Best IT Risk Management Software - Page 2

Compare the Top IT Risk Management Software as of February 2026 - Page 2

  • 1
    Network Detective Pro

    Network Detective Pro

    RapidFire Tools, a Kaseya Company

    Automate collection of data across the entire network to identify and respond to risk. Network Detective Pro is an IT assessment solution that identifies risks and issues, scores their severity and presents them in actionable dashboards and dynamic reports. Enhance network visibility and gather data from across the IT environments you manage. With Network Detective Pro you can uncover, prioritize, and manage risks and issues. Ensure the integrity of your systems with automated data collectors. Network Detective Pro uses non-intrusive data collectors, light-weight discovery agents, and powerful scanners to identify risks quickly. Reduce risk efficiently with detailed management plans and remediation guidance that scores network threats and issues based on severity. Customize which IT issues are reported and the importance that they are given in an assessment.
  • 2
    Clym

    Clym

    Clym

    Clym is an affordable compliance platform that is easy to understand, looks good and protects your business immediately. Manage cookie consent, data subject requests and do not sell my private information requests for global compliance regulations such as GDPR, CCPA and LGPD. One platform for global privacy needs. Clym is the data privacy platform that helps organizations meet their data protection obligations. Cookies, consent, requests, policies and more are all managed in a secure and adaptive application. Clym helps you collect, control and manage the data that is relevant for your company in a transparent way. The platform covers 6 main areas of compliance, namely: data consent management, cookie consent management, company & DPO data management, terms, policies, agreements & procedures, data subjects’ requests, localization and consent receipts. Through all its functionalities, Clym provides a head start in data privacy compliance.
    Starting Price: $45 per month
  • 3
    SecurityScorecard

    SecurityScorecard

    SecurityScorecard

    SecurityScorecard has been recognized as a leader in cybersecurity risk ratings. Download now to see the new cybersecurity risk rating landscape. Understand the principles, methodologies, and processes behind how our cybersecurity ratings work. Download the data sheet to learn more about our security ratings. Claim, improve, and monitor your scorecard for free. Understand your vulnerabilities and make a plan to improve over time. Get started with a free account and suggested improvements. Gain a holistic view of any organization's cybersecurity posture with security ratings. Leverage security ratings for a variety of use cases, including risk and compliance monitoring, M&A due diligence, cyber insurance underwriting, data enrichment, and executive-level reporting.
  • 4
    ReadiNow

    ReadiNow

    ReadiNow

    ReadiNow’s no-code, agile GRC platform let's your team management functionality to automate and edit any processes you need. Boost productivity and connect your data so that you can drill down and obtain valuable data insights for reports and board-level decisions. Beautiful, professional & enterprise-grade applications are ready without the need for programmers or coding. Simply drag and drop to create forms, reports, dashboards, workflows, and integrations with your existing systems. Automate any business process with the visual workflow builder to bring your applications to life. Turn the wealth of data in your business to actionable information with custom reporting and built in data analytics. Auto generate invoices, status reports, plans, time sheets or any type of document with real time data. Instantly deploy your applications to any mobile device so you always have access to your information on the go.
  • 5
    LogicManager

    LogicManager

    LogicManager

    LogicManager is a holistic Enterprise Risk Management (ERM) platform that empowers organizations to make risk-informed decisions, drive performance, and demonstrate accountability across the enterprise. Unlike siloed tools, LogicManager connects governance, risk, and compliance activities in a centralized, no-code environment—turning insights into action through its patented Risk Ripple® Intelligence. From policy management and control testing to incident tracking and board reporting, LogicManager streamlines workflows, strengthens internal controls, and provides real-time visibility across departments. With built-in automation, relationship mapping, and AI-powered guidance from LogicManager Expert, users can identify emerging threats, align with strategic goals, and reduce complexity. Backed by award-winning support, LogicManager transforms risk management into a collaborative, proactive function that protects reputations and drives long-term value.
  • 6
    Allgress

    Allgress

    Allgress

    Allgress strives to provide the best Risk Management solutions and your feedback can help us be better. We invite you to add your voice to the mix by creating a new or updating an existing review. Evaluate our IT Risk Management and/or IT Vendor Risk Management Tools solutions on Gartner Peer Insights. In 15 minutes or less, help your peers find the best Risk Management Solutions.
  • 7
    VGS Platform

    VGS Platform

    Very Good Security

    The VGS Vault enables users to safely store their tokenized data. This creates a safe haven for your most sensitive data. In the event of a breach, there’s nothing to steal. You can’t hack what’s not there. VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it. Use the interactive example to see how data is transformed by VGS. Choose Redact or Reveal to hide or display data, respectively. Whether you’re building a new product and want best-in-class security from the start or are an established company looking to eliminate compliance as a roadblock to new business, VGS can help. VGS takes on the liability of securing your data, eliminating the risk of data breaches and reducing compliance overhead. For companies that prefer to vault their own data, VGS layers on protection to the systems, preventing unauthorized access and leakage.
  • 8
    SafePaaS

    SafePaaS

    SafePaaS

    SafePaaS offers proven solutions to industry specific Governance Risk and Compliance challenges. SafePaaS Industry Controls Solutions improve margins by mitigating risk of operational losses for all major industries including Consumer Goods, Education, Energy, Financial Services, Health Care, High Tech, Life Sciences, Manufacturing, Media & Entertainment, Public Sector, Retail and Transportation, Construction, Banking. SafePaaS optimizes all significant business process with embedded controls throughout the process to help organizations move to a proactive and predictive GRC management approach from an informal or reactive approach. SafePaaS Process Controls Solutions are available for all major business areas including: Financial Management, OrderManagement, Procure-to-Pay Management, Supply Chain Management, etc. SafePaaS is a Complete Governance, Risk and Compliance platform with integrated ERP Application Controls Management for all major ERP systems.
  • 9
    Pirani

    Pirani

    Pirani

    Software that allows to prevent, establish controls and measure the risks associated to money laundering and terrorism financing that the companies can be exposed to. Pirani AML Suite allows it to segment clients based on similar transactional behaviors and monitor operations that may be suspicious, also, to detect actions that may be related to fraud or money laundering in time by monitoring the financial operation realized in any transactional channel. Establish controls and measure the risks associated to money laundering and terrorism financing that your company can be exposed to. Learn how we help you by requesting a tour of our solution. Compliance of regulations and external circulars related to the implementation of a LAFT risk system. Diagnosis of the data that the client has in order to calculate the integrity of the data. Information of the client in a single screen for the analysis of the alerts.
    Starting Price: $19,000 per year
  • 10
    Kovrr

    Kovrr

    Kovrr

    Quantum is a cyber risk quantification (CRQ) platform with a set of new functionality and services that will help your business translate cyber risk into business impact. Quantum is designed to help CISOs, Chief Risk Officers and boards take control. It enables them to visualize the effectiveness of a cybersecurity program, assess the potential risk reduction for future cybersecurity investments, and form a solid risk transfer strategy. Get better coverage at a better rate on your cyber insurance policy. Use our security control ROI calculator to understand the financial benefits of improving your cybersecurity risk posture. Enhance the board and C-Suite’s decision-making process by financially quantifying cyber risk. Prioritize and justify cybersecurity investments based on business impacts and risk reduction. Assess the ROI of your cybersecurity program and stress test it based on potential risk mitigation actions, thereby supporting better resource allocation.
  • 11
    Powertech Compliance Monitor for IBM i
    IBM i compliance reporting shouldn’t be the most complex part of compliance. Simplify the task of generating reports across your iSeries systems. Compliance Monitor consolidates audit and security data from multiple systems into a single report, saving your shop time and money. Give auditors the information they need without the expense or risk of developing homegrown reporting applications. With an easy-to-use web interface and flexible filters, you can define and display the data exactly as auditors require. Turn mounds of IBM i data into useful reports that help system administrators identify opportunities to improve system security with our compliance monitoring software. Retrieve and store the audit data you need while saving space. Compliance Monitor’s log aggregation architecture allows audit journal data to be retrieved and stored in a highly compressed state on a central consolidator system.
  • 12
    Perium

    Perium

    Perium BV

    Perium; the most user-friendly platform for complete risk management Perium is the all-in-one platform for risk management. In no time at all you will be equipped with an intuitive and flexible system for risk management and reporting. From now on, meet all standards for security, privacy, and digital resilience. Protect the data of your employees, customers, suppliers, and your organization quickly, simply, and smartly with Perium. Standards available (new ones added all the time): ISO27001, ISO27002, BIO, NEN7510, NTA7516, NEN7512, NEN7513, ISO27701, HKZ, ISO9001, ISO50001, DigiD, DNB Good Practice, BIC, ISQM, PCI-DSS, Suwinet, Wpg, IBP Onderwijs, NIS2 Directive, DORA, PIMS, ISMS, NCSC Handreiking, NIST CSF, NIST AI, NVZ Gedragslijn, Cloud Control Matrix, Horizontaal Toezicht
    Starting Price: $500
  • 13
    ScalePad ControlMap
    There are thousands of steps between you and your cybersecurity compliance goals. With the right cybersecurity compliance management software, you’ll hit the ground running. Start with customizable, expert-verified templates, and cross-mapping finds the overlap between common standards to get you cruising through compliance tasks. Managing evidence and policies keeps everything at hand. Keep tabs on risks and vendors too, no more spreadsheets and scattered documents, everyone on the team needs to contribute to compliance. In this personalized portal, they can access policies and handle any tasks they need to do.
    Starting Price: $200 per month
  • 14
    SmartProfiler for M365
    SmartProfiler for Office 365 assessment is an automated health & risk assessment solution to help you significantly improve your Microsoft Office 365 ecosystem health & security posture. SmartProfiler for Office 365 assessment follows CIS workbench controls and other tests designed by our Office 365 experts. The Center for Internet Security is a nonprofit entity whose mission is to ‘identify, develop, validate, promote, and sustain best practice solutions for cyberdefense.’ It draws on the expertise of cybersecurity and IT professionals from government, business, and academia from around the world. To develop standards and best practices, including CIS benchmarks, controls, and hardened images, they follow a consensus decision-making model. SmartProfiler is designed to support CIS standards designed for Office 365 and Azure assessments.
    Starting Price: $2,499 per tenant
  • 15
    TrustCloud

    TrustCloud

    TrustCloud Corporation

    Don’t struggle with 1000s of vulnerability smoke signals from your security tools. Aggregate feeds from your cloud, on-premises, and bespoke apps, and combine them with feeds from your security tools, to continuously measure the control effectiveness and operational status of your entire IT environment. Map control assurance to business impact to assess which gaps to prioritize and remediate. Use AI and API-driven automation to accelerate and simplify first-party, third-party, and nth-party risk assessments. Automate document analysis and receive contextual, reliable information. Run frequent, programmatic risk assessments on all your internal and third-party applications to eradicate the risk of one-time or point-in-time evaluations. Take your risk register from manual spreadsheets to programmatic, predictive risk assessments. Monitor and forecast your risks in real-time, enable IT risk quantification to prove financial impact to the board, and prevent risk instead of managing it.
  • 16
    Whistic

    Whistic

    Whistic

    The best way to assess, publish, and share vendor security information. Automate vendor assessments, share security documentation, and create trusted connections—all from the Whistic Vendor Security Network. Once companies start using Whistic, they can’t imagine how they managed vendor security assessments or responded to questionnaire requests before. Avoid the black box security reviews of the past by openly sharing vendor security requirements and publishing profiles. Focus on establishing trust rather than chasing down spreadsheets. Initiate assessments, assign inherent risk, engage vendors, calculate risk scores and trigger reassessments—automatically. In the fast-paced business environment we’re living in, no one has time for the slow, outdated security review processes of the past. Access the security posture of thousands of businesses immediately with Whistic.
  • 17
    Blueprint

    Blueprint

    Blueprint Software Systems

    Blueprint is the engine that powers your digital transformation. Integrating directly with your RPA tool, Blueprint fast-tracks transformation activities by providing a better way to capture, design, govern, and manage high-quality business processes - or migrate entire RPA bot portfolios. This eliminates many of the challenges of scaling RPA enterprise-wide, allowing you to execute against your vision at velocity and drive greater ROI. Quickly capture and document all process information in one centralized database to easily identify existing processes as well as areas for improvement. Map the flow of work between people and systems and layer in any dependencies, controls, regulations, or handovers.
  • 18
    Contego

    Contego

    ASA Development

    Contego is an integrated software suite that manages all aspects of your operation. Systems talk to each other, there is no need to waste time populating multiple platforms. Contego is a collaboration platform that drives improved efficiency across the entire organization. The benefits extend to managing personnel, equipment, operational issues and the associated documentation on one centralized platform. The single dataset allows for information to be interpreted at a system level while still having a practical application at the shop level. This allows management to make informed & proactive decisions that improve overall business outcomes as well as accelerate your organization's continual improvement. Enhanced accountability and visibility across the organization results in improved governance at all levels. Contego integrates data across multiple platforms. This is the key to operational efficiency.
  • 19
    ZEVA

    ZEVA

    CodeLynx

    Zeva provides a highly intuitive interface and utilizes Microsoft’s Azure Cloud to provide a robust and secure hosted environment to scale from small organizations with fewer than 10 users to global enterprises with over 10,000 employees. What makes ZEVA a value proposition, for any organization, is the ability to create and manage an unlimited number of custom assessments, while providing real time data and analytics to decision makers and management anywhere in the world. Mitigate risk and maintain compliance with centralized secure hosting, improved reporting, and real-time dashboards and analytics. Items identified with “Findings” can be immediately assigned corrective measures to ensure timely remediations. The CodeLynx team developed the ZEVA platform to support the evolving evaluation requirements of commercial and government organizations of any size.
  • 20
    Solver SDK

    Solver SDK

    Frontline Systems

    Use optimization and simulation models in your desktop, Web or mobile application. Use the same high-level objects (like Problem, Solver, Variable and Function), collections, properties and methods across different programming languages. The same object-oriented API is exposed "over the wire" through Web Services WS-* standards to remote clients in PHP, JavaScript, C# and other languages. Procedural languages can use conventional calls that correspond naturally to the properties and methods of the Object-Oriented API. Linear and quadratic programming, mixed-integer programming, smooth nonlinear optimization, global optimization, and non-smooth evolutionary and tabu search are all included. The world's best optimizers, from Gurobi™, XPRESS™ and MOSEK™ for linear, quadratic and conic models to KNITRO™, SQP and GRG methods for nonlinear models "plug into" Solver SDK. Easily create a sparse DoubleMatrix object with 1 million rows and columns.
    Starting Price: $2495 one-time payment
  • 21
    SAI360

    SAI360

    SAI360

    The most powerful, agile approach to risk management. The decisions you make today can help mitigate the risks you may encounter tomorrow. SAI360 is cloud-first software and modern ethics and compliance learning content designed to help your organization effectively navigate risk with a flexible, agile approach. Intelligent solutions, global expertise all in one award-winning platform. Solution configurability, extensible data model with configurable UI/forms, fields, relationships to extend solutions. Process modeling, easily modify or create new processes to automate and streamline risk, compliance, and audit activities. Data visualization and analysis, many out of the box and easy to configure dashboards to visualize and analyze data. Learning and best practice content – preloaded frameworks, control libraries, and regulatory content along with values-based ethics and compliance learning content. System integration – Integration framework with APIs and other protocols.
  • 22
    Xyea

    Xyea

    Xyea

    Enabling vulnerable people to live a better quality of life. Ensuring that the people bring support are happy and safe and feel they get the right type and quality of support to enable them to live fulfilled lives. Those being supported can live safe, well-supported, and fulfilled lives. Families are happy that they chose well in the service provider selected and are fully engaged and up-to-date on all aspects of their loved one’s life in as much as they wish to be. Vulnerable people and their loved ones feel absolutely safe and are reassured by their services provider’s capability and track record to support them taking risks that promote positive life experiences. Providers can support individuals and their families to the standard expected in these very challenging times using the Xyea COVID-19 package. Ensuring each individual has an enhanced life experience, achieving what is important to them and supported in a personable, friendly and relaxed manner at a pace that suits.
  • 23
    Verba Recording System

    Verba Recording System

    Verba Technologies

    Transform your compliance operations and confidently navigate through financial services and trading regulations. Capture interactions and retrieve recordings quickly, even in unstructured content, to reduce effort, track trends, mitigate liability, and enhance compliance. Organizations have long been recording interactions between their customers and employees for liability protection, compliance, and quality management purposes. While these recordings can contain massive amounts of useful information, extracting actionable intelligence from them quickly can be challenging. Verint Interaction Recording is a single, prepackaged solution that couples call recording with the power of speech processing, helping you realize more value from captured interactions. Verint Cloud offers Interaction Recording to capture, index, archive and retrieve interactions across voice, video, chat, social media, face-to-face and other unified communication platforms.
    Starting Price: $500 one-time payment
  • 24
    MetricStream

    MetricStream

    MetricStream

    Reduce losses and risk events with forward-looking risk visibility. Enable a modern and integrated risk management approach with real-time aggregated risk intelligence and their impact on business objectives and investments. Protect brand reputation, lower the cost of compliance, and build regulators and board’s trust. Stay on top of evolving regulatory requirements, proactively manage compliance risks, policies, cases, and controls assessments. Drive risk-aware decisions and accelerate business performance by aligning audits to strategic imperatives, business objectives and risks. Provide timely insights on risks and strengthen collaboration across various functions. Reduce exposure to third-party risks, make superior sourcing decisions. Prevent third-party risk incidents with continuous third-party risk, compliance and performance monitoring. Simplify and streamline entire third-party risk management lifecycle.
  • 25
    Citicus ONE
    Our Citicus ONE software is available via our basic and premium hosted services. These provide a highly-responsive alternative to an in-house installation. Our basic hosted service allows you to get started immediately without having to set up the infrastructure to support the application internally. Our premium hosted service offers a very flexible approach that allows you specify the precise grade of service you require and control its method of connectivity to your corporate intranet eg using a Virtual Private Network (VPN). A hosted implementation can be migrated to an in-house installation subsequently if required. Our hosted services are used by organizations with the most stringent security requirements and have been subjected to thorough independent review.
  • 26
    STREAM Integrated Risk Manager

    STREAM Integrated Risk Manager

    Acuity Risk Management

    STREAM Integrated Risk Manager is an award-winning GRC platform that allows organizations to centralize, automate, quantify and report on risk. It can be used for a variety of applications including cyber / IT risk management, enterprise risk management, operational risk management, BCM and vendor risk management. STREAM has been around for over 10 years and is available as a SaaS or on-premise deployment. It has been adopted by organizations around the world, across various industries including finance, energy, healthcare, manufacturing, legal and IT. Please contact us to discuss specific requirements or visit the Acuity website for more information.
  • 27
    Tectia

    Tectia

    SSH Communications Security

    We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security.
  • 28
    ClusterSeven

    ClusterSeven

    Mitratech

    With ClusterSeven Shadow IT Manager, gain control over the hidden spreadsheets and other data assets that put your enterprise at risk. Discover and manage the hidden, sensitive spreadsheets, applications, and data assets that lie outside of IT’s control – and create risk. Now you can easily and efficiently capture and maintain an inventory of the files your organization relies upon and monitor who’s making changes, helping you meet audit and compliance requirements and prevent problems before they impact your enterprise. Classify the risks associated with your newly discovered EUC files and organize them in a centralized database. Once you’ve established the spreadsheets your organization is using, you can carry out a deeper risk analysis on critical files using rules that matter to your business, such as the complexity of a formula or macro, use of sensitive terms in the file like “confidential,” inclusion of unprotected client or personal data, or the presence of hidden worksheets.
  • 29
    Isora GRC

    Isora GRC

    SaltyCloud, PBC

    Streamline your IT Risk Assessments with Isora GRC. Leverage a lightweight, yet powerful surveying solution for conducting IT Risk Assessments. Launch self-assessment questionnaires for departments, people, facilities, devices, and applications. Leverage our library of preloaded questionnaires like NIST, HIPAA, GLBA, and more. Build or upload your custom questionnaires. Change question weights, allow partial credit, gate conditional questions, and add other question logic to simplify your questionnaires. Automatically rollup and score collected quantitative and qualitative survey data. Gain access to dynamic risk reports. Use the risk map to identify the highest-risk units or the trend graph to track risk scores year-over-year. Easily export the raw data to data analytics tools like Microsoft PowerBI using the RESTful API.
  • 30
    Archer

    Archer

    RSA Security

    Built upon decades of experience and hundreds of deployments across all domains of risk management. Whether your organization has an advanced Risk Management function looking to consolidate visibility or get started with one area of risk. Drive efficiency and coordination across stakeholders on a platform tailor-made for risk analysis and management. Archer enables a common understanding of risk, making it easier to work together to manage it. Applying the same taxonomies, policies and metrics to the management of all risk data enhances visibility for everyone, improves collaboration and increases efficiencies. Explore our comprehensive approach to integrated risk management with a demo of Archer. See the UI and discover how the features, dashboards, and capabilities can best address your organization’s unique risk and compliance challenges, whether you deploy our on-premises or SaaS offering.
MongoDB Logo MongoDB