Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Protecting your sensitive information, operations, and reputation from the constantly changing landscape of cyber threats is crucial for any organization. With 360inControl®, you have the tools necessary to establish and execute effective protection strategies. Earning certifications not only enhances a company’s reputation but also boosts its efficiency, compliance with industry regulations, and trustworthiness among customers. 360inControl® facilitates the certification process in a manner that is both cost-effective and time-efficient. Given the rising complexity of regulatory demands, utilizing 360inControl® allows your organization to effectively reduce risks while ensuring robust governance practices. Its control library is centrally managed yet customizable and extendable to fit unique needs, allowing for predefined scenarios that help identify relevant controls. The flexibility and comprehensive approach of 360inControl® make it an invaluable asset for any company striving to enhance its cybersecurity posture.

Description

The new standard for third-party risk management and attack surface management. UpGuard is the best platform to protect your organization's sensitive information. Our security rating engine monitors millions upon millions of companies and billions upon billions of data points each day. Monitor your vendors and automate security questionnaires to reduce third- and fourth-party risk. Monitor your attack surface, detect leaked credentials, and protect customer information. UpGuard analysts can help you scale your third-party risk management program and monitor your organization and vendors for potential data leaks. UpGuard creates the most flexible and powerful tools for cybersecurity. UpGuard's platform is unmatched in its ability to protect your most sensitive data. Many of the most data-conscious companies in the world are growing faster and more securely.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Akitra Andromeda
Captain Compliance
Mindflow
OneTrust Third-Party Management
ServiceNow
Skypher
Slack
Stackreaction
UpGuard BreachSight
Zapier

Integrations

Akitra Andromeda
Captain Compliance
Mindflow
OneTrust Third-Party Management
ServiceNow
Skypher
Slack
Stackreaction
UpGuard BreachSight
Zapier

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$5,249 per year
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

CISS

Founded

2016

Country

Switzerland

Website

360incontrol.ch

Vendor Details

Company Name

UpGuard

Founded

2012

Country

United States

Website

www.upguard.com

Product Features

GRC

Auditing
Disaster Recovery
Environmental Compliance
IT Risk Management
Incident Management
Internal Controls Management
Operational Risk Management
Policy Management

Product Features

Application Lifecycle Management

Administrator Level Control
Defect Tracking
Iteration Planning
Project Management
Release Management
Requirements Review
Task Management
Test Case Tracking
User Level Management
Version Control

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

INControl Reviews

INControl

Tracer Workflow

Alternatives

Key Control Dashboard Reviews

Key Control Dashboard

Yellowtail Control Solutions
BitSight Reviews

BitSight

Bitsight