Alternatives to Cuick Trac
Compare Cuick Trac alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Cuick Trac in 2026. Compare features, ratings, user reviews, pricing, and more from Cuick Trac competitors and alternatives in order to make an informed decision for your business.
-
1
StandardFusion
StandardFusion
A GRC solution for technology-focused SMB and Enterprise Information Security teams. StandardFusion eliminates spreadsheet pain by using a single system of record. Identify, assess, treat, track and report on risks with confidence. Turn audit-based activities into a standardized process. Conduct audits with certainty and direct access to evidence. Manage compliance to multiple standards; ISO, SOC, NIST, HIPAA, GDPR, PCI-DSS, FedRAMP and more. Manage vendor and 3rd party risk, and security questionnaires easily in one place. StandardFusion is a Cloud-Based SaaS or on-premise GRC platform designed to make InfoSec compliance simple, approachable and scalable. Connect what your organization does, with what your organization needs to do.Starting Price: $1800 per month -
2
FileCloud
FileCloud
FileCloud is a hyper-secure EFSS (enterprise file sync and share) platform that provides industry leading compliance, data governance, data leak protection, data retention and digital rights management capabilities. Workflow automation and granular control of content sharing across most enterprise platforms are fully integrated into the complete EFSS stack. FileCloud is a leader in content governance and collaboration for unstructured data, trusted and used worldwide across Global 1000 enterprises, educational institutions, government organizations, and service providers. Granular control of content sharing is fully integrated into the stack through comprehensive audit logs and access permissions, and the Compliance Center helps with regulations like GDPR, HIPAA, and NIST 800-171 (among others). FileCloud also provides Zero Trust File Sharing® an industry first innovation that allows users to share sensitive data via an encrypted zip file that cannot be accessed by unauthorized userStarting Price: $6.00/month/user -
3
Etactics CMMC Compliance Suite
Etactics
Preparing for the Cybersecurity Maturity Model Certification (CMMC) assessment is a considerable investment from both time and money perspectives. Organizations handling Controlled Unclassified Information (CUI) within the defense industrial base should expect to have an authorized CMMC 3rd Party Assessment Organization (C3PAO) certify their implementation of NIST SP 800-171 security requirements. Assessors will evaluate how the contractor implements each of the 320 objectives across all applicable assets within the scope, including people, facilities, and technologies. The assessment process is expected to involve a review of artifacts, interviews of key personnel, and tests of the technical, administrative, and physical controls. As organizations prepare their body of evidence, they should establish a relationship between the artifacts, the security requirement objectives, and assets within scope. -
4
Cybrance
Cybrance
Protect your company with Cybrance's Risk Management platform. Seamlessly oversee your cyber security and regulatory compliance programs, manage risk, and track controls. Collaborate with stakeholders in real-time and get the job done quickly and efficiently. With Cybrance, you can effortlessly create custom risk assessments in compliance with global frameworks such as NIST CSF, 800-171, ISO 27001/2, HIPAA, CIS v.8, CMMC, CAN-CIOSC 104, ISAME Cyber Essentials, and more. Say goodbye to tedious spreadsheets. Cybrance provides surveys for effortless collaboration, evidence storage and policy management. Stay on top of your assessment requirements and generate structured Plans of Action and Milestones to track your progress. Don't risk cyber attacks or non-compliance. Choose Cybrance for simple, effective, and secure Risk Management.Starting Price: $199/month -
5
CyberCompass
CyberCompass
We build Information Security, Privacy, and Compliance Programs to improve your cyber resilience – saving you and your organization time and money. CyberCompass is a cyber risk management consulting and software firm. We navigate organizations through the complexity of cybersecurity and compliance at half the cost of full-time employees. We design, create, implement, and maintain information security and compliance programs. We provide consulting services and a cloud-based GRC workflow automation platform to save our clients over 65% of the time to become and remain cybersecure and compliant. We provide expertise and support for the following standards and regulations – CCPA/ CPRA, CIS-18, CMMC 2.0, CPA, CTDPA, FTC Safeguards Rule, GDPR, GLBA, HIPAA, ISO-27001, NIST SP 800-171, NY DFS Reg 500, Singapore PDPA, SOC 2, TCPA, TPN, UCPA, VCDPA. We also provide third-party risk management within the CyberCompass platform.Starting Price: $5000/year -
6
Cub Cyber
Cub Cyber
Our applications support DoD contractors of all sizes, from small family businesses to large enterprises with thousands of employees. Our company has helped businesses around the country perform NIST SP 800-171 assessments, identify compliance gaps, create system security plans, and create plans of action and milestones. We develop innovative solutions to solve NIST SP 800-171 related challenges. Use Quantum Assessor to generate new revenue opportunities for your business. In the past few months alone we have transformed dozens of businesses and enabled them to generate thousands in additional revenue. Quantum Assessor provides you with automation, project management, and workflow capabilities allowing you to efficiently provide consulting services, increasing company profits. Join the dozens of clients that have been able to multiply the capability and workload of their consultants! -
7
MailRoute
MailRoute
Stop Ransomware, spam and phishing, other viruses and threats for SMB, Enterprise, Healthcare, and Government agencies and contractors. API-level integration for Microsoft Office 365 & GCC High, Google Workplace, other email hosts and all servers. MailRoute stops email-instigated attacks on your information and hardware, with cost-effective, multi-layered protection. We offer CMMC, NIST 800-171, HIPAA, DFARS compliant and DISA accepted email security services. No single point of failure. Wholly owned solution includes geo-distributed datacenters with redundant network feeds, power sources and cooling, for 99.999% uptime. MailRoute prevents forgeries and email spoofing by identifying malicious messages with email authentication tools through assisted and managed DNS changes. Continually managed and updated email-network security stops cybercrime and threats like downtime, ensuring cost-predictability and reliability.Starting Price: $2 per user per month -
8
1TEN
1TEN, Inc
1TEN is a CMMC Level 2 compliance platform purpose-built for small and mid-size Defense Industrial Base contractors. Unlike cloud-based competitors, 1TEN runs entirely on-premises, air-gapped, with zero cloud dependencies, ensuring Controlled Unclassified Information never leaves your facility. The platform covers all 110 NIST SP 800-171 requirements across 14 domains through 23 integrated modules, including an Assessment Wizard, Evidence Manager, POA&M Tracker, SSP Builder, Policy Generator, Asset Inventory, and Incident Response tools. It calculates your live SPRS score as you document controls, generates C3PAO-ready System Security Plans automatically from your actual configuration data, and produces all 14 required domain policies from your answers, eliminating weeks of manual documentation work.Starting Price: $12,500 -
9
SafeLogic
SafeLogic
Do you need FIPS 140 validation or FIPS 140 certification for your technology to enter new government markets? Get a NIST certificate in just two months and make sure it remains active over time with SafeLogic's FIPS 140 simplified solutions. Whether you need FIPS 140, Common Criteria, FedRAMP, StateRAMP, CMMC 2.0, or DoD APL, SafeLogic helps you maximize your public sector business. Companies selling technology that performs encryption to the federal government must obtain NIST certification per its FIPS 140 regulation that confirms their cryptography has been tested and approved for use by government agencies. FIPS 140 validation has been so successful, that it has been adopted as mandatory by several additional security regulations including FedRAMP, StateRAMP, CMMC v2, Common Criteria, and DoD APL. -
10
TechIDManager
Ruffian Software
Are you implementing MFA everywhere but sharing admin accounts among your techs? If you are, you have not implemented MFA with fidelity. All modern security frameworks are clear that 1:1 is what account access should look like. Most MSPs have some sort of solution in place that ultimately puts the tech to client access outside of those parameters. TechIDManager creates and manages the accounts and credentials of your techs across all of your domains and networks - in a fashion that is more efficient, more secure, and more cost effective than any other platform on the market. Features Helps you become security framework compliant (NIST, CMMC, CIS, HIPAA, PCI.) Eliminates the need to share admin accounts (meeting modern security framework requirements like NIST 800-171 3.3.2 and many others) Automatic creation and disabling of accounts; right and permissions management Downtime tolerant Inject your unique credentials into client access points with minimal effortStarting Price: $200/month/100 licenses -
11
RealCISO
RealCISO
Take the hassle out of managing cyber risk and compliance. Assess, report and remediate your security gaps in days, not months, so you can focus your time and money on core business initiatives. RealCISO assessments are based on common compliance frameworks including SOC2, NIST Cybersecurity Framework (CSF), NIST 800-171, HIPAA Security Rule, & the Critical Security Controls. You’ll answer straightforward questions about the people, processes and technologies in your organization, and get actionable instruction on current vulnerabilities, along with recommendations on tools that can resolve them. Every organization wants a stronger security posture, but rarely is it clear how to do so. Technology is rapidly changing. Best practices are evolving. Industry standards are shifting. Without a trusted guide, reducing cyber risk while maintaining compliance can be a constant uphill battle.Starting Price: $49.99 per month -
12
securityprogram.io
Jemurai
Excellent security for small companies. Easily build a standard and audit-ready cybersecurity program. We want to make excellent security accessible to smaller organizations, and help them build legitimate security programs so they can win deals. Perfect for startups, you're already sprinting. Leverage a tool and a team that can keep pace with you. Document templates and built-in training allow you to make pragmatic improvements that improve security and demonstrate alignment to standards that customers trust. Your security program begins with reviewing and adopting security policies. We built the simplest possible policies that adhere to NIST 800-53 standards. We mapped the standards so that you'll know you're covered. We cross-reference our program activities to other standards including SOC 2, ISO 27001, NIST CSF, CIS 20, and CMMC to make sure you get credit for the work you do with customers and your management team.Starting Price: $99 one-time payment -
13
ComplyUp
ComplyUp
Easy enough for the self-reliant small business, and powerful enough for the compliance professional. NIST 800-171 contains 110 requirements. Assess your organization to determine where you stand. This is often referred to as a gap analysis or a readiness assessment. Create your system security plan (a formal document describing how you satisfy the 110 requirements) and POA&Ms (remediation plans for the requirements you don't satisfy). Address the requirements you don't satisfy by changing configurations, deploying solutions, or updating your company policies. Keep an eye on your organization, and update your documentation periodically to accurately reflect your security posture. We take security as seriously as you do. Your assessment data is auto-encrypted, keystroke-by-keystroke, with a unique encryption key you generate before it's sent to our servers. ComplyUp can help get you compliant while you still run your business as usual.Starting Price: $1,800 per year -
14
UC ControlSight
Unified Compliance
UC ControlSight is a web-based compliance intelligence and control-management platform built on the Unified Compliance Framework’s Intelligent Common Controls that helps organizations simplify and accelerate compliance by providing an intuitive interface to explore and understand how regulatory mandates relate to harmonized controls, access curated Intelligent Insight Packs tailored to industries and technologies (e.g., NIST 800-53, ISO 27001/27002, SOC 2, CMMC), and visualize overlapping requirements across frameworks with dynamic mapping that highlights how single controls satisfy multiple mandates. It offers streamlined research and navigation of authority documents alongside a powerful compliance dictionary, customizable views to focus on controls that matter most, and reporting and analytics tools to track posture, gaps, and progress. -
15
CMMC+
CMMC+
The only compliance platform you will ever need to become and stay CMMC compliant. Our modern and easy-to-use platform solves cybersecurity and compliance challenges facing the DIB (Defense Industrial Base) supply chain through education and collaboration. Use our intuitive tool to rapidly assess your cybersecurity posture and how to mature your program. Collaborate with trusted practitioners to create a holistic approach, nesting security into existing business practices. Save time and money by accelerating your cybersecurity compliance with our transparent dashboard approach. Track and manage all of the relevant hardware and systems that fall within your CMMC boundaries. Continuously monitor your CMMC program and collect evidence for assessments and audits. Get easy-to-read reporting that not only provides ongoing status awareness, but directs your compliance activities efficiently, saving time, money, and effort. -
16
Accellion
Accellion
The Accellion secure content communication platform prevents data breaches and compliance violations from third party cyber risk. CIOs and CISOs rely on the Accellion platform for complete visibility, compliance and control over the communication of IP, PII, PHI, and other sensitive content across all third-party communication channels, including email, file sharing, mobile, enterprise apps, web portals, SFTP, and automated inter-business workflows. When users click the Accellion button, they know it’s the safe, secure way to share sensitive information with the outside world. With on-premise, private cloud, hybrid and FedRAMP deployment options, the Accellion platform provides the security and governance CISOs need to protect their organizations, mitigate risk, and adhere to rigorous compliance regulations such as NIST 800-171, HIPAA, SOX, GDPR, GLBA, FISMA, and others. Accellion solutions have protected more than 25 million end users at more than 3,000 companies.Starting Price: $15.00/month/user -
17
PlexTrac
PlexTrac
PlexTrac is the #1 AI-powered platform for pentest reporting and threat exposure management, helping cybersecurity teams efficiently address the most critical threats and vulnerabilities. By consolidating data, automating reporting, prioritizing risks, and streamlining remediation workflows, PlexTrac reduces organization’s overall threat exposure. We designed the PlexTrac platform to address the workflow pain points security practitioners face. PlexTrac helps them track signal through the noise and break down communication silos. Combining “plexus” and “track,” our name really says it all. PlexTrac exists to network and coordinate all people and parts of a security program and to better track progress toward maturity. -
18
DatAnswers
Varonis
Easily respond to data subject access requests by surfacing personal information across cloud and on-prem files with fast and powerful search. Find any file with personal data in seconds with Varonis’ purpose-built search engine. We instantly surface and collect the information you need for DSARs, right to be forgotten, or e-discovery—all with super lean infrastructure. Our DSAR form uses sophisticated logic on the backend to ensure you get high-fidelity results, so you can avoid false positives (and fines). Keep a pulse on how much data you’ve indexed and any failed documents so that you always know the scope of your searches. Sensitive data creation doesn’t stop and privacy regulations are ever-evolving. Privacy automation can help you stay ahead. Easily see where you have overexposed PII with dynamic dashboards that highlight privacy issues. Reduce the risk of breaches and fines by monitoring for unauthorized access to sensitive information and restricting access to least privilege. -
19
Capture2Proposal
Capture2
Capture2Proposal is the leading GovCon business development, sales intelligence and capture lifecycle management platform. Identify and target opportunities as early as 36 months before the solicitation date giving you the runway needed to shape the deal. C2P’s machine-learning model analyzes your pipeline and feedback to suggest relevant federal procurement opportunities to consider. Easily create custom data fields to align C2P to your business development and capture processes and pipeline reporting needs. Contacts library and activity tracking ensures your winning process is repeatable and lessons learned are readily available. Integrated proposal scheduling, task and document management simplify data calls and streamline proposal planning and development. Invite, assign roles, and manage your proposal teams’ access to C2P’s DFARS/NIST SP 800-171 compliant proposal repository with ease. -
20
OpenText Data Privacy & Protection Foundation (Voltage) provides organizations with quantum-ready, format-preserving security that protects sensitive data without disrupting workflows or analytics. It helps companies meet evolving regulatory requirements by securing information at rest, in motion, and in use across hybrid and cloud environments. With NIST-standardized Format-Preserving Encryption and stateless key management, the platform delivers high-performance protection at enterprise scale. Its persistent data security approach ensures that sensitive information remains safeguarded throughout its lifecycle, even as it moves across systems and analytics platforms. Trusted globally across more than 50 countries, the solution is relied on by major financial, healthcare,& retail organizations to secure billions of daily data events. By combining proven cryptography with flexible integrations, OpenText enables organizations to reduce breach risk while maintaining operational agility.
-
21
Unitrends Compliance Manager
Unitrends
Unitrends Compliance Manager initially scans the network and then asks questions to quickly determine if compliance requirements are being met. Recommendations are prioritized and documented on how to address identified issues. Unitrends Compliance Manager then produces all mandatory reports required to pass an audit. There are many products on the market that provide you with a laundry list of tasks you must perform, and information to gather, process, analyze, and validate to be compliant. But Unitrends Compliance Manager takes the process to the next level by automating the collection of much of the data, analyzing it for you, and providing you with dynamic worksheets that are customized based on the results of the collected data. -
22
MyCyber360
Fortify1
Fortify1 is CMMC compliance simplified. Customers using our platform easily demonstrate how requirements are achieved. Our structured and automated approach to managing CMMC practices and processes reduces risk and minimizes the cost of compliance. Sole reliance on front-line defenses does not demonstrate holistic cyber security risk management. Holistic cyber security risk management is an emerging requirement accomplished through organizational alignment, insight and awareness. Failure to meet this emerging requirement may result in increased exposure to litigation or non-compliance with regulatory standards. Apply diligence and compliance utilizing MyCyber360 CSRM’s simple approach to holistically managing activity related to cyber security initiatives, governance, incident response, assessments and security controls. -
23
The EY Trusted AI Platform provides insights to organizations on the sources and drivers of risk and guides an AI design team in quantifying AI risks. The EY Trusted AI Platform uses interactive, web-based schematic and assessment tools to build the risk profile of an AI system. It then uses an advanced analytical model to convert the user responses to a composite score comprising technical risk, stakeholder impact, and control effectiveness of an AI system. To help determine technical risk, the platform evaluates the technical design of an AI system, measuring risk drivers that include its underlying technologies, technical operating environment, and level of autonomy. To help determine stakeholder risk, the platform considers the goals and objectives of the AI system. It also considers the financial, emotional, and physical impact on the external and internal users, as well as the reputational, regulatory, and legal risks.
-
24
Pole Star PurpleTRAC
Pole Star
The sanctions landscape, inherently guided by the state of global affairs, has never been more complex and rapidly evolving. With regulators now focusing on the entire maritime trade supply chain, ensuring that proper due diligence and risk management processes are in place has never been more important. Regulatory risk can be associated with all aspects of a trade transaction: the goods being traded, the origin of the goods, the buyers and sellers, the cities and ports along the shipping route, and the shipping vessels themselves. Designed with and for companies with regulatory exposures in maritime trade and shipping, PurpleTRAC enables the automation, streamlining, and recording of your regulatory processes and mitigates the risk of money laundering and terrorist financing, alongside the criminal, reputational, and commercial damage that would occur as a result of noncompliance. -
25
Teleskope
Teleskope
Teleskope is a modern data protection platform designed to automate data security, privacy, and compliance at enterprise scale. It continuously discovers and catalogs data across cloud, SaaS, structured, and unstructured sources, classifying over 150 entity types such as PII, PHI, PCI, and secrets with high precision and high throughput. Once sensitive data is identified, Teleskope enables automated remediation, such as redaction, masking, encryption, deletion, and access correction, while integrating into developer workflows via its API-first model and supporting deployment as SaaS, managed, or self-hosted. The platform also builds prevention capabilities, embedding into SDLC pipelines to stop sensitive data from entering production systems, support safe AI adoption (without using unchecked sensitive data), handle data subject rights requests (DSARs), and map findings to regulatory standards (GDPR, CPRA, PCI-DSS, ISO, NIST, CIS). -
26
HoundDog.ai
HoundDog.ai
AI-powered code scanner designed to implement a proactive, shift-left strategy for sensitive data protection and privacy compliance. Product development outpaces privacy teams, leading to a constant need to update outdated data maps, which consumes much of their workload. Use HoundDog.ai’s AI-powered code scanner to continuously detect vulnerabilities (currently overlooked by SAST scanners) where sensitive data is exposed in plaintext through mediums such as logs, files, tokens, cookies, or third-party systems. Get essential context and remediation strategies, such as omitting sensitive data, applying masking or obfuscation, or using UUIDs instead of PII. Receive alerts when new data elements are introduced, based on their sensitivity levels, and prevent out-of-scope product changes from going live to avoid privacy incidents. Eliminate the manual and highly error-prone processes typically associated with security tasks.Starting Price: $200 per month -
27
Passbase
Passbase
Forward-thinking brands use Passbase to securely verify their customers’ identities through ID documents, selfies, and government databases. Authenticate 6,000+ government issued identity documents from over 190 countries in a matter of seconds on web and mobile. Match IDs to faces with top-ranked NIST face comparison technology and prevent spoofing attacks with industry leading liveness detection. Raise the assurance level of user onboarding and prevent spoofing attacks by making sure they are physically present during each completed verification. Our liveness detection technology prevents sophisticated spoofing attempts by identifying and sorting recaptured versions of a person from a live and genuine session. Our liveness detection technology prevents sophisticated spoofing attempts by identifying and sorting recaptured versions of a person from a live and genuine session.Starting Price: $1.29 per verification -
28
ResponseHub
ResponseHub
ResponseHub is a cloud-based, AI-powered platform designed to help B2B companies efficiently complete and manage security questionnaires. Customers upload their existing security documentation, such as policies, procedures, architectural diagrams, and certifications—into a centralized knowledge base. ResponseHub ingests, indexes, and structures this material using a combination of document parsing, semantic search, and AI models. The platform can also include pre-defined security control frameworks (e.g. NIST-aligned controls) to provide consistent coverage where customer documentation is incomplete.Starting Price: $50 per month -
29
LightBeam.ai
LightBeam.ai
Discover within minutes if sensitive information lurks in places you never expected (screenshots, logs, tickets, messages, tables). With one click, LightBeam can easily generate executive or delta reports to gain valuable insights into your sensitive data. Automate DSRs leveraging LightBeam's unique PII/PHI graphs comprehensively created from your data infrastructure. Build trust with your users by empowering them to exercise control over their data collection. Continuously monitor how sensitive data is collected, used, shared, and maintained with appropriate safeguards within your organization. -
30
TutorTrac
Redrock Software
TutorTrac is the complete management solution developed for the specific needs of learning, writing, tutoring, academic skills and other centers that support students in higher education. As a web-based application, TutorTrac provides on-demand access to essential tools, such as appointment scheduling, logging visits and activity reports. Record contact with students in any physical location or online environment. Find and schedule appointments with tutors based on specific subjects. Track the activity of specific populations of students, such as athletes or first-year students, to identify usage and support needs. Enter attendance for required sessions or workshops. Link activity to course enrollments and faculty. Supply powerful instruments to staff and deliver more services to students, yet simplify the management of your centers with TutorTrac. -
31
Orchid Security
Orchid Security
Orchid Security utilizes a passive listening service to continuously discover self-hosted applications (those that you manage/maintain) and SaaS applications (developed and maintained by others), providing you with a comprehensive inventory of your enterprise applications, along with their key identity characteristics (e.g. MFA enforcement, rogue or orphaned accounts, RBAC privilege data). Orchid Security leverages advanced AI analytics to automatically assess the identity technologies, protocols, and native authentication/ authorization flows for each application. Identity controls are compared against privacy regulations, cyber security frameworks, and identity best practices (e.g. PCI DSS, HIPAA, SOX, GDPR, CMMC, NIST CSF, ISO 27001, SOC2) to detect potential exposure in cyber security posture and compliance coverage. Orchid Security goes beyond providing visibility into weaknesses, to enable organizations with quick and effective remediation of those weaknesses without recoding. -
32
AirCISO
Airiam
AirCISO is Airiam’s extended detection and response (XDR) software that gives CISOs, IT Managers, CIOs, and other leaders the insights they need to improve their organization’s cybersecurity. Understand the threats in your environment and relate them to the MITRE ATT&CK® framework. Keep software patched by knowing what vulnerabilities exist within your system using common vulnerabilities and exposures (CVE) data. Satisfy elements of compliance and regulatory frameworks like the PCI DSS, CMMC, NIST SP 800-53, and HIPAA. AirCISO provides a unified view across your entire IT landscape. Users can get visibility into endpoints, email, servers, Cloud, network, third-party, and IoT systems. The information simplifies the ability to detect and isolate threats. AirCISO services as the single source of truth for your teams and tools. Take a strategic view of your cybersecurity with dashboards and metrics that show your business risk, maturity over time, and ROI.Starting Price: $0 -
33
FileTrac Evolve
Evolution Global
FileTrac has a long-standing legacy of being the #1 claims management system in the industry. Building on this reputation, it has now evolved into FileTrac Evolve. This enhanced version is a crucial component of the Evolve Suite, a comprehensive platform designed to revolutionize your claims management process. FileTrac Evolve is a leading web-based claims management system for independent adjusters, third-party administrators (TPAs), managing general agents (MGAs), and insurance companies of all sizes. Comes with a built-in diary system with reminders and provides integrations with Quickbooks, Outlook, Xactanalysis, Symbility, LEDES, NFIP/NFS, and Google Maps, FileTrac Evolve helps businesses manage their adjusters while ensuring accountability to their customers. Other key features include time and expense tracking, invoicing, adjuster timesheets, image and video uploads, accounting reports, quick notes, and more. -
34
Isora GRC
SaltyCloud, PBC
Streamline your IT Risk Assessments with Isora GRC. Leverage a lightweight, yet powerful surveying solution for conducting IT Risk Assessments. Launch self-assessment questionnaires for departments, people, facilities, devices, and applications. Leverage our library of preloaded questionnaires like NIST, HIPAA, GLBA, and more. Build or upload your custom questionnaires. Change question weights, allow partial credit, gate conditional questions, and add other question logic to simplify your questionnaires. Automatically rollup and score collected quantitative and qualitative survey data. Gain access to dynamic risk reports. Use the risk map to identify the highest-risk units or the trend graph to track risk scores year-over-year. Easily export the raw data to data analytics tools like Microsoft PowerBI using the RESTful API. -
35
TracRat
On-Line Equipment Management
TracRat® is the tool that makes our equipment management solutions possible and effective. It will become your centralized equipment information center, allowing you to find answers to tough questions like. With TracRat the answers to all of these questions are only a click away. The information provided by this system will empower you to make smart, data-driven choices about your repairable assets or equipment. -
36
learnTrac
Your Safety Partners
learnTrac revolutionized workplace learning management by being one of the first systems to structure learning around job roles so each program contains job specific courses, as determined by a training needs analysis. Our range of compliance-based courses have been developed by our team of experts. Each course is fully interactive and includes topic quizzes and a course assessment to aid the learning process. We develop engaging and interactive courses tailored to suit the specific needs of your workplace. If you require an online course specifically for your organization, then look no further. Launch, record and report on training in a click. Develop engaging e-learning courses for your organization. Put all your training records in one place. Access the best safety courses from our library. Comply with safety laws and reduce workplace injuries. Improve your staff’s skills and performance. -
37
Datamaran
Datamaran
Datamaran’s AI platform empowers business leaders to navigate the complex ESG landscape with confidence by transforming vast amounts of information into actionable insights. Datamaran is the leader in Smart ESG, enabling companies to identify and prioritize issues material to their operations, deepen their teams’ ESG knowledge, monitor risks and opportunities in real-time and authentically own their ESG strategy in-house. Supported by Datamaran, C-Suite from the world’s most trusted brands are confidently making data-driven decisions and taking their company’s ESG from one-off compliance-focused exercises to governance-centric initiatives that drive business value. -
38
SafetySoft
SafetySoft
Combine the best in safety training with record keeping and incident investigation tracking. Atlantic Training and WAVE present a sophisticated way to train employees and monitor your workplace. Want a Safety/HR training library chock-full of subjects you need for workplace compliance? We have exactly what you’re looking for! Our extensive choice of safety topics spans across all industries and helps companies stay up-to-date with the latest OSHA standards. You can even license all of our content for use inside your LMS of choice. High-resolution video, detailed procedure coverage, and updated content will keep your training routine fresh. Have site-specific training that's crucial for your employees to take? Upload your company training courses into our system or build your own courses with our Course Builder feature. Sure, we can cover you for general compliance but sometimes it's important to cover procedures that are specific to your organization. -
39
Clearity
Clearity
Clearity.io is a security compliance management application that provides covered entities, business associates, and their partners the ability to measure their security program by conducting self-assessments, managing corrective action plans, and working towards industry-driven compliance while viewing real-time data on our dashboard. Does your risk and compliance intelligence come from pages and pages of paper-based reports? How much time do you spend manually creating or combing through spreadsheets and PDFs from 3rd party vendors? If this is your organization, it’s time to automate that process. Clearity gives you the ability to feel in control of your security risks and to know what work needs to be completed. As you head down that road, visually see your risks diminish over time. Create your own HIPAA, HIPAA (Vendors), CSC, NIST CSF, or NIST 800-53 Security Assessments. Work on them on your own time.Starting Price: $199 per month -
40
Strac
Strac
Strac is a 1-stop shop for all things PII (Personally Identifiable Information). Strac is a Data Loss Prevention software that protects businesses from security and compliance risks by a) automatically detecting and redacting sensitive data across all communication channels like email, slack, zendesk, google drive, one drive, intercom, etc. and b) protecting sensitive data on front end apps and backend servers such that sensitive data never touches servers. Integrate with your SaaS apps in minutes, eliminate data leaks and be compliant with PCI, SOC 2, HIPAA, GDPR, CCPA. Strac's accurate machine learning models, real time notifications, unique redaction experience saves employees time and very productive. -
41
SISA RA
SISA Information Security
Soaring cyber-attacks emphasize the need for organizations to look forward and see what is coming ahead. A formal Risk Assessment helps entities to disclose vulnerabilities and build a robust security architecture. While assessing risks is highly recommended for organizations to gain insights into the evolving cyber threats, automated risk assessment tools simplify the job for businesses. With the right Risk Assessment tool, organizations can save 70 – 80% of efforts to conduct risk-related activities and concentrate on critical tasks. SISA being a PCI Risk and Compliance expert for more than a decade, identified the challenges faced by organizations in anticipating risks and built SISA Risk Assessor, an intuitive Risk Assessment solution. SISA’s Risk Assessor is the first PCI Risk Assessment tool in the market, built based on world-renowned security methodologies, including NIST, OCTAVE, ISO 27001, and PCI DSS risk assessment guidelines. -
42
TheraBill
TheraBill
Therabill is a cloud-based practice management software for nutritional, mental and behavioral health specialists. Therabill combines therapy billing, scheduling, and documentation in one simple solution, allowing users to submit claims, manage schedules, enter treatment notes, and maintain patient information with ease. Therabill also offers a chock-full of helpful features including exportable client statements and invoices, automated appointments and reminders, and provider portals. -
43
Coro
Coro Cybersecurity
Coro puts an end to the security tool sprawl and to the constant worry that things have been overlooked. No need to check everything 10 times a day. Coro will take care of the ongoing security, and will alert you only when you need to take action. Coro analyses the threats to your entire business, takes action to eliminate the risk, and guides you on what to do next to improve your security posture. Coro is the central control point for sensitive data, practice data, and user activity, enabling you to enforce a wide range of security, compliance and governance policies. We scan every email for phishing, malware, ransomware and automatically eliminate threats. We automatically identify and block insider threats, accounts hacking, and malicious activities. We scan every file and email, or any data share for PII/PCI/PHI, and prevent confidential information leakage.Starting Price: $8.99 per user per month -
44
PaleBlue
PaleBlue
Create immersive training courses in minutes, building on top of rich and powerful templates. Turn your employee training programs into engaging virtual experiences that last – on screen devices or in Virtual Reality. Reduce training costs by introducing immersive training. Improve efficiency of your operations saving up to 40% project budget. Go through operations and procedures before they take place in reality. The more you exercise, the more prepared you are for the unexpected. Immersive training is fun and easy to follow. Gamification makes it much more engaging than an eLearning course. Go through operations and procedures before they take place in reality. The more you exercise, the more prepared you are for the unexpected. -
45
ActiveNav
ActiveNav
Identify sensitive data, optimize storage, and comply with privacy regulations. Take control of your sensitive data using a hybrid-cloud platform that allows you to quickly discover and map data across diverse data repositories. ActiveNav’s Inventory provides the insights you need to support all your data initiatives. By isolating and visually depicting data at scale, you can manage risky, stale data and make informed content decisions. Our platform tackles the hardest challenges behind discovering and mapping unstructured data, enabling you to gain value from your data like never before. Personal, sensitive data is hiding everywhere in your organization: on-premises, in the cloud, on file shares and servers, and throughout numerous other repositories. The platform is uniquely built to handle the challenges of mapping unstructured data repositories, enabling risk mitigation and compliance with evolving privacy laws and regulations. -
46
Tag Inspector
Tag Inspector
Tag Inspector is a tag auditing and governance platform that gives organizations deep visibility into all tags, pixels, and cookies loading across their websites so they can verify data collection practices, optimize tag architecture, and manage privacy risk. It maintains a comprehensive library of thousands of unique tags and provides features such as compliance risk assessment to identify high-risk platforms and benchmark privacy posture, unauthorized personally identifiable information (PII) detection to flag leaked emails, addresses, and other sensitive data, and consent policy monitoring that simulates user consent conditions to detect violations of defined consent rules. It also supports industry-leading server-side tag monitoring, including tags loading via server-side tag management systems, so teams can verify that only approved data flows occur regardless of architecture. -
47
DPIA Tool
Vigilant Software
Assess and treat data security risks for every process in your organisation. Easily demonstrate measures taken for GDPR (General Data Protection Regulation) compliance, essential to help you meet Article 35 requirements. Avoid unnecessary work with screening questions to determine if a DPIA (data protection impact assessment) is necessary. Review, update and maintain DPIAs year after year. Identify data security risks and determine the likelihood of their occurrence and impact. Demonstrate that appropriate measures have been taken to comply with the requirements of the GDPR. Intuitive and interactive dashboard that offers a real-time overview of your project that you can personalise to see what's important to you. Live chat with our product developers who will help you navigate the tool, address any technical issues and advise on how to get the most out of the software.Starting Price: $68.47 per month -
48
AutoTrac
Attilanet
AutoTrac was developed by Automotive Wholesaler professionals with a combined experience of over 100 years. Designed from the ground-up in the latest Microsoft© Technology, AutoTrac 2.2 offers you the ability to manage your wholesale inventory from anywhere, at anytime. Powerful reporting options let you manage your flow of information down to the finest detail. Reports all print on plain 8½ x 11 paper. Comprehensive management screens will track recon, freight, commission and floor plan expenses to the penny. Quick Books© Interface, Data Acquisition, Web Site, and other modules easily integrate operations into one smooth flow of information. Working with photographs has never been easier than with the automatic resizing, storage, and retrieval capabilities built into AutoTrac 2.2. -
49
CaseTrac
ETHIX360
With game changing innovation in the use of artificial intelligence, best practice workflows and features designed by HR and compliance professionals for HR and compliance professionals, CaseTrac is the leading case management solution available in the market today. CaseTrac™ offers the industry’s most comprehensive intake methods for reporting your company’s concerns, and collects, manages and resolves any incidents that arise. We always protect the anonymity of each reporter and provide seamless communication with the individual who chooses to report. ETHIX360 believes that the more constituents report to your company, the more your company can learn, grow and elevate its overall performance. Our Web Services application also provides an API to leading HRIS solutions, facilitating maximum utilization and value. The solution includes a powerful workflow engine and notification matrix along with a comprehensive, easy-to-use reporting and analysis platform. -
50
StudentTrac
Education Dynamics
Students and families can complete their enrollment paperwork and upload documents, such as previous school transcripts and immunization records, online with no hassle. StudentTrac captures electronic signatures from guardians in a single click. Reduce paperwork by tracking attendance and delivering progress reports online. With StudentTrac, there's no need for office staff to input daily attendance. Our system will compile it for you. Parents and guardians can monitor student attendance and progress via the StudentTrac parent portal. StudentTrac has dozens of pre-built reports designed to identify trends and disruptions in student matriculation. These can be vital to understanding where and when your students need additional academic support or interventions to stay on pace to graduate. StudentTrac also allows users the ability to create custom reports which can be filtered or grouped by any collected data point.