What Integrates with Onspring?
Find out what Onspring integrations exist in 2024. Learn what software and services currently integrate with Onspring, and sort them by reviews, cost, features, and more. Below is a list of products that Onspring currently integrates with:
-
1
Common Controls Hub
Common Controls Hub
$4,995 per yearUsing the largest collection of regulatory content, you can efficiently gather the evidence that you need to prove compliance. The Common Controls Hub Software-as-a-Service interface lets you quickly retrieve the data you need from the underlying Unified Compliance Framework. Select the regulations that you need to comply with, and all the associated Common Controls will be displayed in a unified, hierarchical list. You can customize your Common Controls by choosing the industries, market segments, or geographies that are relevant to your company. GRC requirements can be reduced to the minimum required to ensure compliance. To drastically reduce audit requirements, generate an instant gap/overlap analysis of Authority Documents. GRC processes can be streamlined to reduce time, resources and other compliance-related costs. Combine new compliance regulations with existing controls to quickly incorporate incremental changes. -
2
SecurityScorecard
SecurityScorecard
SecurityScorecard has been recognized for its leadership in cybersecurity risk ratings. Download now to view the new cybersecurity risk rating landscape. Learn the principles, processes, and methodologies behind our cybersecurity ratings. To learn more about our security ratings, download the data sheet. Freely claim, improve, and track your scorecard. Make a plan to improve your weaknesses and understand them. Get started with a free account. Get a complete view of your organization's cybersecurity posture using security ratings. Security ratings can be used for a variety purposes, including compliance monitoring, risk and compliance monitoring and cyber insurance underwriting. Data enrichment and executive-level reporting are just a few examples. -
3
RiskRecon
RiskRecon
Automated risk assessments that match your risk appetite. Get the detailed risk performance assessments that you need to effectively manage third-party risks. RiskRecon's deep transparency allows you to understand each vendor's risk performance. RiskRecon's workflow makes it easy to engage vendors and achieve good risk outcomes. RiskRecon has a lot of information about your systems. RiskRecon knows a lot about your systems. Continuous objective visibility of all aspects of your internet risk surface, including managed, shadow, and forgotten IT. RiskRecon has a lot of information about your systems. RiskRecon knows a lot about your systems. Continuous objective visibility of all aspects of your internet risk, including shadow, managed, and forgotten IT. You can see the details of each system, including the IT profile and security configuration. We will even show you which data types are at risk in each system. RiskRecon's asset attributization is independently certified to 99.1% accuracy. -
4
Regology
Regology
First of its kind, we have codified human law intelligence, scaled millions and established billions of links among them, and mapped them into compliance objects. Regology will save you hundreds of hours by identifying the impact of regulatory changes. Smart law library that keeps all your regulatory content current. All the latest updates and actionable content are at your fingertips. Your smart library has deep compliance functionality. Intelligence that tracks the progression of the law-making process. The AI Engine can track interconnected legal systems within and between jurisdictions using Regology's standard reference. The text is easier to understand and read because it includes definitions, requirements, as well as the scope of applicability. Multi-jurisdictional and agency intelligence is a powerful combination that leads to a new era in compliance and research. -
5
Black Kite
Black Kite
The Black Kite RSI is a process that involves inspecting, transforming and modeling data from a variety OSINT sources (internet-wide scanners, hacker forums and the deep/dark internet). The correlation between control items can be identified using machine learning and data. A platform that integrates seamlessly with questionnaires, vendor management system and process workflows allows you to operationalize. A defense in depth approach reduces the risk of breaches and automates compliance with cybersecurity requirements. The platform uses Open-Source Intelligence and non-intrusive cyber scans without ever touching the target customer to identify potential security threats. Black Kite's platform is 3x more comprehensive than other platforms in terms of identifying vulnerabilities and attack patterns using 40 categories and 400+ controls. -
6
Ascent
Ascent RegTech
Simple regulatory monitoring. All regulatory content from around world is available in one place. You can search, organize, and search for it. You can monitor and prioritize regulatory changes that affect your business. You won't be surprised by any new or updated rules. You can view documents organized by industry-standard themes, such as cybersecurity and AML, or by your custom themes. You can work the way that you prefer to gain insight into emerging regulatory trends. You can mark documents and give them to your colleagues for their review. You can track work and make sure it is completed by managing your own obligations. All rule updates, guidance notes and speeches are consolidated in one location. To reflect the actual work of Compliance and Risk Officers, documents are organized according to key regulatory themes. Monitoring rule changes can save you 20+ hours. Ascent displays the information you are interested in. -
7
BitSight
BitSight
The world's most trusted security rating platform allows you to make data-driven decisions that reduce cyber risk. BitSight is the most widely used Security Ratings platform. It has a mission to transform the way the world approaches cyber risk. BitSight provides data-driven and dynamic measures of an organization's cybersecurity performance. These measurements are derived from objective, verifiable, material and validated measurements that were created by an independent, trusted organization. BitSight for Security Performance Management assists security and risk leaders in taking a risk-based and outcome-driven approach to managing their organization's cybersecurity performance. This includes broad measurement, continuous monitoring, detailed planning and forecasting to reduce cyber risk. You can make quicker, more strategic cyber risk management decision.
- Previous
- You're on page 1
- Next