TagControl

TagControl

Crownpeak
+
+

Related Products

  • Onspring
    169 Ratings
    Visit Website
  • Resolver
    257 Ratings
    Visit Website
  • Predict360
    18 Ratings
    Visit Website
  • D&B Risk Analytics
    66 Ratings
    Visit Website
  • Intelex
    128 Ratings
    Visit Website
  • Hyperproof
    265 Ratings
    Visit Website
  • eBuyerAssist
    112 Ratings
    Visit Website
  • HSI Donesafe
    148 Ratings
    Visit Website
  • GOAT Risk
    62 Ratings
    Visit Website
  • Cloud Claims
    11 Ratings
    Visit Website

About

Simplify your vendor risk management program to ease the burden on your company and its employees. Standardize the process to easily locate all third and fourth-party vendors and keep track of those that pose a risk to your company. Defend against any risk created by your vendors, and against lawyers, regulators and customers if a breach occurs. Unlike other vendor risk management tools on the market, SecurityStudio doesn’t simply communicate risk. Through an easy-to-use automated workflow, SecurityStudio evaluates all third-party vendors and brings your weakest links to the surface. Then you have the power to accept, avoid or request remediation of each vendor.

About

Every time you add a tag to your website, you give unknown vendors access to your data. Find out which tags pose a security risk and block them with one click. Marketers need martech tools to build more effective digital campaigns, but for every tool added to your site, numerous unknown vendors get access to your data. Watch the video to learn how TagControl mitigates the risk. If you're like most enterprise companies, your marketing team has an abundant martech stack, which is powered by tags you add to your website. These tags give your vendors access to the data they need to fulfill their commitment to you. The problem is, they often give access to other unknown parties too. Hidden in the code of the tags provided by your martech vendors are additional tags that also give their partners access to your user data (without your permission). These are called piggyback tags, and they can cause security issues, violate privacy laws, and degrade the user experience.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Businesses that have over 50 vendors and want to calculate risk

Audience

Website managers that need a tag management solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

SecurityStudio
Founded: 2008
United States
securitystudio.com

Company Information

Crownpeak
Founded: 2001
United States
www.crownpeak.com/products/monitoring-solutions/tagcontrol

Alternatives

Onspring

Onspring

Onspring GRC Software

Alternatives

TagCommander

TagCommander

Commanders Act
Vendor360

Vendor360

CENTRL
The Tag Monitor

The Tag Monitor

Code Cube

Categories

Categories

Integrated Risk Management Features

Audit Management
Compliance Management
Dashboard
Disaster Recovery
Incident Management
IT Risk Management
Operational Risk Management
Risk Assessment
Safety Management
Vendor Management

Risk Management Features

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
Internal Controls Management
IT Risk Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Vendor Management Features

Audit Management
Contact Management
Customer Database
Self Service Portal
Supplier Master Data
Transaction History
Vendor Maintained Profiles
Vendor Managed Inventory
Vendor Performance Rating
Vendor Qualification Tracking

Integrations

No info available.

Integrations

No info available.
Claim SecurityStudio and update features and information
Claim SecurityStudio and update features and information
Claim TagControl and update features and information
Claim TagControl and update features and information