Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Perimeter VRM revolutionizes Vendor Risk Management by combining automation, continuous monitoring, and AI intelligence into one unified solution. It streamlines onboarding, assessments, issue management, and reporting—delivering end-to-end control across your vendor ecosystem. The platform’s AI-powered data extraction validates vendor self-attestations by cross-referencing multiple data points, ensuring accuracy and transparency. Continuous monitoring tracks each vendor’s security posture in real time, providing early breach notifications and actionable risk insights. Unlike legacy VRM systems, Perimeter deploys in under a week and requires no external implementation partner. Its intuitive workflows, customizable assessments, and dynamic dashboards simplify complex compliance processes while improving coverage. Designed with responsible AI guardrails, Perimeter empowers risk professionals with confidence and control. From automation to validation, it delivers painless, proactive, and measurable vendor risk management.
Description
Smarsh is a unified communications intelligence platform that helps organizations manage compliance and risk with confidence. It captures and archives communications across email, mobile, voice, chat, video, and AI-enabled channels in their native formats. Built specifically for regulated industries, the platform supports global regulatory and data retention requirements. AI-powered analytics identify potential risks, misconduct, and emerging issues before they escalate. Centralized access to data streamlines legal discovery and speeds up investigations. Intelligent search, tagging, and filtering uncover insights that legacy tools often miss. Open APIs allow seamless integration with existing compliance and IT systems. Hyperscalable cloud infrastructure supports high-volume data ingestion and export. End-to-end encryption protects sensitive communications data at all times. Smarsh helps organizations turn compliance from a requirement into a strategic advantage.
API Access
Has API
API Access
Has API
Integrations
Constant Contact
Google Workspace
Hootsuite
Intulse
Microsoft OneDrive
Microsoft Outlook
Microsoft SharePoint
Microsoft Teams
Moxo
MyRepChat
Integrations
Constant Contact
Google Workspace
Hootsuite
Intulse
Microsoft OneDrive
Microsoft Outlook
Microsoft SharePoint
Microsoft Teams
Moxo
MyRepChat
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Perimeter
Founded
2017
Country
United States
Website
perimeter.net
Vendor Details
Company Name
Smarsh
Founded
2002
Country
United States
Website
www.smarsh.com
Product Features
Risk Management
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment
Product Features
Archiving
Access Control
Data Deduplication
Document Management
Email Archiving
Multimedia Archiving
Retention Management
Storage Management
Version Control
Web Archiving
eDiscovery
Call Recording
Archiving
Call Sharing
Distributed Call Recording
Event Triggered Recording
File Transfer
Instant Retrieval
On-Demand Recording
Recording Bookmarking
Scheduled Recording
Screen Activity Recording
Video Call Recording
eDiscovery
Case Analytics
Compliance Management
Discussion Threads
Document Indexing
Document Tracking
Full Text Extraction
Keyword Search
Metadata Extraction
Topic Clustering
Email Archiving
Access Control
Backup Management
Compliance Management
Data Deduplication
Data Export
Encryption
Retention Management
Storage Management
Threat Protection
eDiscovery