. Multiple modes for assessments to suit business needs, self assessments, onsite assessments, and more.
  • 20
    Corethix

    Corethix

    Core Integrity

    Corethix is your go-to compliance program for effective risk management. Managing governance and risk within your organization is an important task and yet across the globe most organizations are still relying on outdated and disconnected systems and processes for achieving optimal compliance. Corethix was designed to solve this problem by harmonizing your key activities into one easy to use and secure platform. Our leading platform makes the job of managing all of this easy, all through a consolidated software platform for effective risk management consulting. Our solution is ideal for compliance teams whilst providing boards, directors and executives with comfort that their organization is focused on dealing with issues proactively. Our platform provides a centralized and holistic view of your organization with real-time data and insights, brought to life with our innovative Integrity Risk Index™.
  • 21
    CRS Certus

    CRS Certus

    CRS Certus

    Your information is securely held, communications are safely encrypted. Our fully encrypted backups occur often and regularly. Flexible and secure user password security. Fast interfaces, user experience and reporting through the latest database design and web technology. User management tools aide efficient processes. Uncluttered user interfaces, multiple browser tab access, effortless data links. Our user-friendly and easy to learn user interface means no steep learning curve. Logical data entry flow with what you expect where you expect. You select the modules you use and customize to your needs. You control your reports' content, you tailor your installation to suit your businesses needs. One stop for all of your risk and compliance office needs. View completed and incomplete controls. Retain all your controls and records in the one accessable data base. We support the global standards on Risk Management (ISO 31000) and Compliance (ISO 19600).
  • 22
    Oracle Risk Management and Compliance
    Automate advanced security and transaction monitoring to strengthen financial controls, ensure separation of duties (SoD), stop fraud, and streamline audit workflows. Automate the analysis required to ensure all roles are audit-ready. Utilize visualizations and simulations to make the best design decisions. Use embedded sensitive access and SoD rules to ensure your roles are compliant prior to go-live. Avoid costly user acceptance testing and audit issues by designing secure ERP roles before the system goes live. Prevent tampering by continuously monitoring transactions and sensitive ERP data with built-in AI. Enable business continuity and resilience by adopting an AI-driven approach to risk management and security. Improve financial oversight by linking risk to business results. Empower employees to balance opportunities with risks. Streamline business continuity and readiness efforts.
  • 23
    Interos

    Interos

    Interos

    As disruptions increase, organizations need to modernize assessment and monitoring. What are you doing to prepare? Map and model supply chains deeper and farther, view and know everything, everywhere, about your business relationships, in seconds. Using an arsenal of natural-language AI models, trained on supply-chain data, we’ve built the most highly connected, multi-dimensional network of B2B relationships in existence. We continuously monitor global events providing real-time indicators of supply chain vulnerability and distress, across your business ecosystem, all the way down to the Nth tier. Build resilience into the extended supply chain. Proactively manage cyber threats, ensure regulatory compliance, and source confidently with one solution. Identify connections to restricted and prohibited countries, assess legal and regulatory compliance, and identify financial, cyber, governance, geographic, and operational risk down to any single supplier, anywhere.
  • 24
    VisibleRisk

    VisibleRisk

    VisibleRisk

    Cyber events have financial consequences. VisibleRisk helps you quantify the financial impact of your cyber risk, so you can make better risk management decisions across the business. Standardize cybersecurity conversations in the boardroom. Focus on business impact and outcomes. Completed a validated cyber risk assessment to optimize your program and better allocate resources. Enable better communication and decision making around regulatory compliance, M&A and cyber insurance underwriting and limits considerations. Quantifying cyber risk in financial terms empowers security professionals to communicate with other key stakeholders more effectively by speaking in a common language. Business leaders rarely allocate financial resources without fully understanding the expected return, or more specifically, cost avoidance. We leverage automation and tools to provide you with a comprehensive understanding of your organization’s exposure to cyber risk, with minimal effort on your end.
  • 25
    TrustElements

    TrustElements

    TrustElements

    TrustElements helps to mitigate risk and prioritize investments. Your cyber resiliency score is defined in a percentage after analyzing all loads of data your company owns. TrustElements maps your results to industry frameworks (NIST, CIS, MITRE) and helps to establish a golden standard of cyber resilience by continuously assessing your organization exposure to risks. The TE platform enhances decision making based on your business context and helps to better allocate financial resources. Communicate cybersecurity strategy to the C-level and Board of Directors to strengthen the decision making in Security, IT, and Risk Management. Whether your challenge is vendor risk management, tight security budgets, overcoming resource obstacles or applying the right level of protection and risk management, we have your back to make your company propel.
  • 26
    apexanalytix

    apexanalytix

    apexanalytix

    apexanalytix is the world’s leading provider of supplier portal software; trusted supplier data; controls, audit and analytics software; and AP recovery audit services. We protect $9T in spend and prevent or recover over $9B in overpayments annually, and our client portals actively support over 8.5M+ suppliers – more than any other supplier network. Our software and audit services are built on our smartvm® database of 90M+ supplier records with contacts, scored for accuracy and age, based on integration with over 1,000 government, regulatory and authoritative third-party data sources and 10M+ communications with suppliers each year. apexarchimedes™, an advanced cognitive technology and innovation system, supported by IBM Watson®, is integrated into apexanalytix software and services to harness the power of the future through smarter recoveries, controls, analytics, working capital and supplier data.
  • 27
    CORIZANCE

    CORIZANCE

    CORIZANCE

    Make data driven risk decisions and predictions with customer and business transactions. Get real time risk visibility. Achieve policies and regulatory compliance. Drive more digital sales and improve the customer experience. Maximize operational performance by monitoring core business processes in real time. Ensure employee efficiency and protect your business reputation. Utilize a best practice and world-class risk management engine and prevent business disruptions. Top down and bottom up risk management enabling robust review and challenge of analytics to support decisions. Comprehensive audit trail providing confidence to management, board and regulators of coherent risk management practices. Intelligent platform delivering award winning, connected, more accurate risk management and intelligence for business, risk and compliance teams to manage and benchmark business risks, increase resilience, reduce costs, protect revenue and business growth.
  • 28
    Digital Harbor

    Digital Harbor

    Digital Harbor

    Digital Harbor, a leader in risk Management, offers the industry’s most advanced end-to-end operational intelligence suite for detection, investigation, assessment and monitoring of risk and fraud. With its indigenous social enterprise technology (SET) universal platform, Digital Harbor seamlessly enables collaboration both within and between the enterprise knowledge workers, end users and all relevant stakeholders, aiding in effective risk management and in making informed decisions; thus transforming the enterprises from focusing on "better transactions" to "better decisions". Digital Harbor has been at the forefront of creating “first-of-its-kind” technologies, platforms and products across multiple verticals. We were the first to create a “link analytics” platform for intelligence agencies, first to create a smart client technology for web, first to create model-driven frameworks for J2EE, first to create a unified composite application platform.
  • 29
    Stable

    Stable

    Stable

    Match & manage your physical risk using thousands of relevant, targeted & local indexes. We reference the index you select to create a simple contract with minimal basis risk, backed by a rated reinsurers. Stable offers a safe harbor for businesses exposed to volatile prices. We do this by hosting thousands of 3rd party indexes that are local, or tightly correlated to the physical risks our clients are facing. From financial controllers to farmers, Stable has democratised hedging for businesses of every size and sector to create the financial stability they need to invest in the future with confidence.
  • 30
    Red Oak Software

    Red Oak Software

    Red Oak Compliance Solutions

    Red Oak Software, formally AdMaster Compliance™, is a comprehensive suite of SEC 17A-4 compliant features, tailored to meet the evolving needs of financial firms, small and large. Our workflow software allows your firm to minimize risk, reduce costs, and increase efficiencies in your compliance review process. Building and executing an effective compliance program is tedious and requires specialized knowledge. Our secure, cloud-based technology is the result of years of collaboration between compliance professionals and technology architects, created to manage the entire compliance review process from start to finish. We understand that Compliance does not operate in a vacuum. Red Oak Software is tailored to meet the evolving needs of financial firms, small and large. Work seamlessly with your firm’s internal departments and the external entities you must engage to be fully compliant.