Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Enhance your cybersecurity evaluations and elevate your practice to accommodate a larger client base with a top-tier cloud solution. Effectively pinpoint, scrutinize, and address cybersecurity vulnerabilities while maintaining complete transparency and oversight. A thorough, ready-to-use, yet adaptable framework of workflows and controls allows for flexibility and promotes operational efficiencies. Develop a systematic cybersecurity evaluation process that aligns with the specific requirements of your organization. Achieve a clearer understanding of your organization's risk profile across various business units, external partners, and geographical regions. Centralize the collection and storage of all assessments, documents, policies, and issues in one repository. Manage exceptions proactively through the use of analytics, alerts, and team collaboration. Begin your journey with industry-standard assessment templates that are pre-built and pre-seeded, or choose to upload your own customized questionnaires. Different assessment modes, including self-assessments and onsite evaluations, are available to cater to diverse business needs. This comprehensive approach ensures that you can address cybersecurity challenges effectively while scaling your operations.

Description

Isora GRC streamlines your IT Risk Assessments. Use Isora GRC to perform IT Risk Assessments. It is a lightweight and powerful surveying tool. Create self-assessment questions for departments, people and facilities. Use our preloaded questionnaires such as NIST, HIPAA and GLBA to help you. Build or upload your custom questionnaires. To simplify your questionnaires, you can change question weights, allow partial credits, gate conditional questions, or add question logic. Automatically score and rollup collected qualitative and quantitative survey data. Access dynamic risk reports. The risk map can be used to identify high-risk units. The trend graph can be used to track risk scores over time. The RESTful API allows you to easily export the raw data into data analytics tools such as Microsoft PowerBI.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Adobe Marketo Engage
BMC AMI Capacity and Cost
Box
Dropbox
HubSpot CRM
HubSpot Customer Platform
Jira
Microsoft Dynamics 365
Microsoft Power BI
NetSuite
Oracle Siebel CRM
SAP Cloud Platform
SAP Concur
SAP SuccessFactors
ServiceNow
Tableau
Twilio
Workday Extend
X (Twitter)
Zendesk

Integrations

Adobe Marketo Engage
BMC AMI Capacity and Cost
Box
Dropbox
HubSpot CRM
HubSpot Customer Platform
Jira
Microsoft Dynamics 365
Microsoft Power BI
NetSuite
Oracle Siebel CRM
SAP Cloud Platform
SAP Concur
SAP SuccessFactors
ServiceNow
Tableau
Twilio
Workday Extend
X (Twitter)
Zendesk

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

CENTRL

Founded

2015

Country

United States

Website

www.centrl.ai/products/cyber-security-risk-assessment-software/

Vendor Details

Company Name

SaltyCloud, PBC

Founded

2017

Country

United States

Website

www.saltycloud.com/isora

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Product Features

Compliance

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

GRC

Auditing
Disaster Recovery
Environmental Compliance
IT Risk Management
Incident Management
Internal Controls Management
Operational Risk Management
Policy Management

IT Asset Management

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Alternatives

Alternatives

CyberStrong Reviews

CyberStrong

CyberSaint Security