Alternatives to Corax
Compare Corax alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Corax in 2026. Compare features, ratings, user reviews, pricing, and more from Corax competitors and alternatives in order to make an informed decision for your business.
-
1
D&B Risk Analytics
Dun & Bradstreet
Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions. -
2
Predict360
360factors
Predict360 is an integrated risk and compliance management software platform for financial and insurance organizations. It integrates risk and compliance processes and industry best practices content into a single platform that streamlines regulatory compliance, improves efficiency, predicts risk, and provides best-in-class business intelligence reporting. Predict360 includes the following Risk Management applications: Enterprise Risk Management (ERM), Risk Management and Assessments, Risk Insights, Issues Management, Peer Insights, Third-Party Risk Management, and Quarterly Certifications and Attestations. Compliance applications are: Compliance Management, Compliance Monitoring & Testing, Complaints Management, Regulatory Change Management, Regulatory Examination and Findings Management, Policy & Procedure Management, and more. 360factors also offers Lumify360 - a KPI and KRI predictive analytics platform that enriches data, predicts performance, and works alongside any GRC. -
3
Onspring
Onspring GRC Software
Onspring is an award-winning GRC automation and reporting software. Our SaaS platform is known for flexibility and ease of use for end-users and administrators. Simple, no-code, drag-and-drop functionality makes it easy to create new applications, workflows, and reports independently without IT or developers. - Manage a centralized risk register with multiple hierarchies - Keep tabs on financial impacts & probabilities based on risk tolerance - Capture & relate financial, operational, reputational & third-party risks - Map controls to regulations, frameworks, incidents & risks - Remediate findings through workflows or the POA&M process Ready-made products get you started in as quickly as 30 days: - Governance, Risk & Compliance Suite - Risk Management - Third-party Risk - Controls & Compliance - Audit & Assurance - Policy Lifecycles - CMMC - BC/DR FedRAMP moderate environment available.Starting Price: $20,000/year -
4
Resolver
Resolver
Resolver gathers all risk data and analyzes it in context — revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks — whether compliance or audit, incidents or threats — and translates those effects into quantifiable business metrics. Finally, risk becomes a key driver of opportunity instead of being disconnected from the business. Choose the risk intelligence software used by over 1000 of the world’s largest organizations. Resolver makes it easy to collaborate and collect data from across the enterprise, allowing teams to fully understand their risk landscape and control effectiveness. Understanding your data is one thing; being able to use it to drive vital action. Resolver automates workflows and reporting to ensure risk intelligence turns into risk reduction. Welcome to the new world of Risk Intelligence.Starting Price: $10,000/year -
5
ClusterSeven
Mitratech
With ClusterSeven Shadow IT Manager, gain control over the hidden spreadsheets and other data assets that put your enterprise at risk. Discover and manage the hidden, sensitive spreadsheets, applications, and data assets that lie outside of IT’s control – and create risk. Now you can easily and efficiently capture and maintain an inventory of the files your organization relies upon and monitor who’s making changes, helping you meet audit and compliance requirements and prevent problems before they impact your enterprise. Classify the risks associated with your newly discovered EUC files and organize them in a centralized database. Once you’ve established the spreadsheets your organization is using, you can carry out a deeper risk analysis on critical files using rules that matter to your business, such as the complexity of a formula or macro, use of sensitive terms in the file like “confidential,” inclusion of unprotected client or personal data, or the presence of hidden worksheets. -
6
SwissMetrics
SwissMetrics
SwissMetrics is a FinTech from Switzerland whose purpose is to transform the way companies monitor their counterparty risk exposure – a single platform solution for onboarding, compliance and credit risk monitoring. Developed by finance professionals, the platform is designed to promote smarter collaboration between finance and non-finance teams, in pursuit of a common goal – maximising value through risk mitigation. Being customer centric, SwissMetrics is focused on optimising user experience through practical, innovative and forward looking tools. And while enabling the effective monitoring of the financial health of your customers, suppliers and acquisitions, SwissMetrics further enriches your compliance function. -
7
Kovrr
Kovrr
Quantum is a cyber risk quantification (CRQ) platform with a set of new functionality and services that will help your business translate cyber risk into business impact. Quantum is designed to help CISOs, Chief Risk Officers and boards take control. It enables them to visualize the effectiveness of a cybersecurity program, assess the potential risk reduction for future cybersecurity investments, and form a solid risk transfer strategy. Get better coverage at a better rate on your cyber insurance policy. Use our security control ROI calculator to understand the financial benefits of improving your cybersecurity risk posture. Enhance the board and C-Suite’s decision-making process by financially quantifying cyber risk. Prioritize and justify cybersecurity investments based on business impacts and risk reduction. Assess the ROI of your cybersecurity program and stress test it based on potential risk mitigation actions, thereby supporting better resource allocation. -
8
RiskThinking.AI
RiskThinking.AI
We collect, codify, align and analyze billions of data-points. We create the derived data needed to calculate Climate-related Financial Risk and make all of our data available to subscribers via a secure API. We algorithmically generate multi-factor scenarios that are used to stress-test an assets climate-related exposure to Policy, Economic, Carbon, Physical, and Social Risks. We measure and rank exposure by magnitude and materiality for each risk variable, and generate Exposure Scores and Climate Risk RatingsTM for every asset, portfolio, corporate, sector, region, country and more. We help regulators, governments, financial institutions, asset managers and large corporations worldwide identify, evaluate and stress-test the potential financial impacts of climate change on industries, economies, portfolios and assets. -
9
DeNexus
DeNexus
CISOs, OT facility managers, cybersecurity practitioners, executive boards, and insurers need better quantification of cyber risks across their fleet of Operational Technology (OT) assets to enable efficient risk management and transfer. DeNexus delivers an evidence-based solution for OT industrial stakeholders to gain visibility into each facility’s cyber exposure, calculate the probability and financial impact of potential cyber incidents, and prioritize risk mitigation based on ROI or other KPIs. Easily visualize how each risk mitigation project reduces your exposure and improves your risk profile. Benchmark your cyber risk posture against your industry peers and across your fleet of assets. Use risk mitigation ROI analyses to make informed decisions on where to invest first. Use our outputs to guide your cybersecurity and risk management strategy, including cyber insurance. -
10
VisibleRisk
VisibleRisk
Cyber events have financial consequences. VisibleRisk helps you quantify the financial impact of your cyber risk, so you can make better risk management decisions across the business. Standardize cybersecurity conversations in the boardroom. Focus on business impact and outcomes. Completed a validated cyber risk assessment to optimize your program and better allocate resources. Enable better communication and decision making around regulatory compliance, M&A and cyber insurance underwriting and limits considerations. Quantifying cyber risk in financial terms empowers security professionals to communicate with other key stakeholders more effectively by speaking in a common language. Business leaders rarely allocate financial resources without fully understanding the expected return, or more specifically, cost avoidance. We leverage automation and tools to provide you with a comprehensive understanding of your organization’s exposure to cyber risk, with minimal effort on your end. -
11
MetricStream
MetricStream
Reduce losses and risk events with forward-looking risk visibility. Enable a modern and integrated risk management approach with real-time aggregated risk intelligence and their impact on business objectives and investments. Protect brand reputation, lower the cost of compliance, and build regulators and board’s trust. Stay on top of evolving regulatory requirements, proactively manage compliance risks, policies, cases, and controls assessments. Drive risk-aware decisions and accelerate business performance by aligning audits to strategic imperatives, business objectives and risks. Provide timely insights on risks and strengthen collaboration across various functions. Reduce exposure to third-party risks, make superior sourcing decisions. Prevent third-party risk incidents with continuous third-party risk, compliance and performance monitoring. Simplify and streamline entire third-party risk management lifecycle. -
12
CyberStrong
CyberSaint Security
CISOs of the Fortune 500 rely on CyberSaint's CyberStrong platform to achieve real-time cyber and IT risk management and continuous compliance from assessment to Boardroom. CyberStrong uses risk quantification, intuitive workflows, and executive reports to build cyber resilience through measurement and improved communication. Patented AI and ML automation eliminate manual effort, saving enterprises millions annually. The platform aligns cyber and business risk for faster, informed decision-making. Enterprises use CyberStrong as a competitive differentiator, mitigating even the most unprecedented risks while automating assessments across frameworks. CyberSaint is a Gartner Cool Vendor for Cyber & IT Risk Management, is named in Gartner's Security Operations, Cyber & IT Risk Management, and Legal & Compliance Hype Cycles, and won numerous awards including 2021 CRN Emerging Vendor, 2021 Cybersecurity Excellence Gold Winner, and 2021 Cyber Defense Magazine Global InfoSec Awards Winner -
13
STREAM Integrated Risk Manager
Acuity Risk Management
STREAM Integrated Risk Manager is an award-winning GRC platform that allows organizations to centralize, automate, quantify and report on risk. It can be used for a variety of applications including cyber / IT risk management, enterprise risk management, operational risk management, BCM and vendor risk management. STREAM has been around for over 10 years and is available as a SaaS or on-premise deployment. It has been adopted by organizations around the world, across various industries including finance, energy, healthcare, manufacturing, legal and IT. Please contact us to discuss specific requirements or visit the Acuity website for more information. -
14
ThreatConnect Risk Quantifier (RQ)
ThreatConnect
ThreatConnect RQ is a financial cyber risk quantification solution that allows users to identify and communicate the cybersecurity risks that matter most to an organization in terms of financial impact. It aims to enable users to make better strategic and tactical-level. RQ automates the generation of financial cyber risk reporting as it relates to the business, cybersecurity initiatives, and controls. -
15
TruOps
TruOps
The TruOps platform centralizes all information and connects assets to risk and compliance data, including policies, controls, vulnerabilities, issue management, exceptions, and more. TruOps is a comprehensive cyber risk management solution. Each module is designed to maximize efficiency and solve the process challenges you face today while preparing your organization for the future. Consolidate disparate information and relationships to enable intelligent and automated choices and process information through risk-based workflows. Automate and streamline oversight of vendor relationships, perform due diligence, and consistently monitor third parties with this module. Streamline and automate risk management processes. Leverage conditional questions and a scenarios engine to identify risks. Automate the identification, planning, and response processes. Easily manage plans, actions, and resources and resolve issues promptly. -
16
BitSight
Bitsight
Bitsight is the global leader in cyber risk intelligence, leveraging advanced AI to empower organizations with precise insights derived from the industry’s most extensive external cybersecurity dataset. With more than 3,500 customers and over 68,000 organizations active on its platform, Bitsight delivers real-time visibility into cyber risk and threat exposure, enabling teams to rapidly identify vulnerabilities, detect emerging threats, prioritize remediation, and mitigate risks across their extended attack surface. Bitsight proactively uncovers security gaps across infrastructure, cloud environments, digital identities, and third- and fourth-party ecosystems. From security operations and governance teams to executive boardrooms, Bitsight provides the unified intelligence backbone required to confidently manage cyber risk and address exposures before they impact performance. -
17
COBRA
C2 Cyber
Supply chains are complex, organic networks of relationships that grow extensively over time. Statistics show that two-thirds of security breaches originate from third parties. C2 Cyber’s Cobra platform immediately assesses the inherent risk of a supplier, saving time from the start. It then recommends a tier of service for each supplier that matches both the risk presented and the client’s risk appetite. -
18
NopSec
NopSec
We help cyber defenders get a handle on the fragmented processes that make cyber exposure unmanageable. NopSec's end-to-end platform brings these processes together and provides cyber defenders with a means to then discover, prioritize, remediate, simulate, and report on cyber exposures. If you don’t know what's in your environment you can’t protect it. With today's global scale of digital business transformation, complete visiblity of your IT assets is essential to adaptive cyber risk management. Nopsec shows you the business impact of your IT assets on a continuous basis helping you prevent any potential blind spots of unmanaged risk and cyber exposures. -
19
Zywave Cyber OverVue
Zywave
Quickly evaluate the cyber risk of an organization. Leverage proprietary cyber loss data to facilitate effective, data-driven decision-making. Create a holistic view of an organization’s cyber risk, combining insights from its historical loss experience. Forecast potential scenarios and how they could impact your client or prospect. Help businesses understand their cyber risk, what areas are vulnerable to attack, and what the impact could be on their organization. Identify how likely an organization is to experience a cyber event and how much the financial impact could be. Find out if a business has the appropriate cyber protection in place and pinpoint gaps in their coverage. High-level insights on how a company’s historical loss experience compares to that of its peer group to help identify areas at risk. Guidance on the appropriate amount of insurance to purchase through limit adequacy and traditional benchmarking analyses that give insights into peer purchasing behavior. -
20
@RISK
Lumivero
From the financial to the scientific, anyone who faces uncertainty in their quantitative analyses can benefit from @RISK. @RISK helps both Fortune 100 companies and private consultancies paint a realistic picture of possible scenarios. This allows businesses to not only buffer risks, but also identify and exploit opportunities for growth. @RISK (pronounced “at risk”) is an add-in to Microsoft Excel that lets you analyze risk using Monte Carlo simulation. @RISK shows you virtually all possible outcomes for any situation—and tells you how likely they are to occur. This means you can judge which risks to take on and which ones to avoid—critical insight in today’s uncertain world. -
21
Pellonium
Pellonium
Continuous cyber risk quantification, evaluation & business impact analysis based on what's actually happening in your organization. Prioritized tactics tailored to your environment & thresholds to reduce cyber risk exposure & increase security ROI. Automated compliance & controls management that leverage adaptable frameworks to significantly improve regulatory & internal oversight obligations. Shift from simply identifying what's wrong to why it actually matters & have data-driven confidence to ruthlessly protect investments & strategic goals. provides meaningful, actionable, and defensible insights to help security teams & executives answer the most urgent questions. -
22
Centraleyes
Centraleyes
Centraleyes equips organizations with an unparalleled ability to achieve and sustain cyber resilience and compliance in a single pane of glass. Our solutions quantify, mitigate and visualize cyber risks – saving time and resources so you can focus on what really matters: Business success. Organizations across industries are affected by the growing number and complexity of cyber attacks increasing year over year. Cyber risk and compliance management is critical in protecting organizations from the financial, repetitional and legal damage. Proper cyber defense can only be achieved by analyzing, quantifying, and mitigating internal risk, while ensuring compliance with relevant standards and regulations. Outdated solutions like spreadsheets and old GRC systems are inefficient and make it impossible for cyber teams to effectively protect their organizations. -
23
AXA XL
AXA XL
Any organization using technology to run its business is at risk of a cyber attack or data breach. Cyber liability insurance can provide protection for your business’ digital assets. At AXA XL, we help clients better understand and address cyber risk through proactive services, dedicated support and flexible coverages designed to protect a wide range of businesses before, during and after a cybersecurity incident. We’re a leading cyber and technology insurer and have the industry experience that makes a difference. We’ve been handling data breach incidents and underwriting cyber exposures for clients for over 20 years. Our cyber and technology insurance policy – CyberRiskConnect – can be tailored to the needs of your industry sector and comes with expanded coverage and even broader terms to protect against today’s cyber emerging risks. Retail, financial institutions, healthcare, professional services firms, manufacturers, higher education institutions, power and utility companies. -
24
Arctic Intelligence
Arctic Intelligence
Innovative financial crime risk assessments to protect your business. Risk assessments are the cornerstone of any financial crime compliance program. From money laundering, terrorism financing, bribery and corruption and sanctions, Arctic Intelligence provides an enterprise-wide risk assessment solution to assess your business' vulnerabilities in line with global regulations and FATF guidelines. Our solutions can help address many challenges by providing defendable data-driven results and quickly establishing a program tailored to the organisation. Our technology can calculate and present firm wide risk profiles, identifying and highlighting high risk areas and control gaps or weaknesses. Real-time reporting can aggregate risk outcomes for both an individual business unit and organisation-wide level providing accurate, consistent and dependable results. -
25
Birdseye
Ostrich Cyber-Risk
We offer a risk-based management approach with our Birdseye™ assess and quantify SaaS solutions, including our cyber risk quantification simulator, to optimize your security program. After identifying vulnerabilities in the assessment, prioritize each control and set personalized targets. This provides a continuously optimized roadmap for improvement. Simulates risk scenarios based on the qualitative assessment results including assigning dollar figures to your areas of risk to quantify the likelihood of both cyber and operational impact. Birdseye is more cost-effective than many traditional cyber risk assessments, offering both qualitative analysis and quantitative risk simulation in a single, self-run application. Share comprehensive yet accessible and easy-to-understand reports in financial terms with the board, stakeholders, insurers, and other third parties. See where your organization’s cyber risk program stands compared to others in your industry. -
26
SafePaaS
SafePaaS
SafePaaS offers proven solutions to industry specific Governance Risk and Compliance challenges. SafePaaS Industry Controls Solutions improve margins by mitigating risk of operational losses for all major industries including Consumer Goods, Education, Energy, Financial Services, Health Care, High Tech, Life Sciences, Manufacturing, Media & Entertainment, Public Sector, Retail and Transportation, Construction, Banking. SafePaaS optimizes all significant business process with embedded controls throughout the process to help organizations move to a proactive and predictive GRC management approach from an informal or reactive approach. SafePaaS Process Controls Solutions are available for all major business areas including: Financial Management, OrderManagement, Procure-to-Pay Management, Supply Chain Management, etc. SafePaaS is a Complete Governance, Risk and Compliance platform with integrated ERP Application Controls Management for all major ERP systems. -
27
Allgress
Allgress
Allgress strives to provide the best Risk Management solutions and your feedback can help us be better. We invite you to add your voice to the mix by creating a new or updating an existing review. Evaluate our IT Risk Management and/or IT Vendor Risk Management Tools solutions on Gartner Peer Insights. In 15 minutes or less, help your peers find the best Risk Management Solutions. -
28
TrustElements
TrustElements
TrustElements helps to mitigate risk and prioritize investments. Your cyber resiliency score is defined in a percentage after analyzing all loads of data your company owns. TrustElements maps your results to industry frameworks (NIST, CIS, MITRE) and helps to establish a golden standard of cyber resilience by continuously assessing your organization exposure to risks. The TE platform enhances decision making based on your business context and helps to better allocate financial resources. Communicate cybersecurity strategy to the C-level and Board of Directors to strengthen the decision making in Security, IT, and Risk Management. Whether your challenge is vendor risk management, tight security budgets, overcoming resource obstacles or applying the right level of protection and risk management, we have your back to make your company propel. -
29
AIG
AIG
Data and analytics to understand your cyber risk. Proactive services to address vulnerabilities. Coverage when its needed. Cyber liability insurance covers the financial costs associated with a breach, as well as first party costs including event management, data restoration, financial costs to third parties, network interruption, and cyber extortion. Covers losses in the physical world caused by a cyber event, including primary coverage for business interruption, first and third party property damage, physical injury to third parties, and products/completed operations coverage. Insureds receive detailed scoring, analysis, and benchmarking reporting that will help them better understand their cyber maturity and coverages. Basic reports are also available for applicants, even if they do not bind coverage. -
30
AML Risk Manager
Fiserv
AML Risk Manager from Fiserv is the most installed anti-money laundering software available. Built on Fiserv's award-winning Financial Crime Risk Management platform, AML Risk Manager takes a transparent, data-driven, risk-based approach to optimizing AML monitoring operations. It covers the essential areas of an AML program – KYC (Know Your Customer), Detection, Case Management and Reporting. Anti-money laundering solutions from Fiserv combine industry-leading architecture, analytics and investigation tools with deep AML and financial industry knowledge to help your organization reduce risk and advance your anti-money laundering risk management program. -
31
UpGuard
UpGuard
The new standard in third-party risk and attack surface management. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day. Continuously monitor your vendors, automate security questionnaires, and reduce third and fourth-party risk. Monitor your attack surface, prevent data breaches, discover leaked credentials, and protect customer data. Scale your third-party risk program with UpGuard analysts, and let us monitor your organization and vendors for data leaks. UpGuard builds the most powerful and flexible tools for cybersecurity. Whether you’re looking to prevent third-party data breaches, continuously monitor your vendors, or understand your attack surface, UpGuard’s meticulously designed platform, and unmatched functionality helps you protect your most sensitive data. Hundreds of the world’s most data-conscious companies are scaling faster and more securely.Starting Price: $5,249 per year -
32
RiskinMind
RiskinMind
RiskInMind is an AI-powered risk management platform tailored for modern financial institutions, automating critical functions like loan assessment, financial analysis, and regulatory compliance through intelligent agents. The system provides document generation capabilities, interprets unstructured data (e.g., insurance documents), and offers tools such as a financial analyst that synthesize financial reports, flag risk signals, and support decision-making. It monitors evolving risk exposure, applies predictive models, and surfaces actionable insights in real time to reduce manual workload for risk teams. -
33
SecurityStudio
SecurityStudio
Simplify your vendor risk management program to ease the burden on your company and its employees. Standardize the process to easily locate all third and fourth-party vendors and keep track of those that pose a risk to your company. Defend against any risk created by your vendors, and against lawyers, regulators and customers if a breach occurs. Unlike other vendor risk management tools on the market, SecurityStudio doesn’t simply communicate risk. Through an easy-to-use automated workflow, SecurityStudio evaluates all third-party vendors and brings your weakest links to the surface. Then you have the power to accept, avoid or request remediation of each vendor. -
34
BowTieServer
CGE Risk Management Solutions
BowTieServer centralizes all the bowtie, incident and audit information within an organization in a single database. BowTieServer aggregates and stores all risk information. It enables the users to get to the right level of detail to be able to perform their job well. BowTieServer takes the static bowtie diagram and moves it into a dynamic risk picture with an up-to-date overview of the health of your barriers. Important decisions can only be made if you know your current exposure to risk. BowTieServer unites different risk disciplines in a single, central repository with bowties and related information. It combines all the powerful tools we already have, like BowTieXP, IncidentXP, and AuditXP, and unifies them across the organization. It consists of several modules, which you can choose to activate according to your company needs. It solves some of the harder problems in risk management, how to get a good understanding of your risk exposure. -
35
At-Bay
At-Bay
At-Bay’s cyber insurance policies provide robust first and third-party coverage on both primary and excess lines. Our policies are enhanced with active risk monitoring services at no additional cost and supported by our in-house claims team. Quickly determine your client's financial exposure to cyber-attacks with our cyber risk calculators. Insights and learnings to empower brokers to be an expert on cyber. At-Bay offers both direct and contingent system failure coverage to the full limit of insurance by default, regardless of whether you send submissions online or through email. Direct and contingent coverage for business interruption and system failure. Social engineering & invoice manipulation coverage is available for all classes of business, Full limits are offered for cryptojacking and bricking coverage. Broad cyber extortion coverage including payment of cryptocurrencies. Reputational harm coverage including PR costs as a result of adverse publications. -
36
Make responsible, risk-aware decisions and monitor the effectiveness of your response. Get detailed insight into how risk drivers can impact your business value and reputation with a powerful enterprise risk management solution that supports risk identification, assessment, analysis, and monitoring. Define risk-relevant business activities; set up your organizational risk hierarchy; assign risk appetite, risk owners, and responsibilities; and automate risk monitoring. Identify relationships between risks and events, define survey questions, and document potential root causes and consequences of risks, as well as mitigation activities. Run quantitative and qualitative risk analysis to determine the likelihood of occurrence and the potential impact of identified risks.
-
37
Renew Risk
Renew Risk
We provide software that allows our clients to assess risk and provide optimized insurance and financing to renewable energy assets. Pioneering our services in offshore wind, Renew Risk software solutions are being rapidly applied to new asset classes in line with the technological growth of the industry. Our SaaS solution enables users to gain comprehensive insights into risk through sophisticated innovative, and patented, modeling solutions. Offshore wind is one of the most promising and fastest-growing sources of renewable energy in the world. However offshore wind assets also face exposure to extreme weather conditions and natural catastrophes. We believe the growth of renewable energy is secured through improved risk analytics and models software for developers, insurers, and financiers. -
38
Clearwater Compliance
Clearwater
With today’s increasing threat landscape and OCR enforcement activity, healthcare providers, payors, and their business associates can no longer effectively manage cyber risk or meet HIPAA compliance requirements with “one size fits all” spreadsheets. Hundreds of healthcare organizations have adopted IRM|Pro® software as their Enterprise Cyber Risk Management Software (ECRMS). Gain actionable insight into the most critical vulnerabilities, control deficiencies and the remediation. Get real-time updates on risk analysis progress, risks above threshold, control deficiencies, and risk mitigation status. Know where your organization's biggest exposures lie and where action can make the most meaningful impact. Benchmark your risk analysis and risk management performance against peers. Advanced dashboards with configurable views and reporting capability, providing visibility into a hospital system organization and enabling users to determine exposures. -
39
TrustCloud
TrustCloud Corporation
Don’t struggle with 1000s of vulnerability smoke signals from your security tools. Aggregate feeds from your cloud, on-premises, and bespoke apps, and combine them with feeds from your security tools, to continuously measure the control effectiveness and operational status of your entire IT environment. Map control assurance to business impact to assess which gaps to prioritize and remediate. Use AI and API-driven automation to accelerate and simplify first-party, third-party, and nth-party risk assessments. Automate document analysis and receive contextual, reliable information. Run frequent, programmatic risk assessments on all your internal and third-party applications to eradicate the risk of one-time or point-in-time evaluations. Take your risk register from manual spreadsheets to programmatic, predictive risk assessments. Monitor and forecast your risks in real-time, enable IT risk quantification to prove financial impact to the board, and prevent risk instead of managing it. -
40
Automate advanced security and transaction monitoring to strengthen financial controls, ensure separation of duties (SoD), stop fraud, and streamline audit workflows. Automate the analysis required to ensure all roles are audit-ready. Utilize visualizations and simulations to make the best design decisions. Use embedded sensitive access and SoD rules to ensure your roles are compliant prior to go-live. Avoid costly user acceptance testing and audit issues by designing secure ERP roles before the system goes live. Prevent tampering by continuously monitoring transactions and sensitive ERP data with built-in AI. Enable business continuity and resilience by adopting an AI-driven approach to risk management and security. Improve financial oversight by linking risk to business results. Empower employees to balance opportunities with risks. Streamline business continuity and readiness efforts.
-
41
Riskalyze
Riskalyze
When financial advisors aren't afraid to talk about risk, investors aren’t afraid to make the right decisions. Gone are the days of stereotyping investors with subjective semantics based on their age. It's time to act in the best interests of investors and prove it quantitatively. Gone are the days of stereotyping investors with subjective semantics based on their age. It's time to act in the best interests of investors and prove it quantitatively. Risk Assessments pinpoint exactly how much risk an investor wants — eliminating the stereotypes that have made risk tolerance all but useless. Use the leading scientific framework to objectively pinpoint an investor’s Risk Number®, whether you’re across the room or across the world. Portfolio analysis empowers you to assess how much risk an investor currently has.Starting Price: $250 per month -
42
Cowbell Cyber
Cowbell
Combining outside-in and inside-out continuous risk assessment, Cowbell delivers coverages tailored to identified risk exposures in minutes and empowers policyholders to improve their cyber risk posture. Coverage is specifically designed for cyber risk exposure—not entwined with other lines of coverage. Ongoing observation capabilities allow you to adjust your cyber insurance coverage as your business evolves. No hardware or software installation. Artificial intelligence techniques determine your insurable threat rating. Cowbell Factors provide decisive insight into the likelihood and severity of an insurable threat that enables you to select appropriate coverage, implement remediation guidance, and optimize premiums. Fast, automated, continuous exposure assessment puts all the pieces in place to determine the correct policy for your needs. It also means coverage and premiums can be adjusted on an ongoing basis. -
43
Direct Claim Solution
Innovative Computer Systems
Claims and Litigation management software for Captive or Risk Retention Group property and casualty claims. Direct Claim Solution is a complete system with claims, policy and vendor management for Self-Insured, Captive or Risk Pool programs. Offers industry specific tools for investigating and analyzing law as well as coverage. Modules for litigation management, subrogation and loss recovery as well as document management included. Merge feature makes for easy letter or email creation. For management, the robust report screen allows multi-conditional querying of claims by exposure type, state of loss, date ranges and policy issuance periods. Vendor isolation feature allows external service providers to access and populate fields in the system as needed to expedite reporting and collaborative analysis. See our website at www.directclaimsolution.com -
44
A1 Tracker
A1 Enterprise
A1 Tracker is presented by the vendor as a robust & configurable risk management software offering either stand-alone or fully-integrated risk management software covering many business segments across an organization. Claims & Incident Management Claims & incident reporting for claims of any type: injuries, medical, commercial, customer, insurance, work comp, asset, auto, liability. Risk Management & Threat Assessment: Risk register for tracking risks at any level in an organization, including by entity, project, asset, contract, vendor, division, business, unit, region, and more. Real-time risk reports & heat maps, dashboard metrics, alerts, & notifications. Contract Management: Contract module for tracking contracts of any type with vendors, employees, customers, and any other parties. Insurance Policies & Certificates: Policies & certificates of insurance tracking with reminders & renewals. For agencies & carriers policy management includes tracking clients.Starting Price: $800/month -
45
OneTrust Tech Risk and Compliance
OneTrust
Scale your risk and security functions so you can operate through challenges with confidence. The global threat landscape continues to evolve each day, bringing new and unexpected risks to people and organizations. The OneTrust Tech Risk and Compliance brings resiliency to your organization and supply chain in the face of continuous cyber threats, global crises, and more – so you can operate with confidence. Manage increasingly complex regulations, security frameworks, and compliance needs with a unified platform for prioritizing and managing risk. Gain regulatory intelligence and manage first- or third-party risk based on your chosen methodology. Centralize policy development with embedded business intelligence and collaboration capabilities. Automate evidence collection and manage GRC tasks across the business with ease. -
46
Tokio Marine HCC
Tokio Marine HCC
With a broad range of innovative specialty insurance products and services, we are excited to introduce you to our new business unit and our combined strengths. We know you will find our creativity and flexibility helpful in building strong relationships with your clients. And with the financial strength, history and global leadership of Tokio Marine, your customers will continue to have confidence in the innovative insurance solutions we provide. Our state-of-the-art tech & cyber solutions are specially designed to provide more than just insurance. While we cover a broad range of cyber and privacy exposures, our innovative risk management services like CyberNet® and our expert cyber claims team provide excellent resources to help businesses stay ahead of ever-changing cyber risks. -
47
SRA Watchtower
SRA
SRA Watchtower is a general ledger for every critical risk activity. It is the single source of truth for all risk and performance factors, providing you with a peerless record of where you've been. SRA Watchtower and its veteran banking practitioners provide a continuous stream of data and insights so you can see and solve risks before they become unsolvable. With SRA Watchtower, bankers, credit union leaders and insurance executives now have the most current, relevant and accurate information so they can make swift and informed policy decisions to help secure the future prosperity of their organizations. SRA technology and methodology was designed and built by former leaders from all aspects of consumer and commercial banking, financial services and credit unions. -
48
Global Risk Exchange
ProcessUnity
Protect your third-party digital ecosystem with a data-driven approach that provides complete portfolio visibility and predictive capabilities. Global Risk Exchange (formerly CyberGRX) delivers rich, dynamic assessments of third-party vendors at speed and scale so you can manage your evolving third-party ecosystem with a collaborative, crowd-sourced Exchange featuring a repository of validated and predictive assessment data. Using sophisticated data analytics, real-world attack scenarios, and real-time threat intelligence, we provide a complete portfolio analysis of your third-party ecosystem, helping you to prioritize your risks and make smarter decisions. Identify trends and create benchmarks by leveraging structured data and actionable intelligence. -
49
Alfahive
Alfahive
Alfahive makes understanding cyber risk more meaningful. Our cyber risk automation platform enables the automation of assessment, quantification, and prioritization of cyber risks. Avoid the resource waste on the low-impact cyber risks. Challenge the status quo and bridge the gap between security and risk operations. Our cyber risk automation platform seamlessly integrates with enterprise security tools through APIs. It intelligently translates security controls into the likelihood of cyber risks. Our platform is trained on a large set of cyber loss events data and industry-specific risk scenarios. It enables you to effortlessly assess the impact of cyber risks on your business, compare with your peers, and make informed risk decisions. Our platform automates risk prioritization by simulating the controls against cyber threats. With built-in reporting and dashboarding capabilities, the need for manual reporting is significantly reduced, enabling strategic engagement with regulators. -
50
Pirani
Pirani
Software that allows to prevent, establish controls and measure the risks associated to money laundering and terrorism financing that the companies can be exposed to. Pirani AML Suite allows it to segment clients based on similar transactional behaviors and monitor operations that may be suspicious, also, to detect actions that may be related to fraud or money laundering in time by monitoring the financial operation realized in any transactional channel. Establish controls and measure the risks associated to money laundering and terrorism financing that your company can be exposed to. Learn how we help you by requesting a tour of our solution. Compliance of regulations and external circulars related to the implementation of a LAFT risk system. Diagnosis of the data that the client has in order to calculate the integrity of the data. Information of the client in a single screen for the analysis of the alerts.Starting Price: $19,000 per year