Best Trustpage Alternatives in 2024

Find the top alternatives to Trustpage currently available. Compare ratings, reviews, pricing, and features of Trustpage alternatives in 2024. Slashdot lists the best Trustpage alternatives on the market that offer competing products that are similar to Trustpage. Sort through Trustpage alternatives below to make the best choice for your needs

  • 1
    StandardFusion Reviews
    See Software
    Learn More
    Compare Both
    GRC solution for technology-focused SMBs and Enterprise Information Security Teams. StandardFusion eliminates the need for spreadsheets by using one system of record. You can identify, assess, treat and track risks with confidence. Audit-based activities can be made a standard process. Audits can be conducted with confidence and easy access to evidence. Manage compliance to multiple standards: ISO, SOC and NIST, HIPAA. GDPR, PCI–DSS, FedRAMP, HIPAA. All vendor and third party risk and security questionnaires can be managed in one place. StandardFusion, a Cloud-Based SaaS platform or on-premise GRC platform, is designed to make InfoSec compliance easy, accessible and scalable. Connect what you do with what your company needs.
  • 2
    Secureframe Reviews
    Secureframe assists organizations in becoming ISO 27001 and SOC 2 compliant. We can help you keep your business secure at every stage. SOC 2 can be completed in weeks and not months. It can be confusing and full-of surprises to prepare for a SOC 2. We believe transparency is key to achieving best-in class security. You will know exactly what you are getting with our transparent pricing and process. You don't have the time or resources to manually onboard your employees or fetch vendor data. We have automated hundreds of manual tasks and simplified every step. Our seamless workflows make it easy for employees to join the company. This saves you both time and money. You can easily maintain your SOC 2. You will be notified via alerts and reports when there is a critical vulnerability so you can quickly fix it. You will receive detailed guidance on how to correct each issue so that you are confident you have done it correctly. Our team of compliance and security experts will provide support. We aim to respond to your questions within one business day.
  • 3
    Fusion Framework System Reviews
    Fusion Framework System software from Fusion Risk Management allows you to understand how your business functions, how it works and how to fix it. Our platform allows you to easily, visually, and interactively explore every aspect of your business, so that you can identify key risks and points of failure. Fusion's flexible, integrated platform capabilities allow you to achieve greater resilience and efficiency. They can be tailored to meet your specific needs. We are there to help you wherever you are in your journey to more resilient operations. - Map product delivery and service processes that are critical to your business. - Use objective risk insights to help you audit, analyze and improve your business operations - Plan, organize, and measure resilience and risk management activities with confidence Automation can be leveraged to reduce manual, repetitive, and time-consuming tasks, allowing teams to focus on higher-value activities.
  • 4
    ThirdPartyTrust Reviews

    ThirdPartyTrust

    ThirdPartyTrust

    $120000.00/year
    Vender management , creator Anders Norremo. Excellent software. To track vendors and their security weaknesses/strengths. Service is also available if you pay.
  • 5
    Scrut Automation Reviews
    Scrut allows you to automate risk assessment and monitoring. You can also create your own unique infosec program that puts your customers' needs first. Scrut lets you manage multiple compliance audits and demonstrate trust in your customers from a single interface. Scrut allows you to discover cyber assets, create your infosec program, monitor your controls 24/7 for compliance, and manage multiple audits at the same time. Monitor risks in your infrastructure and applications landscape in real-time, and stay compliant using 20+ compliance frameworks. Automated workflows and seamless sharing of artifacts allow you to collaborate with team members, auditors and pen-testers. Create, assign and monitor tasks for daily compliance management with automated alerts. Make continuous security compliance easy with the help of more than 70 integrations. Scrut's dashboards are intuitive and provide quick overviews.
  • 6
    Conveyor Reviews
    Customers can build trust around data security. Conveyor is a platform for cloud-based businesses that helps them prove their trustworthiness to their customers. It also helps to ensure that their vendors are trustworthy. Join the network to build trust in data security. Conveyor is creating the largest network of companies that understand data security is a business driver, not a cost center. By simplifying the exchange security information, we are making the internet more trustable. Streamlining the sharing of security information to prospects and customers will help you move compliance forward in your sales cycle. Responding quickly to customer security reviews can help you save 60%.
  • 7
    Panorays Reviews
    Securely do business together. Automating Third Party Security Lifecycle Management. The hacker's view combined with the internal policy gives you a 360-degree view of your supplier. The hacker's perspective evaluates the company's posture in the same way as a hacker would. The supplier must adhere to security policies and practices. The best seamless third-party security workflow solution. Panorays' rapid security rating is based on a "outside in" simulated hacker view of assets. This view is combined with an "inside out" view that verifies that the supplier follows your company's security policies. Panorays' customized automated security questionnaires are tailored to each supplier and allow you to track your progress with just a click. You can choose from a pre-made template or make your own.
  • 8
    Rescana Reviews

    Rescana

    Rescana

    $25 per month
    Risk programs that are successful rely on accuracy in discovering and managing assets, and then assessing the risks. Rescana's artificial Intelligence performs asset attribution and keeps false positives to an absolute minimum. Rescana's form engine allows you to conduct risk surveys with the flexibility that you need. You can customize the built-in forms or upload your own form to create the perfect survey. Our army of collector bots is infinitely scalable and searches the deepest parts of the internet to find your assets and data every day. Rescana keeps you up-to-date. Integrate Rescana into your procurement system and ensure that vendors are correctly classified from the beginning. Rescana's flexible survey can ingest any questionnaire. It is feature-rich, so you and your vendor have the best experience. You can quickly re-certify vendors and communicate the vulnerabilities to them with ease using pre-filled forms.
  • 9
    UpGuard Reviews

    UpGuard

    UpGuard

    $5,249 per year
    The new standard for third-party risk management and attack surface management. UpGuard is the best platform to protect your organization's sensitive information. Our security rating engine monitors millions upon millions of companies and billions upon billions of data points each day. Monitor your vendors and automate security questionnaires to reduce third- and fourth-party risk. Monitor your attack surface, detect leaked credentials, and protect customer information. UpGuard analysts can help you scale your third-party risk management program and monitor your organization and vendors for potential data leaks. UpGuard creates the most flexible and powerful tools for cybersecurity. UpGuard's platform is unmatched in its ability to protect your most sensitive data. Many of the most data-conscious companies in the world are growing faster and more securely.
  • 10
    Whistic Reviews
    This is the best way to share, publish and assess vendor security information. Whistic Vendor Security Network allows you to automate vendor assessments, share security documents, and make trusted connections - all from one place. Whistic makes it easy for companies to manage vendor security assessments and respond to questionnaire requests. Openly sharing security requirements with vendors and publishing profiles will help you avoid the old black box security reviews. Instead of chasing spreadsheets, focus on building trust.
  • 11
    SecurityScorecard Reviews
    SecurityScorecard has been recognized for its leadership in cybersecurity risk ratings. Download now to view the new cybersecurity risk rating landscape. Learn the principles, processes, and methodologies behind our cybersecurity ratings. To learn more about our security ratings, download the data sheet. Freely claim, improve, and track your scorecard. Make a plan to improve your weaknesses and understand them. Get started with a free account. Get a complete view of your organization's cybersecurity posture using security ratings. Security ratings can be used for a variety purposes, including compliance monitoring, risk and compliance monitoring and cyber insurance underwriting. Data enrichment and executive-level reporting are just a few examples.
  • 12
    Auditive Reviews

    Auditive

    Auditive

    $800 per month
    Auditive is a Third Party Risk Management (TPRM), a platform that monitors continuously, enabling buyers and sellers to engage in a way they have never done before. Auditive's unique approach to risk management eliminates 80% the work for both businesses and vendors. Buyers can complete their third-party review four times faster. They can also monitor risk across the entire vendor portfolio and gain near-instant insight into third-party risks. This results in a 35% rise in vendor response rates. Sellers can benefit from avoiding repetitive questionnaires and focusing on high value initiatives. They can also market their security posture via the Auditive network and build trust with customers. The platform allows for evaluation against industry-specific standards, ensuring accurate assessment of risk. Auditive integrates seamlessly into procurement and productivity workflows. This allows for rapid onboarding of vendors and continuous monitoring in one place.
  • 13
    VISO TRUST Reviews
    VISO TRUST’s AI-powered platform for third-party risks allows your security team to easily access risk intelligence on any number of third-parties. Instantly assess your third-party partners without hiring additional analysts. Take action to reduce risks without reading documents or analyzing surveys. Utilize data from thousands vendors to gain unparalleled intelligence on risk. VISO TRUST, the only SaaS-based third-party cyber risk platform that provides the rapid security intelligence required by modern companies to make critical decisions early in procurement, is the only SaaS-based third party cyber risk management platform. Due diligence is simplified by frictionless due diligence, which allows companies to assess third parties without any hassle. Use curated AI to extract insights and automatically determine vendor's security posture. Get a comprehensive view of your organization's cyber-risk posture and take data-driven decision to reduce risk.
  • 14
    ClearOPS Reviews

    ClearOPS

    ClearOPS

    $500 per month
    ClearOPS assists buyers and sellers to manage their vendors and meet due diligence requirements. ClearOPS is a third-party risk platform that covers the full circle. ClearOPS allows you to track and monitor your vendors, upload evidence and send assessments, and respond directly to customer's vendor management processes. Vendor security questionnaires can be like a hot potato. No one wants to complete them. Our A.I. Our A.I. takes the first pass, saving you a lot of time. You don't have to worry about the information about your business being lost. Now that you have won the customer, what do you do? You have to keep them. We are passionate about maintaining healthy trust. ClearOPS keeps your privacy and security information up-to-date and easily accessible. Simple third-party risk management solution. Empower your colleagues and evaluate your vendors on your own schedule.
  • 15
    VivoSecurity Reviews
    Management and regulators need third-party assessments that are objective and not based on assumptions or opinions. VivoSecuiry helps our customers satisfy regulators by assessing the true 3rd party risk. This is the probability that a vendor will have a data compromise. We do this without the need for questionnaires, maturity scores, or SOC2 reports. The sheer number of vendors increases the risk of third parties. VivoSecurity calculates this risk twice a year with an aggregate forecast. We assist senior management in setting risk appetite goals and providing a forecast of data breaches frequency. We assist cybersecurity teams in identifying the vendors that are most at risk. Then, we quantify the value of mitigation. We provide regulators with a documented and accurate process for vendor assessment that uses an empirical and transparent regression model to determine the probability of data breaches.
  • 16
    Avetta Reviews
    Avetta connects world-class organizations with qualified suppliers, contractors, and vendors. Avetta is an expert in contractor management services. You want to ensure that the contractor you hire has the right qualifications, such as the experience, the workforce, and the certifications. Avetta's software makes it easy to find all the information you need to manage supply chains in one place. It is an important step in managing supply chain risk. It can be costly and time-consuming to collect all necessary documentation, verify the data, and manage the process for many suppliers. Avetta's team of professionals handles all the heavy lifting. We will streamline your qualification process, which will save you time and money.
  • 17
    Blue Umbrella GRC Reviews

    Blue Umbrella GRC

    Blue Umbrella

    $325 per month
    Identify and manage third party risk. To effectively manage multiple areas, this modular, best-in class, plug-and-play compliance platform allows you to easily and efficiently manage third-party risks. Only buy what you need. Blue Umbrella GRC can scale with your third-party risk management system. Start with just one module, or create a bundle to build on it. Streamline your data. You don't need multiple tools or systems to manage third party risk. Blue umbrella grc centralizes it all. Get started today. Register online to get started in minutes. The setup is easy and the interface is friendly. Trusted expertise. Trusted expertise. Automate the process. Each module is designed to help you identify vendor risk and take appropriate steps to rectify it.
  • 18
    ProcessUnity Reviews
    ProcessUnity Vendor Risk Management is a software-as-a-service (SaaS) application that helps companies identify and remediate risks posed by third-party service providers. ProcessUnity VRM combines a powerful vendor services catalog, dynamic reporting, and risk process automation to streamline third-party risk activities. It also captures key supporting documentation to ensure compliance and meet regulatory requirements. ProcessUnity VRM offers powerful capabilities that automate repetitive tasks, allowing risk managers to concentrate on more valuable mitigation strategies.
  • 19
    RiskRecon Reviews
    Automated risk assessments that match your risk appetite. Get the detailed risk performance assessments that you need to effectively manage third-party risks. RiskRecon's deep transparency allows you to understand each vendor's risk performance. RiskRecon's workflow makes it easy to engage vendors and achieve good risk outcomes. RiskRecon has a lot of information about your systems. RiskRecon knows a lot about your systems. Continuous objective visibility of all aspects of your internet risk surface, including managed, shadow, and forgotten IT. RiskRecon has a lot of information about your systems. RiskRecon knows a lot about your systems. Continuous objective visibility of all aspects of your internet risk, including shadow, managed, and forgotten IT. You can see the details of each system, including the IT profile and security configuration. We will even show you which data types are at risk in each system. RiskRecon's asset attributization is independently certified to 99.1% accuracy.
  • 20
    3rdRisk Reviews
    Supplier (third-party relationships) are becoming a major concern, whether it's about cyber, sustainability, compliance or continuity risks. Third-party incidents are becoming more frequent and have a greater impact. Our platform acts as a secure and all-in-one hub that facilitates multidisciplinary collaboration between all internal risk disciplines, the business teams, and external partners. It allows for the secure and seamless sharing of documents and questions, as well as a collaborative workspace to work on shared requirements. Internal teams can decide what information to share with external parties and other teams while working on the same platform. Our third-party catalogue connects seamlessly with internal procurement systems and external feeds to create a centralized view of your entire third party landscape. This comprehensive view contains all the information you need about contracts and their specific characteristics.
  • 21
    Counself Reviews
    Counself Risk™, designed for legal, makes onboarding simple and ensures that due diligence is done correctly. Counself has a library of best-practice forms, questionnaires and documents for the legal industry. This will make it easier to streamline your compliance gathering and monitoring. Counself RFP™, which compares AFAs, helps increase price predictability and optimize costs for your legal department. You can host sealed bidding events, conduct conflict checks, attach custom forms, and documents to request information to as many firms as you wish, securely and separately. Because we know how important your data is, we place data security at the heart of everything we do.
  • 22
    Venminder Reviews
    Venminder has all the features that you need to manage third-party risks effectively. To determine which vendors need attention, complete inherent risk assessments. With dedicated workspaces, you can streamline the onboarding, ongoing management, and offboarding of vendors. Our purpose-built configurable platform software allows you to manage each stage. Risk assessments are a vital activity that you should complete on vendor products. They provide information about the risk that a product poses to your company. Venminder allows you to create custom risk assessments, invite unlimited users to contribute, set scoring preferences, and create clear and concise risk rating and reporting reports. Other features include template creation, progress monitoring, and residual risk capabilities.
  • 23
    Black Kite Reviews
    The Black Kite RSI is a process that involves inspecting, transforming and modeling data from a variety OSINT sources (internet-wide scanners, hacker forums and the deep/dark internet). The correlation between control items can be identified using machine learning and data. A platform that integrates seamlessly with questionnaires, vendor management system and process workflows allows you to operationalize. A defense in depth approach reduces the risk of breaches and automates compliance with cybersecurity requirements. The platform uses Open-Source Intelligence and non-intrusive cyber scans without ever touching the target customer to identify potential security threats. Black Kite's platform is 3x more comprehensive than other platforms in terms of identifying vulnerabilities and attack patterns using 40 categories and 400+ controls.
  • 24
    Risk Ledger Reviews
    Clients have all the tools they need to run a thorough, cyber-security-led, third party risk management program against their entire supply chain. It is fast, easy, free, and simple for third parties to get involved and help them improve their risk management maturity. Our unique secure network model allows each organisation to run a third party risk management program and respond to client risks assessments. This creates trust relationships among the organisations on the platform. Organisations that run a third-party program for risk management on the Risk Ledger platform can benefit from: - Continuous monitoring of the supply chain for implementation of risk controls Visibility beyond third-parties to fourth-, fifth-, and sixth parties - Reduced procurement cycles by up to 80% - Increased supplier engagement Low per-supplier costs
  • 25
    C1Risk Reviews

    C1Risk

    C1Risk

    $18,000 per year
    C1Risk is a technology company and the leading cloud-based, AI, enterprise risk and compliance management platform. Ou vision is to demystify and take the complexity out of risk management. We aim to To simplify your risk and compliance management for you to build and maintain the trust of your stakeholders. C1Risk sets the standard for companies that lead with risk, to win, with a full suite of solutions for a single, affordable price. GRC Regulations and Standards Library Policy Management Compliance Automation Enterprise Asset Management Risk Register and Risk Management Auto-calculated inherent and residual risk scoring Issue Management Incident Management Internal Audit Vulnerability Management Vendor Onboarding and Security Review Vendor Risk Scorecards REST API Integrations
  • 26
    TrustMAPP Reviews
    TrustMAPP® is the pioneer in Cybersecurity Performance Management.. Recognized by Gartner as a leader in Cybersecurity Performance Management and Cybersecurity Maturity Assessments, TrustMAPP is used by organizations across the globe, TrustMAPP provides information security leaders an ability to quickly measure, quantify, and communicate meaningful control performance, track improvement processes, forecast investment efforts, and quickly build narratives to executive stakeholders. TrustMAPP provides remediation guidance on individual controls based on maturity scores and provides resource effort investment and financial investments to forecast future requirements for cybersecurity funding. TrustMAPP provides decision science and forecasting necessary to elevate the cybersecurity discussion in the boardroom. Information security leaders benefit from alignment with key business objectives and dynamic analytics and report-building capabilities. Information security leaders benefit from a new language that resonates with those who know little (and care even less) about the technical aspects of cybersecurity program management.
  • 27
    Proteus NextGen Data Privacy Reviews
    Proteus NextGen Data Privacy software gives DPOs, Privacy Teams and Legal Teams the data privacy management tools they need to manage GDPR compliance, CCPA Compliance or any other data privacy compliance program, efficiently and effectively. Proteus NextGen was designed for enterprises that use current, secure technologies. It is often considered the most flexible and comprehensive data privacy software available. You will find everything you need, including privacy impact assessments, DPIAs and transfer impacts assessments, data mapping, reporting (eg Record of Processing Activity reports), subject access request management, breach notification management, vendor management, risk assessment, risk assessment, and automated SCC generation to help Schrems II compliance. We offer training and consulting to help you get up and running quickly. Our goal is customer satisfaction. Visit our website to request a demonstration www.proteuscyber.com
  • 28
    CanQualify Reviews

    CanQualify

    CanQualify

    $99 annually
    CanQualify connects clients and suppliers who have been pre-qualified based upon your requirements. Our goal is to improve the safety culture of our clients and reduce costs. We also want to strengthen their relationships with suppliers. CanQualify makes it easy for hiring clients to rest assured that their vendors, contractors, and suppliers comply with safety and sustainability standards. Our platform validates compliance to your existing supplier base. It connects you to other suppliers in our database, allowing you streamline the procurement process and save time and money. Our user-friendly platform is innovative and easy to use. You can verify that your vendors, contractors, and suppliers meet your requirements. Clients can compare and manage pre-qualified suppliers to help them choose the best and most qualified supplier for their task.
  • 29
    Shared Assessments Reviews
    Our industry-leading SIG Questionnaire has been created by the world's leading risk assessment and management professionals. We also have the most widely recognized third party risk certification, the CTPRP. The VRMMMMM, SIG and SCA, as well as Privacy tools, are designed to meet the needs of all stages of vendor risk management. Exams and certification classes establish a knowledge base that validates the expertise of third-party risk professionals. Our blog, papers, and studies are industry-informed, member-driven, and forward-looking. The premier global, multi-industry conference to shed light on the processes and technologies that are important in TPRM.
  • 30
    Ion Channel Reviews
    Analyze SBOMs of vendors and contractors, perform pre-purchase due dilligence and verify compliance with cybersecurity terms and condition. Create SBOMs for clients, improve risk protection, and provide third-party certifications of supply chain assurance. Apply enterprise policies across internal development, software development outsourced and commercial products. Automated verification of compliance with SLAs. The Ion Channel platform simplifies supply chain risk management. Ion Channel enriches the software inventories, Manifests, and SBOMs of software with supply chain intelligence, proprietary analytics, and clear actions to support low-false positives, clear action, and unparalleled insights.
  • 31
    COBRA Reviews
    Supply chains are complex, organic networks that connect people and grow over time. Statistics show that security breaches are a majority caused by third parties. C2 Cyber's Cobra platform instantly assesses the supplier's inherent risk, which saves time. It then recommends a level of service that matches the supplier's risk appetite and the client's.
  • 32
    TrustElements Reviews
    TrustElements helps you to reduce risk and prioritize investments. After analyzing all data in your company's possession, your cyber resilience score is calculated as a percentage. TrustElements compares your results to industry frameworks (NIST CIS, MITRE, MITRE). It helps establish a gold standard for cyber resilience by continually assessing your organization's exposure to risk. The TE platform improves decision making based upon your business context and helps you to allocate financial resources more effectively. To strengthen decision-making in Security, IT and Risk Management, communicate your cybersecurity strategy to the Board of Directors and the C-level. We can help you overcome challenges such as vendor risk management, tight budgets, resource limitations, or applying the right level protection and risk management to propel your company forward.
  • 33
    Tandem Software Reviews
    Tandem is an online tool that reduces regulatory compliance burdens and improves security posture. This is your all-in one information security and compliance solution. Tandem is our product because it works in partnership with you - in tandem. Tandem brings together your organization's knowledge and your needs. Tandem also offers software designed by information security professionals to help you organize, manage and monitor your information security program. Tandem will handle the new guidance, data tracking and structure, as well as report generation. You will be amazed at what you can do with the right tool for your job.
  • 34
    Relyance AI Reviews
    Relyance AI protects your business against fines and reputational damage, while enhancing customer confidence to drive growth. We provide unparalleled visibility into enterprise-wide processing of data and align it continuously with global privacy regulations and compliance frameworks as well as your contractual obligations.
  • 35
    Supply Chain Catalyst Reviews
    Supply Chain Catalyst provides a 360-degree view on suppliers, including financial, sustainability and operational risk factors. This helps the user to identify vulnerabilities and predict potential disruptions in the supply chain. It assists organizations with complex supply chains and distribution channels to make better decisions about onboarding and monitoring suppliers and to reduce risk in their supply chain. Supply Chain Catalyst is powered by the award-winning Orbis database. It allows organizations to focus on specific risk factors like financial deterioration and reputational risks as well as exposure to major climate events. It allows firms to combine their supplier knowledge with extensive company information, robust risks metrics, and extensive analytical tools.
  • 36
    Docutrax Reviews

    Docutrax

    Risk Toolbox Inc.

    $4,500 per year
    Docutrax's online system for tracking documents and certificates of insurance is designed to meet best-practices risk management goals. The system automates many of the tedious, time-consuming, and error-prone processes involved in obtaining and tracking COIs or other documents. Docutrax has been proven to achieve higher rates of insurance coverage compliance, at lower cost, while enhancing business processes in ways previously unimaginable. Its flexible interface can be adapted to any business organization. All parties involved are automatically notified via customized vendor/broker notifications, and pushed email alerts to the designated personnel. Our licensed insurance and support personnel ensure informed customer services to our client (tenants, vendors/suppliers, contractors or franchisees). Their insurance agents.
  • 37
    GRMS Reviews

    GRMS

    GRMS | Global Risk Management Solutions

    GRMS, a risk assessment platform that leverages advanced technology, provides customizable Supplier Risk Assessment Programmes. GRMS gives companies the ability to monitor and manage suppliers continuously. GRMS is different from data only providers such as Thomson Reuters and D&B. GRMS' services include validation of data, physical inspection of documents, and a support system that assists suppliers in obtaining compliance with a client’s unique risk assessment requirements. GRMS' Supplier risk Assessment Programs are available in more than 120 countries. They can be delivered via a SaaS model, or seamlessly integrated with the leading Supplier Management Platforms. Services for risk assessment include: Financial Stability and Cyber Security, Digital Insurance Verification and Document Verification. Reputational Protection, Social Responsibilities, Regulatory Compliance and Health and Safety are all possible.
  • 38
    D&B Onboard Reviews
    Ensure that you adhere to your internal policies. Reduce regulatory and reputational risk and work faster with clients. This applies to all new customers and suppliers. Identify the company or person that you wish to audit. Access to compliance-related information, such as media sources, sanction lists and PEP lists, becomes available. Add your notes - eg surveillance reminders and categorization. Each run is recorded and traceable to all employees involved. These runs can be followed up on a regular basis to automate and secure the department's processes. You can search the data and make your own notes. For compliance purposes, keep a record of the search that is dated and timestamped. You will be able to make faster compliance decisions if you are able to get to know your customers.
  • 39
    SecurityStudio Reviews
    To reduce the burden on your company's employees and vendors, simplify your vendor risk management program. Standardize the process for locating third- and fourth-party vendors. Keep track of vendors that pose a risk to you company. Protect your company from any vendor-related risk and protect it against regulators, lawyers, and customers in the event of a breach. SecurityStudio is different from other vendor risk management tools. It doesn't just communicate risk. SecurityStudio provides an automated workflow that evaluates all third-party vendors. It then brings your weakest links to light. You can then accept, reject or request remediation for each vendor.
  • 40
    Contingent Reviews
    Streamline global due diligence by seamlessly searching through millions of companies and importing your existing database. Your team will be able to understand the risks in your supply chain and third-party network while complying with regulations. You can reduce the stress by receiving relevant alerts in real-time whenever your supplier or third party is at risk. You can select the tolerance criteria, disruption events, or metrics that you want to monitor and get these alerts in the channel of your choice. Deep insights and reporting allow you to uncover efficiencies and save money, making digital transformation quick and cost-effective. You can improve compliance by following the exact procedure that you have set.
  • 41
    Abriska Reviews

    Abriska

    Ultima Risk Management

    Abriska is a web-based tool (think software as an service). It has a variety of modules that help organizations implement best practices in managing risk. URM's first module, which dealt with information security risk, was followed by others that addressed business continuity, supplier risk, and operational risk. URM is a Microsoft Partner and Abriska was developed using standard Microsoft technologies (e.g. .net core, SQL Server. Abriska can also be hosted in Azure, Microsoft's cloud computing environment. Abriska is used by many organizations from different industries. It is most commonly used when certifying or complying with International Standards (e.g. ISO 27001 and ISO 22301 and are in search of a risk management product that meets the requirements of the Standard. URM has assisted organizations in their risk management journey.
  • 42
    SAP Ariba Supplier Risk Management Reviews
    SAP Ariba Supplier Risk allows you to help your buyers make better, safer purchases by making risk due diligence an integral part of the procurement process. Your buyers will make better decisions and prevent disruptions in the supply chain if they are well informed. This helps you avoid any damage to your reputation or revenue. You'll also have a high level of confidence that your supplier information has been updated and is accurate. This market-leading supplier risk solution allows you to tailor risk views and alerts to suit your business, each supplier relationship, as well as your role. You can also segment suppliers according to your risk exposure. You can make better business decisions and collaborate with your trading partners by having a complete view on each supplier. Integrate with SAP ERP, SAP Ariba Procurement and Ariba Network to easily understand your supply chain.
  • 43
    Resilinc Reviews

    Resilinc

    Resilinc

    $1,400 per month
    Got data? We have data, right down to the nth tier. Access to over 10 years of supply chain disruptions, and in-depth supplier assessments based upon autonomous and human research. You'll be able to access everything you need about your suppliers, whether it's disruption due to financial health, labor issues, cyber attacks, natural disasters, or financial health. You can map your suppliers and their suppliers down to the nth-tier to visualize your entire supply chain. This will allow you to keep an eye on potential vulnerabilities down to site and part levels. You'll be able to quickly make informed decisions if disruption occurs or is imminent. Disruptions can happen. Respond quickly and be the first to know. Our EventWatchAI filters out the noise so your notifications are 100% relevant. Additionally, our team provides well-researched and actionable notifications. We monitor over 100 languages and millions of news feeds every day.
  • 44
    OneTrust GRC & Security Assurance Cloud Reviews
    Scale your security and risk functions to ensure you can face challenges confidently. Each day brings new and unexpected threats to organizations and people. OneTrust GRC, Security Assurance Cloud, and the OneTrust GRC bring resilience to your organization and supply chains in the face continuous cyber threats, global crises and more - so that you can operate with confidence. A unified platform to prioritize and manage risk allows you to manage increasingly complex regulations, security frameworks and compliance requirements. Based on your chosen method, gain regulatory intelligence and manage first or third-party risks. Centralize policy development using embedded business intelligence and collaboration capabilities. Automate evidence collection and manage GRC tasks throughout the business with ease.
  • 45
    BitSight Reviews
    The world's most trusted security rating platform allows you to make data-driven decisions that reduce cyber risk. BitSight is the most widely used Security Ratings platform. It has a mission to transform the way the world approaches cyber risk. BitSight provides data-driven and dynamic measures of an organization's cybersecurity performance. These measurements are derived from objective, verifiable, material and validated measurements that were created by an independent, trusted organization. BitSight for Security Performance Management assists security and risk leaders in taking a risk-based and outcome-driven approach to managing their organization's cybersecurity performance. This includes broad measurement, continuous monitoring, detailed planning and forecasting to reduce cyber risk. You can make quicker, more strategic cyber risk management decision.
  • 46
    RiskAssessmentAI Reviews
    We can handle any file format or security framework. Our robust internal cybersecurity framework aligns seamlessly with any standard that your customer uses, whether it is SOC-2 or ISO 27001. Our free, intuitive browser extension allows you to access your security knowledge anywhere and anytime on the web. You can easily navigate and manage popular online platforms such as SecurityScoreCard or ProcessUnity. Upload your internal policies, procedures and security presentations. You can also upload any previous vendor risk/cyber assessment. Unify your teams using a tool that facilitates seamless collaboration. Centralize your evaluations and easily monitor progress. Instantly view approval statuses. All in one intuitive dashboard.
  • 47
    Certa Reviews
    Certa is a platform that allows you to create workflows without the need for code. Certa connects people, processes, and data sources into a single platform that seamlessly integrates with your enterprise ecosystem. Certa's workflow design toolkit allows you to create dynamic third-party solutions that adapt to your business. Software as a Service platform for business-to-business interactions. This includes onboarding, due diligence and risk mitigation. It also allows for monitoring third party relationships. It is highly configurable, so your company doesn't need to modify its business rules. Easy ongoing changes ensure that you can improve your process. Native integrations with major enterprise systems, plus over 50+ data sources. Our no-code open API framework and RPA framework allow us to quickly integrate with new APIs. The process is facilitated by personalized dashboards that inform each user group. They know exactly what to do and what's still waiting for their approval.
  • 48
    Halo Ai Reviews
    Halo Ai can help you reduce costs, improve quality, and grow your business. It's like a full-body scanner for your vendors. We integrate millions of datapoints from countless sources, covering 430M companies worldwide. We eliminate the need to complete lengthy questionnaires and deliver compliance control assessment in minutes. Our AI models are trained to correlate, contextualize, and connect 1,000s of datapoints in order to give you the complete risk story. We provide a 360-degree view of your vendors so that you can be more informed and aware of the areas of concern. We identify vendors who are highly vulnerable to attack and take specific measures to mitigate risk. You can see real-time updates automatically, so you have a comprehensive risk picture at hand. Automated processes can help you focus your best resources on the most important areas. Reduce risks and increase growth for your business.
  • 49
    Nexus Lifecycle Reviews
    Ensure that your entire software supply chain is protected. Developers can use a Chrome browser extension to see if an open-source component is vulnerable when they select from public repositories. Developers can integrate to the most popular IDEs to quickly select the best components based upon real-time intelligence, and then move to an approved version in one click. Nexus Lifecycle integrates Eclipse, IntelliJ and Visual Studio. Nexus Lifecycle integrates to GitHub, GitLab and Atlassian Bitbucket in order to automatically generate pull request for components that violate open-source policies. Developers can see which versions they should use to fix violations. No more guessing which version to upgrade to. Because Nexus Intelligence is the only automated dependency management solution that can eliminate noise, developers can trust that the PRs are accurate.
  • 50
    Sphera Supply Chain Risk Management Reviews
    Sphera Supply Chain Risk Management can help you identify, assess, and mitigate supply chain risks. We can help you master supply chain risk management. Sphera Supply Chain Risk Management can help you identify, analyze, and mitigate all types supply chain risk. We can help you turn risk into opportunities to rise above your competition. With Impact Analyzer, you can prevent risk from costing your business. Evaluate supplier criticality and identify vulnerabilities in the category. Action Planner will save you valuable time and help you make the right decisions. To prevent risk, collaborate with your suppliers and your organization. Your suppliers are the only ones who have the answers to certain areas of your risk exposure. You need a professional to help you. Invite your suppliers to join you on the next frontier in supply chain risk visibility.