Compare the Top IT Risk Management Software in China as of March 2026 - Page 3

  • 1
    ServiceNow Integrated Risk Management
    ServiceNow Integrated Risk Management allows you to manage risk and compliance enterprise-wide through change and disruption created by evolving global regulations including privacy and ESG, human error, cyberattacks, digital transformation, and more. By seamlessly embedding risk management and compliance into your daily workflows and familiar user experiences you can enable a common language to improve risk-informed decisions, reduce costs, gain real-time visibility into risk, and effectively communicate with stakeholders at all levels. Only ServiceNow can connect the business, security, and IT with an integrated risk framework that transforms manual, siloed, and unfamiliar processes into a user-friendly, unified program built on a single platform.
  • 2
    Arctic Intelligence

    Arctic Intelligence

    Arctic Intelligence

    Innovative financial crime risk assessments to protect your business. Risk assessments are the cornerstone of any financial crime compliance program. From money laundering, terrorism financing, bribery and corruption and sanctions, Arctic Intelligence provides an enterprise-wide risk assessment solution to assess your business' vulnerabilities in line with global regulations and FATF guidelines. Our solutions can help address many challenges by providing defendable data-driven results and quickly establishing a program tailored to the organisation. Our technology can calculate and present firm wide risk profiles, identifying and highlighting high risk areas and control gaps or weaknesses. Real-time reporting can aggregate risk outcomes for both an individual business unit and organisation-wide level providing accurate, consistent and dependable results.
  • 3
    SAP Ariba Supplier Risk Management
    With SAP Ariba Supplier Risk, you can help your buyers make smarter, safer decisions before purchase, simply by making risk due diligence a natural part of the procurement process. And when your buyers are well-informed, they’ll make decisions that prevent supply chain disruptions. That helps you avoid damage to your revenue or reputation. Also, you’ll gain a high degree of confidence that your supplier information is correct and up to date. This market-leading supplier risk solution lets you tailor risk views and alerts to your business, to each supplier relationship, and to your role. You can also segment suppliers based on your risk exposure. With a complete view of each supplier, you can make more timely, contextual, and accurate business decisions, and improve collaboration with your trading partners. Easily understand your supply base with data provided by integration with SAP ERP, SAP Ariba Procurement, and Ariba Network.
  • 4
    SAFE

    SAFE

    Safe Security

    On average, a Fortune 2000 CISO today uses 12 cybersecurity products in their environment. This means they have 12 dashboards to tell them what’s going wrong and no place to aggregate all of them. Most cybersecurity product purchases fail to justify an objective ROI. A clear difference in the delta change of the organization's cyber resilience from its “before” to “after” implementation state of the product is missing. There is also no industry standard to measure the quality of the implementation of cybersecurity products. SAFE enables an organization to predict cyber breaches in their environment while contextually aggregating signals from existing cybersecurity products, external threat intelligence and business context. This data is fed into a supervised Machine Learning Bayesian Network-based breach likelihood prediction engine that gives scores, prioritized actionable insights, and the value risk the organization is facing.
  • 5
    Pathlock

    Pathlock

    Pathlock

    Pathlock brings simplicity to customers who are facing the security, risk, and compliance complexities of a digitally transformed organization. New applications, new threats, and new compliance requirements have outpaced disparate, legacy solutions. Pathlock provides a single platform to unify access governance, automate audit and compliance processes, and fortify application security. With Pathlock, some of the largest and most complex organizations in the world can confidently handle the security and compliance requirements in their core ERP and beyond. Whether it’s minimizing risk exposure and improving threat detection, handling SoD with ease, or unlocking IAM process efficiencies – Pathlock provides the fastest path towards strengthening your ERP security & compliance posture.
  • 6
    TruOps

    TruOps

    TruOps

    The TruOps platform centralizes all information and connects assets to risk and compliance data, including policies, controls, vulnerabilities, issue management, exceptions, and more. TruOps is a comprehensive cyber risk management solution. Each module is designed to maximize efficiency and solve the process challenges you face today while preparing your organization for the future. Consolidate disparate information and relationships to enable intelligent and automated choices and process information through risk-based workflows. Automate and streamline oversight of vendor relationships, perform due diligence, and consistently monitor third parties with this module. Streamline and automate risk management processes. Leverage conditional questions and a scenarios engine to identify risks. Automate the identification, planning, and response processes. Easily manage plans, actions, and resources and resolve issues promptly.
  • 7
    Trustero

    Trustero

    Trustero

    Many organizations are familiar with the complicated and tiresome SOC 2 Type 1 or Type 2 audit process that has become a prerequisite to closing most business deals. Using the power of artificial intelligence (AI) and other modern technologies, Trustero Compliance as a Service helps customers discover their source of truth with policies and controls mapped to a specific security framework. As a result, you will save hundreds of hours by automating hundreds of tasks, easing and speeding your path toward credible, sustainable compliance and trustworthiness. Simplify the path to audit readiness and continue to stay in compliance. When it’s time for an initial or annual SOC 2 audit, no one wants the headache of preparing for that audit from scratch. Our easy-to-manage dashboard gives you an up-to-date view of your audit readiness across your company. With these insights, you’ll know what’s working and what’s not, so you can keep on track and remain in compliance.
  • 8
    Seemplicity

    Seemplicity

    Seemplicity

    The fundamentals of workplace productivity have been redefined with automated workflows in nearly all domains. But what about security? When it comes to driving risk down, security teams are forced to play air traffic controller, deduplicating, sorting, and prioritizing every security finding that comes in, then routing and following up with developers all across the organization to make sure problems get fixed. The result, is a massive administrative burden on an already resource-constrained team, stubbornly long time-to-remediation, friction between security and development, and an inability to scale. Seemplicity revolutionizes the way security teams work by automating, optimizing, and scaling all risk reduction workflows in one workspace. Aggregated findings with the same solution on the same resource. Exceptions, such as rejected tickets or tickets with a fixed status but an open finding, are automatically redirected to the security team for review.
  • 9
    Vyapin Microsoft 365 Reports

    Vyapin Microsoft 365 Reports

    Vyapin Software Systems

    Vyapin Microsoft 365 Reports is the most advanced reporting & analytics solution for Office 365 Administration, Governance & Planning. Exchange Online Reports for Office 365 Vyapin Exchange online reporting tool gives you comprehensive information about your Office 365 Users, Groups, Mailbox configuration, Mailbox Security, Mailbox Usage, Folders, Contacts, Mail Items, Public Folders. You can also get various statistics on Mailboxes and Mails to monitor and plan efficient utilization of Exchange Online. Office 365 License Reporting & Usage Analysis When you provision users in Office 365, you assign licenses based on the job responsibilities of a User. The Microsoft native Office 365 portal does not allow you to assign licenses to groups of users and must be done one user at a time. Once you assign licenses, you need the ability to analyze Office 365 licenses across your organization using different sets of criteria to understand used and unused licenses.
  • 10
    ARCON | SCM
    The ARCON | SCM solution helps to enforce a comprehensive IT risk management framework – a unified engine of all IT risk management controls required to be implemented at different layers for effective risk mitigation. The solution ensures the creation of a robust security posture and ensures compliance. Critical technology platforms require continuous risk assessment. This can be achieved through the power of AI – governing, assessing, and optimizing the organization’s Information Risk Management. An organization’s IT infrastructure is constantly evolving, adding new capabilities and technologies, making it important for their cybersecurity and identity protection solutions to evolve with them. Having a unified engine for effective risk management implemented at different levels facilitates organizations to prioritize security and compliance efforts without the need for manual intervention.
  • 11
    EGERIE

    EGERIE

    EGERIE

    EGERIE benefits from a community of over 450 expert consultants trained and certified in our solutions. We share our knowledge with them and construct risk analyses jointly to ensure they meet users’ needs in terms of their markets and their specific situations. Agility and security must always be an integral part of cyber project management to create the conditions for effective risk detection and prevention. This is the whole purpose of risk analysis, which must be managed using an adaptive, dynamic model. To detect malicious behavior quickly and be as responsive and effective as possible when incidents occur, companies must strive to obtain maximum visibility over their infrastructure and their systems. This involves performing diagnostics and knowing which threats they may be exposed to and what they are covered against.
  • 12
    Telivy

    Telivy

    Telivy

    Experience the industry's most comprehensive and versatile audit tool, deployable seamlessly with a single script. Keep your networks, devices and data safe and secure by discovering any potential entry points for cyber attacks - from both inside and outside your organization. Protect your data from attacks that can encrypt, modify, corrupt or destroy data, such as ransomware. Ensure data is available to anyone in the organization who has access to it. Audit and configure proper access to all corporate assets on-premises and cloud. Enforce policies around user authentication, validation & privileges, and address issues regarding privilege creep. Test resilience to email phishing and application password detection attempts to gain access to restricted areas and exfiltrate confidential data.
  • 13
    eramba

    eramba

    eramba

    The real fuel that keeps eramba running and improving is its global community of users that leverage our simple and open code, documentation, forum, release planning, and business model. The experience of running for over a decade our community software helped us build our enterprise software that includes unlimited email support, additional features, and regular updates. Our ridiculously simple business model and affordable pricing is exclusively aimed at financing this project. Our community-driven repository of GRC templates is open and free for everyone no matter if you use eramba or not. Paying for templates is ridiculous if you consider the amount of brainpower the GRC community has. Compliance, internal controls, policies, mappings, questionnaires, etc.
  • 14
    360inControl
    Cybersecurity is essential for your company to protect your sensitive data, operations, and reputation from ever-evolving cyber threats and attacks. With 360inControl®, you can define and implement suitable measures for protection. Certifications strengthen a company’s credibility, efficiency, and ability to meet industry standards and gain customers’ trust. 360inControl® supports you in efficiently performing certifications in a time- and money-wise manageable way. Considering the ever-increasing complexity of regulatory requirements. Using 360inControl®, your organization ensures minimizing risks and maintaining effective governance. Centrally managed control library. Individually customizable and expandable. Pre-defined use cases for the identification of applicable controls.
  • 15
    Aegify RSC Suite
    For management ease and cost reduction, most healthcare providers and business associates prefer a unified risk, security and compliance solution. Today, the Aegify suite is a unique unified solution that operates at the intersection of security, compliance and risk management for healthcare, retail and financial organizations. For those that don’t need a unified RSC solution, each individual Aegify Manager product is a robust standalone solution. The market needs a holistic RSC solution that diagnoses, cures and prevents future catastrophic events from occurring.
  • 16
    Apomatix

    Apomatix

    Apomatix

    We have over ninety years of risk management and information security experience, and our products are designed to meet the unique challenges risk professionals face. Streamline and optimize your risk management activities. Identify, analyze, evaluate, and treat all your risks in one solution. Upgrade your information asset management. Record, assign, and manage your information assets in one central location. Simplify your internal control management process. Track implementation status and run control effectiveness tests for frameworks including ISO 27001 & CIS 20. We also have tools to automate the reporting process, saving you from having to manually build these in your spreadsheet. Together, these features help save time, reduce the burden of managing your risk register, and improve the quality of your risk assessments.
    Starting Price: $12.62 per user per month
  • 17
    CIMCON EUC Change Management
    The use of spreadsheets, models, Access databases, and other End User Computing (EUC) applications is increasing. Even if validated after development, further changes to EUCs are prone to errors and expose your firm to significant risk. EUC Insight Change Management continuously monitors high-risk EUCs to alert them on critical changes and implements flexible controls that reduce risk. Perform file comparisons and view changes side by side for spreadsheets, macrocode, and access databases. The smart audit trail can focus on specific areas or cells to spot trends or identify specific types of changes that have a high probability of error. EUC policies often require specific controls. EUCI Change Management provides automated versioning, security, and documentation, with reporting so that you can customize your procedures.
  • 18
    Pellonium

    Pellonium

    Pellonium

    Continuous cyber risk quantification, evaluation & business impact analysis based on what's actually happening in your organization. Prioritized tactics tailored to your environment & thresholds to reduce cyber risk exposure & increase security ROI. Automated compliance & controls management that leverage adaptable frameworks to significantly improve regulatory & internal oversight obligations. Shift from simply identifying what's wrong to why it actually matters & have data-driven confidence to ruthlessly protect investments & strategic goals. provides meaningful, actionable, and defensible insights to help security teams & executives answer the most urgent questions.
  • 19
    Bitahoy

    Bitahoy

    Bitahoy

    Our Quantitative Risk Assessment empowers you to compare risks by their true business impact, optimizing resource allocation and securing your organization's future. Augment your daily IT risk management processes with an AI-powered IT risk analyst that helps you prioritize, investigate and report risk-scenarios. We empower cyber risk managers to drive growth by perfectly matching your business objectives with your risk tolerance. Our approach ensures effective risk communication across every layer of your organization, cultivating a cooperative environment that encourages teamwork and synergy between different teams. Let our AI do the heavy lifting for you. We integrate and pre-analyze your data to provide you with actionable insights, allowing you to focus on what matters most. This enables swift responses to urgent incidents, averting potential losses before they occur, and propelling your organization forward with confidence.
  • 20
    Complyance

    Complyance

    Complyance

    Complyance is an AI-powered GRC platform designed for enterprise teams to centralize, automate, and manage their compliance, risk, vendor, and policy workloads. Its modular system includes out-of-the-box and fully customizable controls, a vendor management suite, risk registers, and a policy center. With hundreds of integrations into existing enterprise tools, Complyance automatically collects and maps evidence, continuously monitors controls and vendor risk, and keeps your compliance posture audit-ready. Built-in AI features (and optional specialized AI Agents) auto-draft policy documents, cross-map evidence to controls, score vendor risk, generate client questionnaire responses, and surface compliance gaps, cutting manual work by up to 70–90%. The AI operates in a privacy-first way; each client has an isolated instance, and no data is used to train shared models.
  • 21
    Jobarix

    Jobarix

    Maerix

    JOBARIX, our preventive analysis software enables you to analyze every risk in relation to a task, a piece of equipment or a workstation. Designed step by step, this analysis will allow the identification of every danger and hazard, implement control measures and reduce risks for the affected workers. This simple, intuitive system is easy to use, so you can concentrate your efforts on increasing performance. With one efficient tool you have a sound, centralized, document management system. Look no further, JOBARIX translates into Simplicity, Efficiency and Ingenuity! The ultimate goal is to reduce risks or eliminate hazards and to benefit from a healthier work environment. Knowing the risks to your business is the No.1 step in workplace safety! The task of performing a preventive analysis allows the detection of the risks that have to be mitigated through preventive measures.
  • 22
    IBM OpenPages
    Simplify data governance, risk management and regulatory compliance with IBM OpenPages — a highly scalable, AI-powered, and unified GRC platform. IBM® OpenPages® is an AI-driven, highly scalable governance, risk and compliance (GRC) solution that runs on any cloud with IBM Cloud Pak® for Data. Centralize siloed risk management functions within a single environment designed to help you identify, manage, monitor and report on risk and regulatory compliance, especially in today’s changing business landscape. Prepare for the future with an extensible, fully configurable, integrated enterprise risk management solution that scales to tens of thousands of users. Drive GRC adoption for all three lines of the business with a modern, task-focused UI to complete tasks.
  • 23
    @RISK

    @RISK

    Lumivero

    From the financial to the scientific, anyone who faces uncertainty in their quantitative analyses can benefit from @RISK. @RISK helps both Fortune 100 companies and private consultancies paint a realistic picture of possible scenarios. This allows businesses to not only buffer risks, but also identify and exploit opportunities for growth. @RISK (pronounced “at risk”) is an add-in to Microsoft Excel that lets you analyze risk using Monte Carlo simulation. @RISK shows you virtually all possible outcomes for any situation—and tells you how likely they are to occur. This means you can judge which risks to take on and which ones to avoid—critical insight in today’s uncertain world.
  • 24
    WolfPAC

    WolfPAC

    Wolf & Company

    Risk is hard and complex—but it doesn’t have to be. WolfPAC Integrated Risk Management® is a fully integrated suite of software and expert advisory services designed to keep you safe. We give you the confidence to address risks in real-time and amplify your enterprise risk management program. We partner with you to identify and address your specific risks and needs, providing you with next-generation solutions to manage the evolving risk landscape. Our holistic software solutions deliver a comprehensive view of your risk data, bolstering your security and minimizing business interruptions. Our team is ready to help you succeed, whether you choose to drive your own software deployment or receive expert assistance and training.
  • 25
    SecurityStudio

    SecurityStudio

    SecurityStudio

    Simplify your vendor risk management program to ease the burden on your company and its employees. Standardize the process to easily locate all third and fourth-party vendors and keep track of those that pose a risk to your company. Defend against any risk created by your vendors, and against lawyers, regulators and customers if a breach occurs. Unlike other vendor risk management tools on the market, SecurityStudio doesn’t simply communicate risk. Through an easy-to-use automated workflow, SecurityStudio evaluates all third-party vendors and brings your weakest links to the surface. Then you have the power to accept, avoid or request remediation of each vendor.
  • 26
    One Identity

    One Identity

    Quest Software

    Take the risk out of enterprise identity and access management. Mitigate risk, secure data, meet uptime requirements, and satisfy compliance by giving your users access to data and applications they need and nothing more. Now, identity and access management (IAM) can be driven by business needs, not IT capabilities. With Identity Manager, you can unify information security policies and meet governance needs, today and in the future. Finally! Identity management software that is driven by business needs, not IT capabilities. Identity Manager governs and secures your organization’s data and users, meets uptime requirements, reduces risk, and satisfies compliance by giving users access to data and applications they need - and only what they need - whether on-premises, hybrid or in the cloud. Satisfy compliance and audit requirements.
  • 27
    Fastpath

    Fastpath

    Fastpath

    Fastpath’s cloud-based access orchestration platform allows organizations to manage and automate identity, access governance, and data and configuration changes – efficiently and cost effectively. Our intuitive cloud-based platform seamlessly integrates identity governance and GRC into one sophisticated yet easy-to-use solution. Effortlessly automate, control, and monitor access - from applications down to individual data records to dramatically reduce risk and compliance costs. Fastpath’s platform was designed by auditors who understand the complexity of securing business application access. That’s why we created a solution that reduces the time, cost and complexity associated with audit processes and reporting to prove compliance.
  • 28
    OneTrust Tech Risk and Compliance
    Scale your risk and security functions so you can operate through challenges with confidence. The global threat landscape continues to evolve each day, bringing new and unexpected risks to people and organizations. The OneTrust Tech Risk and Compliance brings resiliency to your organization and supply chain in the face of continuous cyber threats, global crises, and more – so you can operate with confidence. Manage increasingly complex regulations, security frameworks, and compliance needs with a unified platform for prioritizing and managing risk. Gain regulatory intelligence and manage first- or third-party risk based on your chosen methodology. Centralize policy development with embedded business intelligence and collaboration capabilities. Automate evidence collection and manage GRC tasks across the business with ease.
  • 29
    CIMCON Software

    CIMCON Software

    CIMCON Software

    CIMCON Software minimizes operational risks inherent in end-user computing (EUC) files. Risks include regulatory reporting errors, non-compliance, cyber risk, and fraud. EUCs include documents such as spreadsheets, models, Access databases, scripted applications using VBScript, R, Python and self-service analytics tools such as Tableau and QlikView. Banks rely heavily on end-user computing applications (EUCs) such as Excel spreadsheets and scripts for day to day operations because they allow users to react quickly to changing market conditions or regulations. Whether they are used for creating financial models, finance, accounting or complying with regulatory requirements, they need to be managed effectively. CIMCON Software offers solutions that create an inventory of all EUCs in your organization, identify the most critical files, detect errors; provide a visual map of data dependencies, and provide on-going monitoring and control of your most important EUCs.
  • 30
    Incisive Analytics Essentials
    In today’s business landscape, managing spreadsheet risk and navigating the proliferation of low-code/no-code platforms and open-source tools is critical. However, while these resources offer immense business value, each instance presents potential risks such as inaccuracies, outdated data, and compatibility issues with your core production systems. If your IT team is unaware of the extent of low-code/no-code deployments and open-source software being used within your organization, it can put your business at risk. With Incisive Analytics Essentials, you gain the knowledge and power to identify, manage, and mitigate these risks. Navigate the chaos of the "unknown unknowns" and gain up-to-date knowledge about-and management of-critical analytics assets such as spreadsheets, low-code/no-code and open-source applications. Ensure accurate, consistent and secure analysis of critical spreadsheets, low-code/no-code and open-source applications.
MongoDB Logo MongoDB