Best PA File Sight Alternatives in 2025
Find the top alternatives to PA File Sight currently available. Compare ratings, reviews, pricing, and features of PA File Sight alternatives in 2025. Slashdot lists the best PA File Sight alternatives on the market that offer competing products that are similar to PA File Sight. Sort through PA File Sight alternatives below to make the best choice for your needs
-
1
Donesafe
143 RatingsHSI Donesafe redefines EHS management with a no-code, cloud-based platform that transforms complex processes into streamlined, user-friendly workflows. Trusted across industries, Donesafe consolidates tracking, management, and reporting into one accessible platform, making compliance simpler and safety more effective. Donesafe’s adaptable design allows teams to customize workflows, forms, and dashboards to meet evolving compliance needs. With tools for incident reporting, audits, training, and risk assessment, staying ahead of regulatory changes has never been easier. Key Features: - Customizable workflows to align with regulations - Real-time insights for live safety tracking - Scalable design that grows with your team - Streamlined compliance tools for smooth audits and reporting Empower your EHS team to achieve safety excellence with HSI Donesafe. -
2
flowdit
11 Ratingsflowdit elevates efficiency by offloading routine tasks and reducing errors, creating a networked environment that enhances employee productivity. It provides crucial support in adapting to regulations and streamlines audits and inspections, thereby driving profitability for industry leaders. As a specialized platform for connected workers, flowdit excels in areas like commissioning, quality management, maintenance, and EHS management. It promotes effective communication and collaboration across all departments, ensuring continuous process monitoring to identify and mitigate risks early. The platform is also adept at maintaining documentation integrity and enforcing standard operating procedures to keep operations streamlined and error-free. In the digital transformation realm, flowdit aids in digitizing inspection and audit processes, maintenance schedules, safety procedures, and environmental checks, integrating seamlessly with IoT and ERP systems. This not only enhances operational safety but also ensures efficient management of multiple site locations. -
3
ADAudit Plus provides full visibility into all activities and helps to keep your Windows Server ecosystem safe and compliant. ADAudit Plus gives you a clear view of all changes to your AD resources, including AD objects and their attributes, group policies, and more. AD auditing can help you detect and respond to insider threats, privilege misuse, or other indicators of compromise. You will have a detailed view of everything in AD, including users, computers, groups and OUs, GPOs. Audit user management actions, including deletion, password resets and permission changes. Also, details about who, what, when and where. To ensure that users have only the minimum privileges, keep track of who is added and removed from security or distribution groups.
-
4
SolarWinds Access Rights Manager
SolarWinds
1 RatingSolarWinds®, Access Rights Manager is designed for IT and security administrators to quickly and easily provision, deprovision, manage, audit, audit, and audit user access rights to files, systems, and data. This allows them to help protect their organizations against the potential risks of data theft or breaches. Analyzing user authorizations and access permissions will give you a visual representation of who has access to what and when. To demonstrate compliance with many regulatory requirements, customized reports can be created. Provision and deprovision users can be done using role-specific templates. This will ensure compliance with security policies and access privilege delegation. -
5
Sofvie
Sofvie
Sofvie is the only Operations Performance Platform built for the unique needs of today’s most demanding mining operations. Our goal is to help leaders at the forefront of the mining industry create safer work environments, happier engaged teams and more rewarding work cultures to unlock new levels of performance. Sofvie gives your teams the platform that helps unlock new levels of safe production and create better visibility to and from the face. Sofvie will help you create an environment where workers feel safe, supported, included and informed, driving increased engagement and empowering everyone to operate at their best. Our progressive web application functions on all modern devices, operating systems, and browsers, and has been designed for ease of use, resulting in a rich experience and quick adoption. Reduce risk to property, equipment, and people. Closes the circle of communication, reducing the gaps between teams. Identifies health and safety trends and facilitates predictive models. -
6
CPTRAX for Windows
Visual Click Software
1 RatingServer File Activity Tracking – Audit who is creating, accessing and moving your files and folders. Track file permission changes. Alerts in real-time about critical file activity Malicious activity containment (Ransomware and mass file deletions, etc. Automatically stop threats to your Windows servers by calling PowerShell scripts so you can determine exactly what you want to have happen for each type of alert/threat. Examples of containment: Disable the user causing the threat Block the remote IP causing the threat Workstation File Activity Tracking: Audit who copies files to USB or other removable media. Track who uploads files via FTP or a browser. Block files being created on USB/removable devices. Notifications by email when a removable device connects. Active Directory Auditing – Keep audit logs and receive real-time alerts about important Active Directory changes, without having to deal with SACLs or Windows Event Logs. Server Authentication Auditing: Track authentications into Citrix sessions and Windows Servers. All failed logon attempts are reviewed. Workstation Logon/Logoff Tracking: Get visibility on logons/logoffs at workstations, including locks, unlocks and password changes. -
7
Incident Tracker
Incident Tracker
6 RatingsThe most affordable reporting software available today. Incident Tracker works directly alongside numerous Healthcare Agencies across the United States. Incident Tracker uses Microsoft Azure to provide the highest level of security and data protection in the industry. Microsoft Azure is HIPAA-certified. We can review and sign a Business Associate Agreement for your company if necessary. Incident Tracker is a cost-effective and user-friendly solution. You can customize categories, locations, or digitize paper forms. Automated email notifications. Automated workflows. Trending and Analytics. Report Life Cycle. For easy tracking, you can set custom statuses. Incident Tracker can be used worldwide by security companies, large and small. It allows you to create and access the analytics and documentation tools that you need in your field. It allows you to upload images and documents directly to the report. And, most importantly, it's very user-friendly. -
8
Telivy
Telivy
The most comprehensive and versatile auditing tool in the industry, deployable with just a single script. Discover any possible entry points for cyber-attacks, both from within and outside your organization. Protect your data against attacks that can encrypt or modify data, corrupt it, or destroy it, such as ransomware. Ensure that data is accessible to everyone in the organization. Audit and configure the proper access to corporate assets both on-premises as well as in the cloud. Enforce policies regarding user authentication, validation, and privileges. Address issues with privilege creep. Test your resilience to email phishing, application password detection and other attempts to gain access and exfiltrate sensitive data. -
9
Skybox Security
Skybox Security
1 RatingSkybox's risk-based vulnerability management approach starts with new vulnerability data from your entire network, including physical IT, multicloud and operational technology (OT). Skybox assesses vulnerabilities without the need to scan. Skybox uses a variety of sources including asset and patch management systems as well as network devices. Skybox also collects, centralizes and merges data from multiple scanners to provide you with the most accurate vulnerability assessments. - Centralize and improve vulnerability management processes, from discovery to prioritization to remediation - Harness power vulnerability and asset data, network topology, and security controls - Use network simulation and attack simulation to identify exposed vulnerabilities - Augment vulnerability data by incorporating intelligence on the current threat environment - Learn your best remedy option, including patching and IPS signatures, as well as network-based changes -
10
BACKUP EAGLE
Schmitz RZ Consult GmbH
BACKUP EAGLE Backup Monitoring and Reporting, Audit & Compliance, IBM Spectrum Protect Plus, DellEMC NetWorker Veeam, Rubrik SEP sesam IBM BRMS RMAN, CommVault, and many more -
11
MetaPhish
MetaCompliance
MetaPhish, a phishing simulator software, allows administrators to create ransomware and phishing attacks to target their staff and managers. This will protect staff from phishing scams by automating training that increases staff vigilance and identifies any need for additional cyber awareness training. -
12
FileAudit
IS Decisions
$826 one-time paymentMonitor, audit, report, alert, and respond to all files and folders on Windows Servers as well as in the cloud. Monitor in real-time access to sensitive files on both Windows Servers as well as in the cloud. You can quickly find the answers you need with powerful filtering. Tracking IP address and machine names pinpoints exact access. You can set up email alerts and a trigger response for access events (access denied, file deletion, a specific user, IP address, time of access), and mass access events like the copy, deletion, or movement of bulk documents. Review a searchable audit trail that is secure, always-available, and searchable. Analyze access to and use of files stored on-premises as well as in the cloud. Schedule centralized reports based on multiple criteria. -
13
CaseWare IDEA
CaseWare International
Data Analytics is changing the game in audit, accounting, and finance. You need a solution that can help you deliver high-quality audits every time, regardless of whether you are looking for fraud detection or trends or patterns. IDEA®, Data Analysis Software is a powerful, easy-to-use and comprehensive data analysis tool designed by experts in audit. IDEA provides data analytics with a modern interface and advanced analytical functions. It is easy to use and allows for deeper insights. This helps you make better business decisions. You can import data from any source. Source data integrity is protected by read-only access. For a robust analysis, you can use 100+ audit functions. Visually identify patterns, trends, and outliers. An audit trail allows for repeatable analysis. -
14
DSRAZOR for Windows
Visual Click Software
$500/year Quickly list file and folder NTFS permissions and share permissions. Find out who owns the files on your shared disk space. Manage NTFS security permissions. Find and remove unwanted file security permissions. Modify existing permissions directly from a trustee report. Add Trustee(s) Copy Trustee(s) Modify Trustee permissions for selected AD object Remove Trustee assignments for selected AD object Remove 'Read' permissions from the SHARE Remove 'List Folder Contents' from the SHARE's NTFS permissions Find files/folders with no owner (Orphaned SID) and remove Report on users, groups and computers. Check that your Active Directory object attributes are consistent with your enterprise standard. You can find accounts that have been locked, disabled, expired, or unused for more than x days. Automate common Active Directory management tasks. Automatically synchronize Student Information System (SIS), to Active Directory. Create/Import/Update users and groups, as well as computers, including bulk management. No scripting required to effectively manage Active Directory Move/Delete inactive users, groups, and computers. Reset passwords in bulk Mass object imports can be done from a CSV file. -
15
InfoZoom
SoftLake Solutions
Internal Audit, Fraud Investigators Privacy Analysts Compliance Officers, Criminal Detectives. These teams need specialized data analysis software. InfoZoom is a data visualization software that was created for internal audit, compliance and investigations. InfoZoom allows you to access instant information without the need of IT or database specialists. You can find the answers you need, no matter if you are doing routine analysis or ad-hoc research. Data Visualization is an easy-to-use tool that quickly identifies outliers and trends in data. Ideal for investigations and audits. Expert knowledge in various forms of data analytics, including privacy, audit, investigations, and more. InfoZoom is simple to use. Training is often not required. Our training is similar to custom consulting based upon your analytics needs. -
16
Satori CCM
Satori
SatoriCCM monitors transactions across your entire business in order to provide a significant and measurable return. CCM is often overlooked because it is only when an organization has been seriously impacted or compromised that it puts importance on it. An organization that avoids and denies, or is unaware of possible fraud or breaches, can be unnecessarily at risk. Satori Continuous Control Monitoring is our foundational solution. It ensures data integrity to protect businesses against unnecessary risks, costly mistakes, or fraud. Businesses with large staff and/or medium transaction volumes need to have peace of mind. SatoriCCM ensures that exceptions are dealt with promptly, daily or weekly. The business may not need to report exceptions that were presented as a result of an annual review. -
17
SentinelTrails
LogSentinel
Even for privileged users, our blockchain-based technology does NOT allow audit trail deletions or changes. Many standards and regulations require audit trails to be completed: GDPR, PSD2, PCI–DSS, ISO 27001; HIPAA; SOX. Fraud attempts will be prevented by real-time analysis of all events and AI-driven anomaly detection. Straightforward agent- or agentless integration of all systems as well as simple RESTful API. A unified command center for real-time monitoring and insight across all users and systems. You can demonstrate compliance at a lower operational cost and reduce the effort required for audit, forensics, and fraud detection. We use blockchain to ensure that your data is secure and never compromised. -
18
Data Rover
Data Rover
Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. The software is designed for companies that need to ensure compliance with personal data protection regulations and provides detailed analysis of data access permissions. User Access Rights & Auditing Provides invaluable information about access privileges to files and folders. It allows you to analyse the effective permissions of the users, i.e. the real ones. It identifies not only who can access data, but also who did exactly what, when, and from where. Data Housekeeping Helps you identify and distinguish valuable assets from junk information that becomes unnecessary ballast and an unjustified cost to the company. Data Exchange Provides the company with an advanced data exchange and tracking system exclusively designed for the business. -
19
Acculytic
Acculytic
Acculytic was established in 2011 to address issues mid-sized businesses face with auditing vendor files and transactions. Every organization continues to focus on cash recovery, duplicate payments, and duplicate vendor identification. Our tools for improving AP are much more. Large companies often reach out to 3rd-party auditors who use sophisticated technology that requires on-site invasive procedures and complex software to do more than what mid-sized businesses need. Acculytic is a fixed-fee company that uses non-invasive SaaS technology. This allows businesses to monitor their AP system and detect cash recovery opportunities. -
20
Auditrunner
Auditrunner
$850/month Secure Audit, Risk, Compliance, Quality Software. Available in both Cloud-based and On-Premise deployment options. Auditrunner provides granular encryption and role-based access controls for audit files and documents-at-rest. All data is protected. Our platform has automated over 3000 business processes for companies around the globe. These are just a few examples of the GRC platform modules. Cloud-based and On-Premise. Just deploy and begin using. The platform's seamless integration allows you to start enjoying the benefits within weeks of launch. The platform's low-code design allows for customization and compliance with any standard or regulation. You can operate in a fast-moving, constantly changing regulatory environment and comply instantly with a multitude of different legislation without assistance. Our ease of use is unmatched. -
21
NVizion
Sobha Renaissance Information Technology
N'Vizion, a web-based robust reporting and analysis tool that provides an integrated, comprehensive, consistent system for managing, communicating and reporting on Environment, Health & Safety practices. SRIT adheres to all applicable government and internal safety, health, and environmental regulations. SRIT designs facilities and manages operations to minimize unacceptable risks to the environment, health, and safety of its employees. SRIT produces and sells products that, when manufactured, used, stored, distributed, and disposed of using product safety communications, and other safety practices, don't pose an unacceptable risk to the environment, human health, safety, or health. SRIT conducts appropriate research to identify and communicate the known hazards of its products and operations to those who may be affected. -
22
Dr.Web uses several technologies to protect your computer from malware. A signature-based scan that identifies malware by code A heuristics-based engine that detects unknown malware based on its behavior A firewall that protects networks from attacks Spam filter blocks unwanted emails Internet parental controls to restrict children's internet access A shredder that permanently destroys files Dr.Web is known for its ability to detect and remove malware. It has received a number independent test certifications including VB100% by Virus Bulletin. Dr.Web was also criticized for its high resource usage and clunky interface. Overall, Dr.Web has proven to be a reliable and efficient antivirus program. It is a great choice for users looking for a comprehensive solution for malware protection. It is important to keep in mind that Dr.Web's user interface and resource usage can be a little clunky.
-
23
Xcellerator
Incisive Software
End users can use Incisive Xcellerator™, software to do their jobs efficiently and with high accuracy. Xcellerator works seamlessly in Microsoft Excel and detects and helps to resolve errors and risks. It also provides insight into spreadsheet construction. Spreadsheets are critical for business decisions and must be reliable. Spreadsheets can be distorted by fraud, out-of-date references, and other errors that can lead to bad decisions. Xcellerator guarantees reliable data that is free from errors and can be relied on to make good decisions. Xcellerator's strength lies in its extensive testing, which covers everything from formula errors and cell accuracy risks to hidden error and regions that are broken. Xcellerator delivers fast results with high accuracy so spreadsheet reviewers can eliminate hours spent manually checking. Management can rest assured that there are no material errors or possible fraud. -
24
RAV Endpoint Protection
Reason Cybersecurity
$32.83 per monthRAV Endpoint Protection, a next-generation anti-virus solution, uses AI-powered Endpoint Detection and Response technology (EDR) to provide real-time security against advanced cyber-threats. Its lightweight engine uses less device resources than other antivirus programs to ensure seamless operation without technical knowledge. The platform provides comprehensive online protection, including identity monitoring. It protects users from phishing attacks, ransomware and adware during web activity. It has digital identity management tools, such as dark web scanning and personal data monitoring, that alert users when they have been compromised. The dynamic malware protection and ransomware defense feature uses advanced heuristics in order to alert and block users from potentially unknown ransomware. RAV Endpoint Protection also emphasizes privacy, with tools such as webcam and mic protection, minimizing possible entry points for attackers. -
25
TEMASOFT Ranstop
TEMASOFT
It is not secret that the malware landscape is dynamic and there are thousands of new samples every day. Ranstop can handle all known and unknown ransomware. Ranstop uses a highly efficient detection engine that is based on behavior analysis. It is constantly tested against new threats. Data recovery can be difficult if there is no anti-ransomware protection. Even with backup solutions, it can be difficult to get files back and make sure that ransomware isn't active on the network. Ranstop can help with this. Ranstop can not only block the threat but also quarantines any files that may be affected to prevent future infections. It can also automatically isolate the affected computers. -
26
AuditFile
AuditFile
$99 per user per monthAuditFile is a cloud-based, secure solution that CPA firms and internal audit departments use to perform efficient audits, reviews and compilations. AuditFile is the first cloud-based auditing solution for CPA companies. AuditFile automates all aspects of the audit process, including uploading the trial balance and generating financial statements. AuditFile also has proprietary algorithms that help auditors detect potential fraud. AuditFile provides technology that meets your exacting standards of security and accuracy to solve the real-world problems your company faces every day. Audits can be complex. But audit software doesn't have to be. Our intuitive interface, simple pricing, rich feature set, and simple pricing will make it easy for your firm to get up and running. Managers are kept informed with real-time dashboards, progress indicators, and streamlined workflows. Managers have a greater level of control, visibility, and communication. -
27
Microsoft Purview Audit
Microsoft
$12 per monthAccess audit logs in order to assist investigations. Access audit logs and determine the scope of compromise to support investigations. Get a dynamic bandwidth limit to access your auditing information. Support investigations by providing visibility into events such as when a mail item was accessed, replied to and forwarded or when and what an user searched for in Exchange Online or SharePoint Online. Create customized audit log retention policy to retain audit records depending on the service in which the audited actions occur, the specific audited actions, or the user that performs the audited action. Initially, organizations are allocated a baseline limit of 2,000 requests per hour. This limit will increase dynamically based on the number of seats and subscriptions. Add-on licenses allow you to retain audit log records up to ten years. -
28
Supervizor
Supervizor
Supervizor's continuous Quality Assurance helps you to eliminate fraud and errors with its unparalleled anomaly detection. We are on a quest to help corporations produce accurate financial data. Supervizor offers corporations unique anomaly detection capabilities that can identify several types (including accounting errors) and fraud attempts. Organizations are faced with a growing number fraud schemes and errors that are caused by processes and people. Connect your ERP to Supervizor and let it consolidate journal entries based on our library of millions accounting patterns. Run ready-to-use tests continuously across multiple areas. Work together to ensure the quality of financial data across departments, systems, subsidiaries, and geographical areas. Automates the extraction and preparation of your data, saving you time by avoiding manual gathering, scrubbing and formatting. Identifies your most risky findings and prioritizes them for investigation, intelligently minimizing the number of false positives. -
29
Atlas Governance
Atlas Governance
FreeIn a single environment, you can manage all activities of collegiate bodies within your organization. In less than three minutes, you can prepare and call complete meetings. Integrating agendas, materials, and participants' calendars with attendance management. Atlas Bluebook consolidates all meeting data into one file with single pagination. Bluebook converts all documents into a single pdf file and watermarks every page to ensure information security and traceability. You can make appointments, take notes and share them with others. Bluebook will save any annotated material that is deleted or overwritten. Your minutes are automatically based on information such as organization, collegiate, date and time, place, participants, agendas and deliberations. You can search within the system and files for words, documents, and terms. This is done using artificial intelligence to optimize your search. -
30
gutwin
Gutwinski Management
Gutwin - software for practitioners. Gutwin is a software that can be used in practice. It will bring you 20 years of experience from occupational safety and environmental protection experts. The gutwin software has a simple, consistent, and modern design. The operation of gutwin software was designed to ensure that all the basics, such as how to work with certain types of data, are only needed once and can be used for all types of data. Clear symbols and color grading were used in order to make content understandable and easy to read for all employees. If required, all communication between clients and server can be encrypted. This ensures that data is not compromised during transmission. -
31
Q-Audit
Qmulos
$450.00/month You need full audit capabilities if your enterprise has mission-critical systems that contain classified or complex data. Operational security is about 1) identifying suspicious activities and attacks. Also, it is essential to identify misuse of information resources before they become threats. It is essential to provide supporting forensic analysis for official inquiries and investigations. What's the solution? Q-Audit is Qmulos' Splunk powered real-time audit software that meets the most stringent audit requirements. It is also easy to use, quick to install, and flexible enough to adapt to new audit requirements or new data sources. Q-Audit offers security value through actionable insights. It has an easy to implement audit policy that is defensible. -
32
ControlCase
ControlCase
Nearly every business must comply with multiple information security regulations and standards. Audits of IT compliance can be expensive, time-consuming, and difficult. These include, but are not limited, to PCI DSS and ISO 27001, HIPAA. HITRUST. FISMA. NIST 800-53. MARS-E. BITS FISAP. Each audit can present a challenge for businesses. This includes repeating efforts, managing multiple firms, increased complexity, and time. Standards such as PCI DSS and ISO provide a benchmark for data protection, but criminals are always looking for security holes and malware to exploit organizations. The ControlCase Data Security Rating focuses exclusively on understanding your environment, providing solutions that seamlessly integrate security, and go beyond compliance. -
33
SQL Compliance Manager
IDERA, an Idera, Inc. company
$3,036.00 per instanceSQL Compliance Manager allows database administrators to monitor, audit and alert on SQL Server user activity, as well as data changes. It is faster than its competitors and offers quick configuration of audit settings, a wide list of regulatory guideline templates and reports, before-and after data values for both regulatory and forensic data investigations, differentiating data access between regular users and privileged applications, easy specification and reporting on sensitive column access and changes, as well as extensive customization of audit settings for servers and databases. -
34
Intact Analytics
Intact
Intact Analytics is the only tool that can be used to analyze audit data. It combines both traditional Business Intelligence and Artificial Intelligence to provide clarity to complex data sets, identify root causes and improve risk-based planning and decision making. The audit analytics tool gives you easy-to-read dashboards that include all your key metrics. Our automated anomaly detection allows you to quickly identify root causes and risks. For risk-based planning, and optimization, you can predict future audit results. Find the hidden information in your audit data to answer business-critical queries, make goal-oriented decision, and conquer your greatest challenges. Analyze all audits, not just random ones Get more important audit results in a shorter time Identify root causes and risk factors Reduce risk-based audit planning Protect the safety and integrity products and services -
35
CAQ.Net
CAQ AG Factory Systems
CAQ.Net software solutions are in action all around the globe wherever it is important to ensure the quality, safety, and functionality of products and services. Whether strategic quality management or operational quality assurance – thanks to its high degree of automation and uniform data structure, CAQ.Net facilitates effective process management, proactive failure prevention, and a company-wide quality mindset. -
36
Veeva Vault QMS
Veeva Industries
Vault QMS ensures quality and compliance to GxP. Vault QMS integrates best practices and automates workflows to bring all parties - pharma, biotech companies, contract manufactures, and suppliers - into quality control processes for better visibility and control. You can easily bring departments, sites and suppliers, contract manufacturers, contract testing labs, or other partners into continuous quality improvement. Automated workflows and best practices will increase operational efficiency. Unified risk management can improve visibility across products and processes. A unified suite quality applications will improve speed, efficiency, compliance, and GxP. You can easily enable quality management processes by incorporating best practices for deviations, internal and external audits and complaints, as well as change control, CAPA and quality risk management. -
37
Ideagen Huddle is a cloud-based platform that provides a safe and unique workspace environment for your team, partners and external stakeholders. Companies in highly regulated industries can review work, securely share sensitive information and collaborate efficiently which allows you to maintain complete control of the document - meeting your project goals on time and to budget, every time. With Ideagen Huddle, you get an easier way to collaborate and co-edit documents, control file versions, collaborate with clients, and organize team tasks. Built-in approval workflow means you'll never miss a deadline again, and our free mobile app keeps you connected even when you're on the road. Benefits include: • Government grade security – confidently protect your sensitive data and reduce the risk of loss or theft • Custom branded Client portals – Make all your documents and associated communications accessible in one central location • Regulated collaboration – Keep control of versions, co-edit, make comments and revisions, all in real-time. • Controlled external collaboration – Make external collaboration frictionless for all stakeholders Because Ideagen Huddle is cloud-based, it sits above your existing IT infrastructure.
-
38
Pulse
Pulse
$14 per user per monthPulse is an EHS platform that focuses on improvement. You can move from issue detection to immediate action in lightning fast time. Great support and a modern interface ensure rapid adoption. The power and simplicity of the interface will be a hit with your team. This tool is designed to support large, sensitive enterprise organizations. Connect any of your tools to create powerful workflows and a unified view for your business. Mobile-friendly native app experience. Upload your template, choose from our available options or create your own. When creating templates, use conditional logic. Schedule inspections on a daily/weekly/monthly/ad-hoc basis for your team in minutes and assign tasks to them. Your team can upload multiple photos and annotations. For evaluation, share your completed reports with seniors and colleagues. Include any additional insights or messages. -
39
Diligent ACL Analytics
Diligent
Your audit team can now work smarter. ACL Analytics, a comprehensive governance tool that is powered by time-saving automation and purpose-built analytics, can enhance any company's workflow. Enjoy a suite designed to make your audit team more efficient. Use pre-designed data and test connectors to sync with commonly used assurance software. Integrate your software with your assurance program for a clear and detailed delivery of results. Communicate using sophisticated tools, such as embedded dashboards. ACL Analytics' community of thousands of assurance practitioners, Diligent consultants and other experts can be tapped to gain the collective expertise. Diligent is committed to protecting your data. We offer clarity and control for the agile enterprise. Improve your audit function by gaining better and more accessible data. -
40
ImmuniWeb
ImmuniWeb
$499/month ImmuniWeb is a worldwide application security company. ImmuniWeb's headquarter is located in Geneva, Switzerland. Most of ImmuniWeb's customers come from banking, healthcare, and e-commerce. ImmuniWeb® AI Platform leverages award-winning AI and Machine Learning technology for acceleration and intelligent automation of Attack Surface Management and Dark Web Monitoring. ImmuniWeb also is a Key Player in the Application Penetration Testing market (according to MarketsandMarkets 2021 report). ImmuniWeb offers a contractual zero false-positives SLA with a money-back guarantee. ImmuniWeb’s AI technology is a recipient of numerous awards and recognitions, including Gartner Cool Vendor, IDC Innovator, and the winner of “SC Award Europe” in the “Best Usage of Machine Learning and AI” category. ImmuniWeb® Community Edition runs over 100,000 daily tests, being one of the largest application security communities. ImmuniWeb offers the following free tests: Website Security Test, SSL Security Test, Mobile App Security Test, Dark Web Exposure Test. ImmuniWeb SA is an ISO 27001 certified and CREST-accredited company. -
41
CT Mobile
Customertimes
To enhance customer experience, you can get offline mobile access to Salesforce. Integrate CT Mobile and the CT family to increase sales and efficiency in your field teams. CT Mobile was designed to increase sales cycle performance and help customers succeed. With AI integrations that are tailored to your customers, CT Mobile makes it easy for field teams to work online and offline. Access to your Salesforce System data is available from anywhere, online or offline. You can access all the information you need to keep appointments on schedule, grant access to account, contact and contract data, and manage it all in one click. You can empower your field sales team with additional functions on CT Mobile that automate and accelerate every day activities. You can increase sales efficiency and effectiveness by creating modules that allow for presentations, retail execution, order managing, and many other functions. -
42
EffexEHS
EffexEHS
$49.50Effex offers a unique solution to environmental safety and health challenges. This includes regulatory compliance, corporate sustainability towards environmental protection, accident avoidance and response, standardization of processes and standardization. Our EHS solution uses the most advanced software technologies. Our EHS Management System is affordable and can be customized to meet specific industry requirements and customer needs. Construction has one of the highest fatality rates among all industries. To prevent more deaths and long-term injuries, it is essential to manage safety and health properly. Our priority is to set high benchmarks in tracking and training, document management, and document management in order to keep employees safe in high-risk environments. EffexEHS (Software as a Service) is a software application that helps businesses and EHS professionals meet today's Environment, Health and Safety challenges. -
43
RiskWare
PAN Software
$5000We are the industry leader in enterprise-wide risk management software. RiskWare, which is used by 1000's every day, is simple, affordable and functionally rich. RiskWare, a leader in cloud based enterprise risk management, helps thousands of users manage risk every day. You can choose to implement the entire suite of modules or start with one and add more as you need them. We've taken care of all the running and have RiskWare installed on state-ofthe-art hardware, so you don't need to! Our datacenter is compliant to ISO27001, ASIO T4 & DSD standards. This ensures that your information is highly protected. Dedicated power substations, uninterruptible supply (UPS), and diesel-powered generators are available to provide power during utility outages. Backups are kept offsite, and the data center has highly qualified professionals on duty 24x7. -
44
Compliance Star
Thistle Initiatives
£60 per monthCompliance Star is an online compliance software that provides the right tools to manage risk and monitor performance. Compliance Star allows remote management of FCA Authorised Firms, its operating Units/Agents and their operations via real-time data collection. It also provides reporting and reporting. Compliance Star, a technology-enabled compliance platform, facilitates compliance management, workflows and monitoring of firms authorized by the Financial Conduct Authority. Compliance Star is built on a calendar-based task management system that is 'fail safe'. This system allows for manual and automatic task setting, notifies actions, populates deadlines in a calendar, issues reminders, and monitors for completion. Leading regulatory networks are currently using the platform to reduce compliance burden. It allows for complete tracking of internal regulatory processes. It allows for single-point data access and the ability to generate FCA-required reports. -
45
EcoOnline
EcoOnline
EcoOnline is a platform that provides all the modules a company requires to create safe, compliant, and efficient workplaces. EcoOnline's integrated platform is functionally rich and provides real-time decision support as well as EHS analytics. This will help you drive efficiency and protect your customers and employees. EcoOnline's digital solutions make safety management easy, effective, and even inspiring. Our mobile app can be used to engage employees and create a safety culture. The most user-friendly software for chemical safety that gives control back over to employees responsible for chemical safety. Take control of your SDS Management and Risk Assessments, as well as Chemical Reporting. EcoOnline's Environmental Reporting Software Modules allow you and your company to track and reduce emissions, optimize raw materials usage, and automate and schedule regular reporting. -
46
eScan
MicroWorld Technologies
$58.95/one-time/ user eScan's next generation antivirus solution protects your home network from malware, viruses, ransomware, and other threats using a layered approach. eScan is able to block a wide range of attacks thanks to its unique combination of modern and basic techniques. It includes web filtering, signature-based Malware detection and behavior analysis, as well as innovative techniques such deep learning malware detection, exploit prevention and heuristic scanning. eScan provides business endpoint protection, endpoint detection and response solutions (EDR), as well as anti-spam solutions email and multi-factor authentication. -
47
Fastpath
Fastpath
Fastpath's cloud based access orchestration allows organizations to manage, automate, and streamline identity, access governance and data and configuration updates - efficiently and effectively. Our intuitive cloud platform integrates GRC and identity governance into a sophisticated, yet easy-to use solution. Automate, control and monitor access to applications, data records and individual data records, all without effort. Fastpath's platform has been designed by auditors, who understand the complexity involved in securing access to business applications. We created a solution to reduce the time, costs and complexity of audit processes and reporting in order to prove compliance. -
48
Auditus
Auditus
$35 per monthMultilingual app, available online and offline for Android and iOS devices. Auditus app allows inspectors/auditors capture information/images immediately, saving time and money by not having to re-enter information later. Its state of the art scoring system and action management workflows reduce risks. The powerful real-time reporting gives you full visibility into your business' performance. You can conduct inspections from any location, on any device. Auditus is used by many businesses, including SME's and large multinationals. It can be used in any industry, including Food & Beverages, Hospitality, Transport & Logistics, Engineering, Construction, Manufacturing, Education, Retail, and Aviation. You can create custom checklists, audits, and analyze reports. Real-time analytics. Automated reports, custom notifications, and a live dashboard. You can conduct complete inspections with or without the internet. Supporting 20 languages inc English, Spanish, German, Chinese, etc. -
49
AuditWin Plus
Automated & Management Solutions
$1,500 one-time paymentThis database-driven application is available as a standalone field app, or can communicate with other AuditWin Plus systems, ACE, and Audit Partner. Web Services allows you to download audit requests and upload completed audits. These Web Services allow you to easily receive updates on policies and to send progress notes, schedule dates, and completed audits back into the management system. AuditWin Plus is fully integrated with Microsoft Office and was created to make audits more efficient in all circumstances. It allows users to import and create new spreadsheets, as well as use the Active Entry's prepared worksheet to complete an audit. No matter what method or combination of methods the user chooses, exposures can be linked with each class code and to other verifications if necessary. -
50
DIGI CLIP is an inspection and checklist app and software solution. DIGI CLIP is a mobile app that allows field workers, transport workers, and other employees to complete, archive, and communicate checklists and inspections via a tablet or smartphone. DIGI CLIP will automate the process of a fault or defect, from initial identification through close-out via DIGI CLIP's Action Register. DIGI CLIP was created to help you save time and money on reporting on vehicles, equipment, and safety. It digitizes and automates pre-start checklists, inspections checklists, audits, checklists, and checklists. You can add checklists and inspections to the DIGI CLIP Form library or start from scratch. All forms can be edited in full. DIGI CLIP will automatically archive all submitted checklists, inspections, and other forms in the cloud software. The cloud-based software offers full search functionality. DIGI CLIP is a SaaS app that is simple to set up and easy to use. DIGI CLIP can be up and running in minutes instead of hours or days.