Corax Description

Using cyber risk information to help you understand the impact of each cyber threat on your financial exposure, you can optimize your security budget and optimize your spending. You can now assess your financial exposure to cyber risks and make informed decisions about how to transfer or offset them. You can now see the financial risk each third party is causing you. Our database is growing by over 100,000 companies each day to provide the world's most complete model view of cyber risk. Our platform allows you to compare your industry with your peers and also offers a customizable peer group. We are a team of insurance professionals who help the largest insurers in the world to identify risks and financial impact across various industries and business types.

Integrations

No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Corax
Headquarters:
United Kingdom
Website:
www.coraxcyber.com

Media

Corax Screenshot 1
Recommended Products
Secure your business by securing your people. Icon
Secure your business by securing your people.

Over 100,000 businesses trust 1Password

Take the guesswork out of password management, shadow IT, infrastructure, and secret sharing so you can keep your people safe and your business moving.

Product Details

Platforms
SaaS
Customer Support
Online

Corax Features and Options

Financial Risk Management Software

Compliance Management
Credit Risk Management
For Hedge Funds
Liquidity Analysis
Loan Portfolio Management
Market Risk Management
Operational Risk Management
Portfolio Management
Portfolio Modeling
Risk Analytics Benchmarks
Stress Tests
Value At Risk Calculation

Risk Management Software

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Network Security Software

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning