Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

This is a cyber information risk management solution that conforms to the ISO 27001:2013 standards. It effectively reduces the time dedicated to risk management processes while delivering audit-ready results on an annual basis. Being a web-based platform, it allows users to perform information security risk assessments with remarkable speed and efficiency. The tool is compatible with a variety of devices, including desktops, laptops, iPads, and mobile phones, ensuring accessibility from any location at any time. Organizations must understand the risks they encounter in managing their information assets, which encompass applications, services, processes, and locations, as well as the significance and associated risks of these assets. The arc tool empowers organizations to achieve these insights and more through its targeted modules for Asset Management, Business Impact Assessment, Risk Assessment, and User Administration. By utilizing this tool, users can generate consistent, repeatable, and dependable risk assessments that ultimately save both time and financial resources, enhancing the overall effectiveness of their risk management strategy. Furthermore, it fosters a culture of proactive risk management within the organization, leading to improved decision-making and safeguarding of vital information assets.

Description

Submit your questionnaires and establish your risk tolerances, and you're equipped for your initial evaluation. Leverage your customized questionnaires along with your proprietary scoring system. Effortlessly audit vendors with a centralized platform for tracking issues and managing remediation. With users spanning across 40 nations and comprehensive support for all major languages, ProcessBolt has transformed this organization's approach to third-party risk management. The role of the security analyst has evolved, as any relationship manager can now initiate an assessment or RFP process independently, eliminating previous bottlenecks. The once cumbersome email threads, Excel files, and vendor documents are now consolidated in a single location, significantly reducing the workload on the security team while also conserving both time and resources for the company. This streamlined approach not only enhances efficiency but also fosters a more agile response to vendor-related risks.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

MeridianLink Opening

Integrations

MeridianLink Opening

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$1995 per year
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Aloka

Founded

2002

Country

United Kingdom

Website

www.arcrisk.com

Vendor Details

Company Name

ProcessBolt

Founded

2017

Country

United States

Website

www.processbolt.com

Product Features

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Product Features

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Alternatives

Alternatives

CyberStrong Reviews

CyberStrong

CyberSaint Security
Cyber360 Reviews

Cyber360

CENTRL