Best Risk Management Software - Page 14

Compare the Top Risk Management Software as of October 2024 - Page 14

  • 1
    ION Treasury

    ION Treasury

    ION Treasury

    In the world of treasury, organizations vary in size and complexity. That’s why ION offers seven unique treasury and risk management solutions, from core to enterprise, on-premises or in the cloud. One size TMS does not fit all, but one (and only one) provider does. The ION Treasury portfolio is an award-winning set of products that helps you manage liquidity of any scale, in any country, while mitigating operational, financial, and reputational risk. When deciding which delivery method is right for your organization, ION Treasury will help you navigate the differences between multi-tenant SaaS, cloud, and on-premise hosting. ION Treasury hosts your treasury management system, manages support and provides upgrades, automatically. ION Treasury hosts a single-tenant software environment for each customer. We also manage support and scheduled upgrades.
  • 2
    Jupiter

    Jupiter

    Jupiter Intelligence

    Jupiter is the market leader for climate risk analytics in key industries, including insurance, banking, asset management, real estate, energy, utilities and power, oil and gas, manufacturing, chemicals, mining, retail, agriculture, the public sector, and NGOs. Our best-in-science solutions deliver climate risk analysis of multiple perils, in spatial resolutions from portfolio to asset level, globally and across flexible time horizons and climate scenarios. Jupiter’s physical climate risk analytics have been adopted by at least one of the world’s five largest firms in asset management, banking, insurance, oil and gas, mining, power, and construction, as well as the government of the United States.
  • 3
    Imperium

    Imperium

    Imperium

    The Imperium platform is an integrated risk platform designed for operational risk and compliance functions. Organize different types of risk and control assessments on a single platform to remove duplication in effort, thereby improving business engagement. Manual processes and complex system stacks are expensive. A streamlined operational risk platform can remove much of the inefficiency and therefore significantly reduce cost. Operational risk has a ‘tick box’ brand problem. Designing highly engaging/initiative tools can change this mindset. Simplify the data model to drive efficient insightful reporting across all three lines of defense. Data is a critical issue for operational risk functions. Due to the broad nature of the risks involved: data capture, data maintenance, data governance and data analysis are extremely complex to manage efficiently. Imperium uses best-in-class tools to manage this data in the implementation of the platform.
  • 4
    GIEOM Digital Blueprint
    Digital Blueprint is your single source of truth for the processes and Standard Operating Procedures that connect your employees, partners, customers, and vendors.Without this visibility, information is dispersed across different documents, systems, and employees. This hinders change management, slows integration of new processes and systems, and increases the frequency of errors. Ultimately, this results in a poorer experience for both the user and the customer they are serving.Businesses can increase efficiency and reduce mistakes by clearly documenting both manual and system steps in a graphical, easy to understand format. Additionally, the Ops Analyzer enables businesses to identify how changes in one business element will impact other business elements.
  • 5
    StormSensor

    StormSensor

    StormSensor

    Unlike traditional methods that only allow for strategic spot checks, StormSensor® provides coverage across your sewershed, and you are not limited to one or two months of data. Our powerful analytics, which includes real-time alerts and long-term tracking, capture relevant insights so you always know how your system is performing. We’re empowering our clients with the information they need to effectively manage conditions in their stormwater and wastewater infrastructure. Receive notifications of back-ups and flooding in real-time. With StormSensor®, it's possible to quantify overflows and problems before implementing solutions that are based on empirical data. At StormSensor®, we empower our clients to make informed decisions based on real data. Unlike traditional methods that only allow for strategic spot checks, StormSensor® provides coverage across your watershed, and you are not limited to one or two months of data.
  • 6
    RiskThinking.AI

    RiskThinking.AI

    RiskThinking.AI

    We collect, codify, align and analyze billions of data-points. We create the derived data needed to calculate Climate-related Financial Risk and make all of our data available to subscribers via a secure API. We algorithmically generate multi-factor scenarios that are used to stress-test an assets climate-related exposure to Policy, Economic, Carbon, Physical, and Social Risks. We measure and rank exposure by magnitude and materiality for each risk variable, and generate Exposure Scores and Climate Risk RatingsTM for every asset, portfolio, corporate, sector, region, country and more. We help regulators, governments, financial institutions, asset managers and large corporations worldwide identify, evaluate and stress-test the potential financial impacts of climate change on industries, economies, portfolios and assets.
  • 7
    Terrafuse AI

    Terrafuse AI

    Terrafuse AI

    Extreme wildfire conditions have increased by 50% in recent decades due to climate change, causing $31B in property loss. As a result, insurance companies have refused to insure homes and businesses in California, drastically reducing their revenue. Terrafuse’s wildfire AI risk scores profile the actual likelihood of any property to burn one year ahead. Our wildfire risk product allows insurance companies to not only underwrite more businesses and reduce non-renewals to only properties with the highest burn probabilities but also price business commensurate with actual risk. We train our models to learn the interdependencies between 50+ environmental conditions (e.g. building density, dead fuel moisture, vegetation) and severity of loss over time. We also embed the physics of the atmosphere into our models using advanced machine learning techniques.
  • 8
    AISIX Solutions

    AISIX Solutions

    AISIX Solutions

    As climate change is impacting the global economy, companies worldwide are under increasing pressure from investors and regulators to understand and disclose how their business will be affected. It is essential for every company to disclose their climate risk and have a plan to mitigate the risks and adapt to the changes. Modern AI solutions require standardized, consistent and interoperable data. We help organizations to understand their data and identify opportunities for AI analytics. Our experience in developing interoperable schema and metadata helps your organization align your data to international standards.
  • 9
    IBM Security zSecure
    The IBM® zSecure Suite adds layers of security assurance, including audits, alerts, administration, reporting and authentication, that enhance the security and risk management in IBM Z® hardware, software, virtualization, and standard external security managers (ESMs) such as IBM RACF, CA ACF2, and CA Top Secret. The zSecure Suite automates security administrative tasks to help increase efficiency and reduce errors, detects internal and external threats, issues real-time alerts, and monitors compliance. Automates security administrative tasks to help increase efficiency and reduce errors. Effective identity governance can help enforce compliance management of regulations and standards. Detect threats, issue real-time alerts, and monitory compliance such as pervasive encryption utilization for GDPR. Secure strong authentication to strengthen user controls with integration for easy administration.
  • 10
    IBM Data Risk Manager
    What you don’t know can hurt you. Identify and help prevent risks to sensitive business data that may impact business processes, operations, and competitive position. IBM Data Risk Manager provides executives and their teams a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business. Identify high-value, business-sensitive information assets that are at risk from internal and external threats. Provide an end-to-end view of business metadata associated with crown jewel data. Convey meaning and value to executives with a business-consumable data risk control center. Enable conversations with IT, security, and the line of business to improve processes and mitigate risks.
  • 11
    Ideagen Risk Management
    Get the right tools and insight to know that everything is under control with Ideagen Risk Management (formerly known as Pentana Risk). It centralizes enterprise risk data and connects it to performance in a modern SaaS platform. Risk teams are free to focus on improving outcomes, powered by automation and live data. Get a complete and up-to-date view of the risks that affect business performance and compliance. Ideagen Risk Management is a built for purpose SaaS platform that’s intuitive enough for everyone in your business – from occasional users, to everyday monitoring of the risk lifecycle. Using spreadsheets and manual systems isn’t enough to manage compliance. It creates blind spots where risks and their impact are unknown. The risk management tools provided by Ideagen Risk Management connect the dots by linking every KPI, event and outcome from your business.
  • 12
    Sierra QMS

    Sierra QMS

    Sierra Labs

    Workflows designed to help you create everything needed for 510(k) submission and create quality records needed for 21 CFR Part 820 once you're ready to start selling your device. Built in tools to draft policies, procedures, and work instructions. Ability to track non-conformance, deviations, and CAPAs with customized quality management reports. As you scale and improve your workflows, policies and procedures, keep your team trained automatically. Automate validation testing on devices, apps, web, and custom off the shelf software for your enterprise. Reduce time and resources needed for lengthy testing, reporting, and approvals. Generate all your policies, procedures, and artifacts into traditional documents for audit review.
  • 13
    MCS Compliance Platform

    MCS Compliance Platform

    Compliance Solutions

    As an all-embracing compliance management system (CMS), the MCS Compliance Platform can digitally map all compliance-related issues. It is one of the most powerful available IT solutions for efficiently and effectively supporting and automating compliance tasks and processes. The MCS Compliance Platform is being used successfully in international enterprises. The MCS Compliance Platform comprises individual systems that cover the various compliance sub-areas such as business partner due diligence, supply chain compliance, whistleblowing & case management, or compliance risk management. These systems can either be run autonomously as standalone, one-off solutions or combined as a powerful, integrated compliance platform consisting of multiple systems. This modularity means that the compliance software platform can be continually added to as a company-wide compliance management system, as all the systems are perfectly aligned with one another.
  • 14
    Reciprocity ROAR Platform
    The Reciprocity® ROAR Platform, which underpins Reciprocity ZenRisk and ZenComply, gives you the ability to see, understand and take action on your IT and cyber risks. With a unified, real-time view of risk and compliance—framed around your business priorities—you’ll have the contextual insight needed to easily and clearly communicate with key stakeholders to make smart, strategic decisions that will protect your enterprise, systems and data, earning the trust of your customers, partners and employees. Convey the risk implications of business processes and priorities in addition to the overall impact to the business to enable informed, data-driven decisions. Use expert-provided guidance and best practices to gain the confidence and know-how to create, grow and mature your risk and compliance programs. Break down the silos that cause inefficiencies, gaps and blind spots by leveraging a unified view of compliance and risk.
  • 15
    SecurityGate.io

    SecurityGate.io

    SecurityGate.io

    Attackers move at the speed of bleeding-edge tech & open-source knowledge. Corporations drag an anchor of legacy GRCs & spreadsheet assessments. SecurityGate.io is the risk management acceleration platform industrial companies use to improve cybersecurity faster. Fast SaaS assessment workflows & reporting automation replace slow, disruptive processes. Blend risk assessments with real-time security data to see where risk is today and forecast where it will be tomorrow. Remediation workflows, supplier risk management, audits, progress tracking & notifications, are all simplified in one place. They have difficulty understanding what’s valuable in the data and what to do next. They often have trouble translating cyber risk into business terms. The risk management activities seem to go on forever, they’re expensive, and it’s difficult to show the ROI. The platform automatically visualizes the data and highlights what’s important, making next-step decisions easier.
  • 16
    SA Risk Manager

    SA Risk Manager

    Interact Solutions

    With Risk Manager, your company may define control practices in order to mitigate the processes risks and control their levels through de audits and contingency plans. SA Risk Manager allows to identify, analyse and audit the control practices in order to avoid the materialisation of strategic risks, processes, projects, financial, environmental, legal, and others. Risk management in an organizational vision or by business units. Mapping of processes and subprocesses associated with the company or business units. Risks identification, risks factors, and control practices. A complete workflow for audits based on processes: mapping, risks identification, control practices activities, checklist elaboration, audits, nonconformities identification, creation of correctives actions plans, and monitoring of the actions. Analysis and observations of the risks. Implementation of the best practices.
  • 17
    KorTerra

    KorTerra

    KorTerra

    Maximize efficiency of locate teams to ensure accuracy and profitability. Automate ticket workflows by dispersing and prioritizing tickets based on status, location, time of day, etc. Reduce liability, create documentation for work with use of photo attachments. Elevate the right tickets to reduce risk and easily identify which tickets should be prioritized for audit. One call centers are reporting a steady annual increase of locate requests across North America. To meet this challenge, your team needs reliable tools designed to streamline locate activities and deliver peak productivity. KorTerra Locate Management empowers your organization to maximize the use of your staff, reduce costs, and safely and efficiently perform locate work. Automate workflows to minimize costs associated with locator dispatch. Stay on schedule and reduce late locates with tools that ensure productivity.
  • 18
    PRC Software

    PRC Software

    PRC Software

    We provide comprehensive risk software solutions and cloud-hosted or on-premise installations of risk management suites. Web-based risk management software solution for tracking risk. Customizable web-based solution for simulating estimate cost. Customizable web-based solution for simulating schedule duration. Over-complicating the risk process often leads to wasted effort. PRC specializes in risk analysis, audit, and training. We have cross-industry experience in fields such as aerospace & defense, oil & gas, and engineering & construction. We believe that over-complicating the risk process often leads to wasted effort and poor results. Our goal is to “make it simple. Our workshops allow participants to identify and avoid schedule errors that result in inaccurate or skewed results. Participants learn valuable risk analysis techniques while improving and validating their existing project demands.
  • 19
    Satori CCM
    SatoriCCM monitors all your transactions across your entire business to deliver a substantial and measurable return on investment. Too often, it’s only when an organization has been significantly impacted or compromised, does it places importance on CCM. This culture of avoidance and denial, or maybe just a lack of awareness that breaches or fraud might happen, leaves an organization unnecessarily vulnerable to risk. Satori Continuous Control Monitoring (SatoriCCM) is our foundational solution because it ensures total data integrity to protect businesses from unnecessary risks, costly mistakes, and fraud. The assurance of independent continuous monitoring means peace of mind for businesses with medium to high transaction volumes and/or large numbers of employees. SatoriCCM ensures exceptions are addressed in a timely manner, daily or weekly. Exceptions that are presented to the business due to an annual review may not be relevant at the time of reporting.
  • 20
    Trava

    Trava

    Trava

    Your cybersecurity needs are unique and require unique solutions. We meet you where you are and walk you through your assessment, compliance, and insurance journey, every step of the way. Your destination may be achieving compliance with industry certifications such as SOC2 or ISO27001, but it doesn’t stop there. With Trava, our modern tools can help you bridge the gap between where you are and where you want to be by giving you the control to assess your risk, repair the most vulnerable areas, and transfer risk through insurance. Our platform is simple, we provide you better security/risk insights on your potential clients so that carriers can make a more informed policy quote decision (which usually means a lower quote than your competitors). Compliance is an important part of a comprehensive cybersecurity plan. At Trava, we help you along your compliance journey. Expand your service offerings, increase revenue, and become a trusted strategic partner to your clients.
  • 21
    TruOps

    TruOps

    TruOps

    The TruOps platform centralizes all information and connects assets to risk and compliance data, including policies, controls, vulnerabilities, issue management, exceptions, and more. TruOps is a comprehensive cyber risk management solution. Each module is designed to maximize efficiency and solve the process challenges you face today while preparing your organization for the future. Consolidate disparate information and relationships to enable intelligent and automated choices and process information through risk-based workflows. Automate and streamline oversight of vendor relationships, perform due diligence, and consistently monitor third parties with this module. Streamline and automate risk management processes. Leverage conditional questions and a scenarios engine to identify risks. Automate the identification, planning, and response processes. Easily manage plans, actions, and resources and resolve issues promptly.
  • 22
    DataGuard

    DataGuard

    DataGuard

    Use our AI-powered platform to get certified fast. And go beyond: Understand, identify and manage the security and compliance risks that matter most. We're helping customers address these challenges by building a security posture that integrates with their overall objectives, with a unique iterative and risk-based approach. Either taking the fast track to obtaining certifications or effectively reducing downtimes from cyberattacks right at the same time - we empower businesses to achieve robust digital security and compliance management with 40% less effort and an efficient budget spend. Our AI-powered platform automates repetitive tasks, simplifies compliance with complex regulations and frameworks, and helps to mitigate risks before they disrupt businesses. If needed, our in-house experts offer additional support, advising organizations on all their security and compliance challenges now and in future.
  • 23
    Everysk

    Everysk

    Everysk

    Protect your portfolios more effectively, raise more assets, test trade ideas and automate your daily risk tasks, all in a single platform. Grow your business, organize client information, comply with regulators and prepare recommendations in a fully automated fashion. Automate workflows to help you grow your business, integrate liquid and illiquid investments, and streamline your family reporting. We are the leading provider of investment workflows, enabling money managers with a platform that is fully integrated with our powerful forward-looking risk engine. Our workflows automatically analyze, organize and securely distribute portfolio reports and alerts, saving our clients valuable time. More precision to protect your investments: Powerful calculation engine designed to analyze portfolios ranging from simple equities to more complex multi-asset, long/short portfolios. Thousands of forward-looking portfolio outcomes are simulated in seconds.
  • 24
    Mobileum

    Mobileum

    Mobileum

    As demand for data and for digital services grows, operators face a continuous balancing act around investment in networks, spectrum, software and services. This leads operators into having to manage a multitude of separate vendor environments, often resulting in a complicated maze of silos connected by inefficient manual processes. This complexity can lead to problems capturing, correlating, tracking and billing individual usage events. Billions of network events are generated by telecom subscribers around the world every day. Every call, text, email or download can create hundreds of individual events that need to be captured, correlated, tracked and billed. Moreover, the quantity and complexity are only increasing - with new services, content, partners and devices being introduced daily.
  • 25
    Federato

    Federato

    Federato

    Reduce the number of sites underwriters and staff need to visit to assess risk from 15 to 1. Surface dynamic insights on appetite, winnability, and guidelines so the best business automatically floats to the top of the underwriter’s queue. Empower underwriters to make decisions in the broader context of organizational goals and strategies. Visually monitor risk accumulations, proactively manage your portfolio, and guide underwriters toward optimal outcomes. Free underwriters and staff from the burden of mundane tasks like filling out docs and hunting for risk data and underwriting guidance. Tailor-made workflows for new business, renewals, and referrals include goal setting, performance tracking, detailed account data, and risk analysis. Our platform brings dynamic risk selection and portfolio-aware insights to the last mile in underwriting and core operations through a sleek and modern workflow designed by underwriters for underwriters.
  • 26
    Compliance Foresight

    Compliance Foresight

    Whitehats Cybertech

    Whitehats is fast moving towards digital era, so we are focused on creating a secured atmosphere for secure business transactions. We are ethical hackers who just follows hacking methods to keep you safe and secure. You conduct your business, we will secure you. Just make friends with us and enjoy your digital security journey card data discovery tools. SMBs and SMEs are the backbone of the Indian economy.They play a crucial role in uplifting the economy of the nation while providing employment to millions of Indians, especially in the rural and semi-urban regions of the country. In today’s digitization world, SMB and MSME onboarding is the major challenge for them due to less resources available. Security being the prime focus in digital journey.
  • 27
    iDoc

    iDoc

    iComply Lifescience Solutions

    iDoc offers an effective document management system. Controls, and automates the documentation process like distribution, organization policies, standard operating procedures, work instructions, and so forth. It is very robust and secure in controlling document management systems and provides real-time visibility. Streamlines all the processes from creation, review, approval, and archival of critical documents and supports multiple files in a controlled manner. Integration with training management system for assignment of training and also to eliminate wrong documents which ensures accuracy to end-users and track compliance. Simplified automated documentation process, document Retrieval with Searching/Indexing capability, and document archival. Easily set up tags, labels, and descriptions that help sort information & keep track of documents. Records and maintains all documents and every change made to records provides audit trail reporting of documents or data fields.
  • 28
    OutThink

    OutThink

    OutThink

    OutThink starts by turning security awareness on its head: targeted training that not only educates but allows you to learn from your people. Combining human intelligence with data from existing security systems reveals unique patterns of risk across your organization. An innovative, disruptive solution, OutThink is the evolution of traditional security awareness training. Used by large, complex organizations (incl. FTSE 100) around the world, the OutThink SaaS platform has been developed specifically to identify, measure human risk and affect behavior change. OutThink was purpose-built by a team of visionary CISOs, security experts and researchers, for security professionals who are looking to build more effective, usable security and make people their strongest defense mechanism.
  • 29
    SRA Watchtower
    SRA Watchtower is a general ledger for every critical risk activity. It is the single source of truth for all risk and performance factors, providing you with a peerless record of where you've been. SRA Watchtower and its veteran banking practitioners provide a continuous stream of data and insights so you can see and solve risks before they become unsolvable. With SRA Watchtower, bankers, credit union leaders and insurance executives now have the most current, relevant and accurate information so they can make swift and informed policy decisions to help secure the future prosperity of their organizations. SRA technology and methodology was designed and built by former leaders from all aspects of consumer and commercial banking, financial services and credit unions.
  • 30
    Aware

    Aware

    Aware

    Aware transforms digital conversation data from Slack, Teams, Zoom, and more into real-time insights that uncover risk and deliver organizational intelligence, at scale. Digital conversations exist in every corner of your organization. Real-time collaboration is the new workflow, and social connections, for your employees, and the fastest-growing dataset in your business. This unstructured dataset has its own language and emotions. Authentic, impulsive, consumer-like messages are composed, edited, and delivered in 5 words or less. Filled with emojis, abbreviations, and multimedia messages in private, direct, and public channels across countless collaboration platforms. Traditional technology doesn’t understand the context of the nuanced dataset and unique behavior. Aware makes sense of this data, surfacing costly, unforeseen risks, and revealing insights that unlock innovation and business value. Aware brings contextualized intelligence to your business, at scale.