Alternatives to RiskMach
Compare RiskMach alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to RiskMach in 2026. Compare features, ratings, user reviews, pricing, and more from RiskMach competitors and alternatives in order to make an informed decision for your business.
-
1
Predict360
360factors
Predict360 is an integrated risk and compliance management software platform for financial and insurance organizations. It integrates risk and compliance processes and industry best practices content into a single platform that streamlines regulatory compliance, improves efficiency, predicts risk, and provides best-in-class business intelligence reporting. Predict360 includes the following Risk Management applications: Enterprise Risk Management (ERM), Risk Management and Assessments, Risk Insights, Issues Management, Peer Insights, Third-Party Risk Management, and Quarterly Certifications and Attestations. Compliance applications are: Compliance Management, Compliance Monitoring & Testing, Complaints Management, Regulatory Change Management, Regulatory Examination and Findings Management, Policy & Procedure Management, and more. 360factors also offers Lumify360 - a KPI and KRI predictive analytics platform that enriches data, predicts performance, and works alongside any GRC. -
2
Adaptive Compliance Engine (ACE)
PSC Software
ACE is a quality management software solution for companies of any size, in any stage, in any highly regulated industry. ACE is fully configurable allowing your company to adapt ACE to fit into your exact quality needs. Empower all levels of your organization with intuitive user interfaces, easily search for all your documents and records, and transform your data into actionable intelligence with advanced analytics all on a single platform. Our one-stop software includes: -Office 365 Integration -Inspection Management -Document Management -Risk Management -Product Lifecycle Management -Learning Management -Audit Management -Quality Events -Paperless Validation -Electronic Signatures (21 CFR Part 11 Compliant) -Endless Workflow Configurations -And so much more! ACE comes with everything you need, all included at one price. Every application is included, no more a la carte pricing. No more nickel and diming. One software, endless solutions. -
3
A1 Tracker
A1 Enterprise
A1 Tracker is presented by the vendor as a robust & configurable risk management software offering either stand-alone or fully-integrated risk management software covering many business segments across an organization. Claims & Incident Management Claims & incident reporting for claims of any type: injuries, medical, commercial, customer, insurance, work comp, asset, auto, liability. Risk Management & Threat Assessment: Risk register for tracking risks at any level in an organization, including by entity, project, asset, contract, vendor, division, business, unit, region, and more. Real-time risk reports & heat maps, dashboard metrics, alerts, & notifications. Contract Management: Contract module for tracking contracts of any type with vendors, employees, customers, and any other parties. Insurance Policies & Certificates: Policies & certificates of insurance tracking with reminders & renewals. For agencies & carriers policy management includes tracking clients.Starting Price: $800/month -
4
MADe
PHM Technology
Mitigate technical engineering-based risks that impact performance, operational availability and the cost of maintenance using modeling, analysis and decision support workflows. MADe is used to enable better decisions about the design and support of safety/mission-critical equipment at each stage of the product lifecycle. Reduce risk using interdependent analysis capabilities that consider the technical, operational and economic requirements of the operator and/or maintainer of the system. The MADe software is an integrated analysis solution that generates the artifacts required for Airworthiness certification. The analysis generated concurrently with design leads to improvements in the certification process. MADe automatically tracks the source of all parameters used in an analysis to provide a means of assessing the quality of data used to support engineering decisions and analysis.Starting Price: $10000.00/year -
5
Cetbix GRC & ISMS
Cetbix
In three steps, you can achieve information security self-assessment, ISO 27001, NIST, GDPR, NFC, PCI-DSS, HIPAA, FERPA, and more. Cetbix® ISMS strengthens your certification. Information security management system that is comprehensive, integrated, documents ready and paperless. Cetbix® online SaaS ISMS. ISMS software from Cetbix®. Other features include IT/OT Asset Management, Document Management, Risk Assessment and Management, Scada Inventory, Financial Risk, Software Implementation Automation, Cyber Threat Intelligence Maturity Assessment, and others. More than 190 enterprises worldwide rely on Cetbix® ISMS to efficiently manage information security and ensure ongoing compliance with the Data Protection Regulation and other regulations. -
6
Shared Assessments
Shared Assessments
We’ve harnessed the collective intelligence of world’s top risk assessment and management experts to create our industry leading SIG Questionnaire and the most recognized third party risk certification, CTPRP. The VRMMM, SIG, SCA and Privacy tools are designed to meet the needs across the vendor risk management lifecycle. Certification classes and exams establish a knowledge base and verify third party risk professionals’ expertise. Studies, papers and our blog are member-driven, industry-informed and forward looking. Premier global, multi-industry event to shed light on the processes, technologies, and efficiencies in TPRM. -
7
The EY Trusted AI Platform provides insights to organizations on the sources and drivers of risk and guides an AI design team in quantifying AI risks. The EY Trusted AI Platform uses interactive, web-based schematic and assessment tools to build the risk profile of an AI system. It then uses an advanced analytical model to convert the user responses to a composite score comprising technical risk, stakeholder impact, and control effectiveness of an AI system. To help determine technical risk, the platform evaluates the technical design of an AI system, measuring risk drivers that include its underlying technologies, technical operating environment, and level of autonomy. To help determine stakeholder risk, the platform considers the goals and objectives of the AI system. It also considers the financial, emotional, and physical impact on the external and internal users, as well as the reputational, regulatory, and legal risks.
-
8
KITRY EHS
Kitry
Entering data into KITRY EHS or retrieving information from third-party software, qualifying events, monitoring remote filing and reporting, web incident warning, near-misses, analytical management of files related to the workstations, setting up workflows, producing statistical reports, optional SCAN-OCR of paper documents. Managing workstations, homogeneous exposure groups, warnings and their action plans, workflows, and the "3 green lights" process, occupational risk assessment with the possibility of configuring several methods for calculating criticality indicators for hazardous situations, chemical product management and risk assessment, ambient metrology, web questionnaires, building management, fire plans, historizing the organizational structure, web reporting of dangerous situations, configurable legal documents. -
9
LRQA
LRQA
LRQA is a global risk management and assurance services platform that helps organizations identify, mitigate, and manage risk across quality, safety, sustainability, cybersecurity, supply chains, and compliance by combining deep sector expertise with data-driven insights and connected solutions; it provides accredited assessment and certification services for management systems and products, inspection services to verify equipment and processes, verification and report assurance to validate data and ESG reporting, advisory and technical support tailored to regulatory and operational challenges, training programs to build internal capability, and data and analytics to drive continuous performance improvement and resilience. LRQA’s portfolio covers internationally recognized standards such as ISO 9001, ISO 14001, ISO 45001, sector-specific frameworks like food safety schemes (FSSC 22000, BRCGS), and carbon or emissions verification, helping organizations demonstrate compliance. -
10
AssetMetrics
Paradigm Designs Software
Moving beyond traditional systems, AssetMetric is a next generation product designed to provide Asset Managers with a tool set that secures essential business functions and optimization opportunities. A major strength of AssetMetric is that all data resides in a single information silo and that enables the business to grow in stages necessary to develop mature Asset Management strategies. AssetMetric addresses Board-level objectives as it enables robust Corporate Governance and Compliance. It identifies all major Risk Types as well as comprehensive Change Management of all required Risk Mitigation strategies then used to setup existing ERP/CMM systems. AssetMetric takes base data into an extended model to optimize PMs, Inventory Insurance Spare, Inventory and Resources requirements according to Downtime Costs and Risk. Advanced Business decisions are possible from the Life Cycle Costs that factor in Carbon, Water and specified Energy costs. -
11
ProActive Compliance Tool
ProActive Compliance Tool
The ProActive Compliance Tool helps you comply with the correct internal and external laws and regulations. Whether it’s about information security or going through the right process for your (internal) audit or certification, with the PCT you can easily and without knowledge get started. This user-friendly and well-organized digital tool ensures that your company gains and maintains insight into your management information and certifications. The ProActive Compliance Tool is an online tool for the design, implementation, and maintenance of your management system. With the PCT you get a grip on information security, business continuity, quality, and risk management. Document, analyze, and optimize your business information. The PCT allows you to store the documentation of your organization in one central place. The PCT is suitable for all common standards, certification schemes, and assessment guidelines.Starting Price: €220.50 per month -
12
Venminder
Venminder
Venminder is loaded with all the features you need for effective third-party risk management. Complete inherent risk assessments to determine which of your vendors require attention. Streamline the onboarding, ongoing management and offboarding of your vendors with dedicated workspaces. Manage each stage in our purpose-built configurable software platform. Risk assessments are an extremely important activity to complete on your vendor's products as they provide you with the level of risk a product will or is posing to your organization. The Venminder platform enables you to create custom risk assessment questions, invite unlimited internal users to contribute answers, apply scoring preferences, create clear and concise risk rating reports and more. Features also include template creation, progress monitoring and residual risk capabilities. -
13
HITRUST Assessment XChange
HITRUST Assessment Exchange
The HITRUST XChange Manager is a purposefully-built online portal which enables real-time collaboration between organizations and their entire supply chain to efficiently manage the exchange of risk assurance information and facilitate continuous monitoring of third-party risk. This innovative portal is the only TPRM solution that is both comprehensive and modular, including the three vital components of people, process, and technology. Make better informed risk decisions by leveraging the HITRUST Third Party Risk Management methodology. The HITRUST Assessment XChange is designed to be an extension of an organizations third-party risk management program. The XChange team streamlines and simplifies the process of managing and maintaining risk assessment and compliance information from third parties. Effectively engage third parties and identify the appropriate individual(s) responsible for responding to risk assessments and compliance information requests. -
14
Hicomply
Hicomply
Say goodbye to long email chains, hundreds of spreadsheets, and complicated internal processes. Stand out from the crowd. Increase your competitive advantage with key information security certifications, achieved quickly and easily with Hicomply. Build, house, and manage your organization's information security management system in the Hicomply platform. No more wading through piles of documents for the latest updates on your ISMS. View risk assessments, monitor project processes, check for outstanding tasks, and more, all in one place. Our ISMS dashboard gives you a live and real-time view of your ISMS software, ideal for your CISO or information security and governance team. Hicomply’s simple risk matrix scores your organization’s residual risks based on likelihood and impact. It also suggests possible risks, mitigation actions, and controls, so you can keep on top of all risks across your business. -
15
CyberRiskAI
CyberRiskAI
Conduct cybersecurity risk audit with CyberRiskAI. We offer a fast, accurate, and affordable service for businesses that want to identify and mitigate their cybersecurity risks. Our AI-powered assessments provide businesses with valuable insights into potential vulnerabilities, enabling you to prioritize their security efforts and protect your company’s sensitive data. Comprehensive cybersecurity audit & risk assessment. All-in-one risk assessment tool and template. Uses the NIST cybersecurity audit framework. Quick and easy to set up and run, we offer a hands-off service. Automate your quarterly cybersecurity risk audit. Data gathered is confidential and stored securely. By the end of the audit, you’ll have all the information you need to mitigate your organization’s cybersecurity risks. With the valuable insights gained in potential vulnerabilities, you can prioritize your team’s security efforts to protect and mitigate cybersecurity risks.Starting Price: $49 -
16
RiskAssess365
Sevron Safety Solutions
Risk assessments don’t need to be rocket science, this is why we have created a design that is simple and easy to understand for the end user (the person carrying out the task) You can produce risk assessments for practically any task that are easy to read and understand using our unique standardized template. They say a picture can say a thousand words and that’s exactly true, using our assessment editor you can add as many hazard and control icons as you require to your assessments. Create Task & PUWER risk assessments quickly and easily using our online wizard. Keep your colleagues informed and up to date with changes to your assessments automatically. Ditch your files and folders and store your risk assessments securely in the cloud, accessible 24/7. Using our traffic light system easily see the before controls and after controls in place ratings for the task being carried out, making it very clear to the end user the dangers of not following the assessment. -
17
Prometheus Platform
Prometheus Group
The Prometheus platform enables out-of-the-box digital transformation for organizations using SAP, IBM Maximo, or Oracle for maintenance and operations. Prometheus solutions deliver simple, role-based workflows for all enterprise asset management tasks. All Prometheus platform solutions work on any device, online or offline. Our solutions include Planning & Scheduling, Permitting & Safety, STO Management, Mobility, Master Data, and Reporting & Analytics. Maintenance software with configurable tools designed to support the core functions of maintenance planners and schedulers. Integrated Safe System of Work (ISSOW) that enables and supports processes for electronic permit to work, lockout/tagout (LOTO), operational risk assessment, and more. Mobile asset management solution for iOS, Android, and Windows that connects maintenance technicians with your EAM, ERP, or CMMS. -
18
assetDNA
Relegen
assetDNA is a cloud-based asset intelligence technology solution which helps organisations achieve enterprise-wide visibility and item-level traceability of physical assets and operational risk. assetDNA integrates secure serialisation and asset lifecycle data management software, asset tagging [Barcodes, RFID, NFC, RTLS, GPS, Cellular, IoT, Covert Security tags and more], mobile workflow and data capture applications [iOS], scanning / reader hardware, services and technical support. Organisations can use the assetDNA cloud and mobile-enabled platform to reap the benefits of enterprise mobility, greater field productivity, and improved asset data integrity for real-time decision support. Standardise and automate infield processes for: Discovery, Authentication, Audit, Track, Issue, Receipt, Transfer, Chain-Of-Custody, Proof-Of-Presence, Inspections, Rounds, Stocktake, Inventory, Service, Disposal and more. Visit www.relegen.com. -
19
DecisionTools Suite
Lumivero
No matter what industry you're in, the DecisionTools Suite can help you make decisions with confidence. Take the guesswork out of big decisions, and plan strategies with confidence. With the DecisionTools Suite, you can assess risk and optimize decisions, right in your Excel spreadsheet. The DecisionTools Suite is an integrated set of programs for risk analysis and decision-making under uncertainty. DecisionTools Suite software integrates seamlessly with Microsoft Excel. Our innovative software solutions create usable insights from uncertain situations. As the leading provider of risk and decision analysis software for three decades, Palisade enables companies and organizations to evaluate risk at any level and decide what step comes next. With offices around the world, Palisade offers a truly global presence. We are proud of our global team, and our ability to offer sales and technical support for Palisade software. -
20
TrustCloud
TrustCloud Corporation
Don’t struggle with 1000s of vulnerability smoke signals from your security tools. Aggregate feeds from your cloud, on-premises, and bespoke apps, and combine them with feeds from your security tools, to continuously measure the control effectiveness and operational status of your entire IT environment. Map control assurance to business impact to assess which gaps to prioritize and remediate. Use AI and API-driven automation to accelerate and simplify first-party, third-party, and nth-party risk assessments. Automate document analysis and receive contextual, reliable information. Run frequent, programmatic risk assessments on all your internal and third-party applications to eradicate the risk of one-time or point-in-time evaluations. Take your risk register from manual spreadsheets to programmatic, predictive risk assessments. Monitor and forecast your risks in real-time, enable IT risk quantification to prove financial impact to the board, and prevent risk instead of managing it. -
21
Etactics CMMC Compliance Suite
Etactics
Preparing for the Cybersecurity Maturity Model Certification (CMMC) assessment is a considerable investment from both time and money perspectives. Organizations handling Controlled Unclassified Information (CUI) within the defense industrial base should expect to have an authorized CMMC 3rd Party Assessment Organization (C3PAO) certify their implementation of NIST SP 800-171 security requirements. Assessors will evaluate how the contractor implements each of the 320 objectives across all applicable assets within the scope, including people, facilities, and technologies. The assessment process is expected to involve a review of artifacts, interviews of key personnel, and tests of the technical, administrative, and physical controls. As organizations prepare their body of evidence, they should establish a relationship between the artifacts, the security requirement objectives, and assets within scope. -
22
HAZAID
InterDynamics
HAZAID hazard cataloging and risk assessment tool is used to record the Fatigue Hazard Analysis (FHA) risk assessment information gathered during an FHA workshop. It is highly visual and interactive and is used to ensure a high standard is maintained for information captured during the workshop process. Reports of accidents and incidents that are part of the organization’s safety management system. Details and statistics of accidents and incidents are available from safety authorities who have responsibility for industry-wide safety, and details and statistics of accidents and incidents for the organizations’ industry are available from the organization’s insurer. Increased scrutiny by safety authorities and insurers. Downtime due to equipment malfunction caused by user error. Once the hazards have been entered, HAZAID offers a task risk matrix identifying which hazards have an unacceptable consequence based on the probability of the occurrence. -
23
Safexpert
IBF Solutions
Safexpert is our thousand times proven software for CE marking and risk assessment according to the Machinery Directive and Machinery Regulation as well as the Low Voltage Directive. Safexpert has special modules which support you and your team in your safety related project management and in dealing with standards and EU directives. Professional safety engineering including modern standards management. Efficient work due to the direct access to particularly relevant standards in full text. The software functions of risk assessment form the core of Safexpert. They help you to create and document the legally required risk assessment efficiently, systematically, and legally compliant according to EN ISO 12100. In addition to the core functionalities of risk assessment, the software offers numerous features to make the risk assessment process as easy as possible for all parties involved. -
24
HITRUST MyCSF
HITRUST
Regardless of the industry served, organizations are challenged with managing information security risks, data governance, complying with the numerous information protection regulations, and adhering to national and international standards and best practices. HITRUST understands that addressing these challenges is a priority for organizations of all sizes, in all industries and geographies. Implementing an information risk management framework, performing thorough and accurate information risk assessments, streamlining remediation activities, and reporting and tracking compliance is resource-intensive and complicated at best and many times overwhelming. We’ve leveraged our unique position and experience in framework development and information risk management and compliance, combined with processing hundreds of thousands of risk assessments, to design the most efficient solution for assessing, managing, and reporting information risk and compliance. -
25
AssessNET
Riskex
Our flagship product, AssessNET is an online health and safety solution that enables businesses to effectively create and manage records, tasks, and duties to fulfil their legal, regulatory and moral obligations across an array of health and safety aspects including Risk Assessment, Incident Management, DSE, Audits & Inspections, COSHH, Fire Risk and Manual Handling. Our software educates people about health, safety and wellbeing, helping to create a strong culture of high quality, efficient and compliant working practices, leading to reduced risks and lower costs. What sets us apart from the competition is our subject matter expertise in all things health and safety. As well as being technical experts, our development and support teams are trained in the discipline of health and safety, meaning that they can fully understand how health and safety technology needs to work to address the individual needs of our customers. -
26
PHA-PRO
Sphera
Risks are inherent in asset-intensive, high-hazard facilities, and especially where the risk data set is vast with process safety risk spread across the organization. It’s difficult to standardize and assess all the sources of risk to support resource-intensive facilities. Sphera’s PHA-Pro offers a framework, configurable methodologies and risk assessment workflows to help organizations standardize and record risk assessment data and ensure proper controls are in place. Our PHA-Pro software is the most recognized and respected hazard identification and risk assessment tool for strengthening the risk assessment process. It helps identify, assess and control the impact of process-related risk. And Our expert facilitators have extensive experience performing risk assessments based on any methodology, including: HAZOP, What/If FMEA, FMECA PHA revalidation Workplace Job Safety Analysis (JSA) Layers of Protection Analysis (LOPA) and Safety Integrity Levels (SIL) SVA -
27
vsRisk
Vigilant Software
Conduct quick and hassle-free information security risk assessments. Follow a proven process to ensure compliance with ISO 27001. Reduce the time spent on risk assessments by up to 80%. Generate audit-ready reports, year after year. Follow our built-in tutorials through each step of the process. Generate audit-ready statements of applicability, risk treatment plans, and more. Select threats and vulnerabilities from built-in databases. Generate a risk treatment plan and an SoA, ready for review by auditors. Eliminate errors associated with using spreadsheets. Accelerate risk mitigation actions with built-in control and risk libraries. Track implementation tasks against risks. Detail how a risk to personal data will impact the parties involved. Conduct privacy risk assessments to protect personal data. We offer single-user and multi-user access via monthly and annual subscriptions.Starting Price: $189.02 per month -
28
RIscout
Hellenic Institute for Occupational Health and Safety (ELINYAE)
RIscout is a fully automated web application for technical workplace risk assessment. Based on an extended database of material resources in workplace (infrastructure, equipment, vehicles and materials) with embedded checklist linking risks and safety controls according to the “bow-tie” model, RIscout allows he user to perform and continuously update a complete technical quantitative risk assessment just by choosing the resources available and answering questions. RIscout provides a number of alternative reports coupled with a screenshot-and-email tool for easy communication. Integrated with its also automated incident management and calendar applications, as well as with complement support applications, RIscout is a complete tool for workplace safety management at anytime and from everywhere. RIscout is open-access for web users of the central platform. For customized applications contact ELINYAE.Starting Price: $0 -
29
Radar Compliance
RadarFirst
Operationalize cyber, compliance, and risk notification obligations for consistent, documented, and collaborative event management. Radar Compliance is a configurable rules and assessment engine that lets you define your own notification triggers and obligations, including internal stakeholders, regulators, and third-party obligations. The result is consistent, documented, and collaborative event management organization-wide. Eliminate subjectivity in incident assessment and make ad hoc notifications a thing of the past. Provide a transparent, audit-friendly process to internal and external stakeholders. Create streamlined incident management processes across departments. A completely automated assessment that considers all relevant risk factors and incident data involved in a specific incident and programmatically analyzes the “material risk” based on rules most important to your company. -
30
Safety 360 Elite
Affsaf
Safety 360 Elite is cloud-based, fully interactive, and paperless. All HSE requirements and actions are addressed in the system, by way of quick and easy steps ensuring involvement by all employees. As stated in the OHS Act and now ISO 45001, your safety system needs to provide for the health and safety of persons at work against hazards in connection with the activities of persons at work. To ensure this; the system assists in identifying safety issues, allowing for the removal, reduction and control to ensure a safer workplace. It encourages involvement by all employees. Risk assessments enable the user to identify all risks within the organisation and its scope of activity. This feature contributes to the management of health and safety by means of risk evaluation, ratings, and implementation of relevant mitigations. -
31
Network Detective Pro
RapidFire Tools, a Kaseya Company
Automate collection of data across the entire network to identify and respond to risk. Network Detective Pro is an IT assessment solution that identifies risks and issues, scores their severity and presents them in actionable dashboards and dynamic reports. Enhance network visibility and gather data from across the IT environments you manage. With Network Detective Pro you can uncover, prioritize, and manage risks and issues. Ensure the integrity of your systems with automated data collectors. Network Detective Pro uses non-intrusive data collectors, light-weight discovery agents, and powerful scanners to identify risks quickly. Reduce risk efficiently with detailed management plans and remediation guidance that scores network threats and issues based on severity. Customize which IT issues are reported and the importance that they are given in an assessment. -
32
SISA RA
SISA Information Security
Soaring cyber-attacks emphasize the need for organizations to look forward and see what is coming ahead. A formal Risk Assessment helps entities to disclose vulnerabilities and build a robust security architecture. While assessing risks is highly recommended for organizations to gain insights into the evolving cyber threats, automated risk assessment tools simplify the job for businesses. With the right Risk Assessment tool, organizations can save 70 – 80% of efforts to conduct risk-related activities and concentrate on critical tasks. SISA being a PCI Risk and Compliance expert for more than a decade, identified the challenges faced by organizations in anticipating risks and built SISA Risk Assessor, an intuitive Risk Assessment solution. SISA’s Risk Assessor is the first PCI Risk Assessment tool in the market, built based on world-renowned security methodologies, including NIST, OCTAVE, ISO 27001, and PCI DSS risk assessment guidelines. -
33
JuicyScore
JuicyScore
Digital fraud prevention and risk assessment services for fintech companies. Device risk assessment and online user protection via non-personal and behavioral data analysis technologies. Prevent fraudulent activities, reduce the risk of threats, and gain new clients with sustainable portfolio growth. JuicyScore allows you to identify different types of fraud, shady behavior, and user intentions, segment the incoming flow based on risk level, and raise the informative value and resolution of your decision-making systems. Ensure robust personal account security for your clients and increase conversion of online transactions. JuicyID enables instant seamless client authentication, protecting their sensitive data and narrowing down fraudulent actions and intentions. We identify various kinds of technical and social fraud, determine segments of high and low risk, provide a broad data vector to enrich your own scoring models and increase the resolution of your decision-making system. -
34
ARCON | SCM
ARCON
The ARCON | SCM solution helps to enforce a comprehensive IT risk management framework – a unified engine of all IT risk management controls required to be implemented at different layers for effective risk mitigation. The solution ensures the creation of a robust security posture and ensures compliance. Critical technology platforms require continuous risk assessment. This can be achieved through the power of AI – governing, assessing, and optimizing the organization’s Information Risk Management. An organization’s IT infrastructure is constantly evolving, adding new capabilities and technologies, making it important for their cybersecurity and identity protection solutions to evolve with them. Having a unified engine for effective risk management implemented at different levels facilitates organizations to prioritize security and compliance efforts without the need for manual intervention. -
35
Coverbase
Coverbase
Coverbase is an AI-native procurement and third-party risk management platform designed to automate and orchestrate the entire supplier lifecycle, from initial intake and vendor sourcing to due diligence, contract management, and continuous monitoring. It enables organizations to request suppliers, assess inherent risk, and gather required documentation through autonomous AI agents that collect data from emails, portals, and internal systems without manual intervention, eliminating repetitive back-and-forth communication. It includes workflow automation that synchronizes approvals, tasks, and data across systems, along with a unified supplier data fabric that consolidates information from multiple tools into a single, consistent record to power workflows, reporting, and AI-driven decisions. Coverbase embeds security, compliance, and risk evaluation directly into procurement processes, allowing teams to validate controls, detect gaps, and maintain audit-ready records. -
36
Dastra
Dastra
Dastra is a comprehensive data privacy and regulatory compliance platform designed to help organizations manage, document, and ensure compliance with data protection laws such as the GDPR, e-Privacy, and the EU AI Act through a single, centralized solution that supports both legal and technical teams. It provides a complete suite of privacy tools including a Record of Processing Activities (ROPA) that lets teams map and document how personal data flows through systems, Data Subject Request (DSR) management for handling access, deletion and other rights, Data Protection Impact Assessments (DPIAs) to evaluate high-risk processing, risk management and audit questionnaires, data breach tracking, cookie consent management and advanced task workflows to coordinate compliance operations across stakeholders. Dastra also offers data mapping and documentation repositories, integrated AI helpers to generate processing artifacts, secure APIs and integrations, and customizable workflows. -
37
Clik Cert
Clik
Create, manage and complete your certificates in just a few clicks with Clik Cert; the all-in-one solution for forms, certificates, reports and risk assessments. Choose from an extensive library of gas and plumbing, fire and security, renewables and catering certificates or get your own created by Clik's in-house template team. Fill out work in the office or send unlimited certificates straight to engineers using the field app. Reduce waste and go paperless with bespoke certificate software and speed up future work by saving certificate templates for your team to reuse for repeat work. Easily find your certificate history, access client details, site addresses, and more in the address book and quickly add client details to certificates. Clik Cert is the tool that can help you tackle paperwork for every job that comes your way. Whether you’re installing CCTV systems, conducting risk assessments, testing gas safety or anything in between. -
38
Lema
Lema
Lema is an agentic AI-powered third-party risk management and security platform that gives enterprises continuous, real-time visibility into the risks introduced by external vendors and partners. Instead of relying on static compliance checklists or manual questionnaires, Lema correlates vendor artifacts, public and internal data, and existing technical systems to automate forensic analysis, open source recon, and continuous monitoring of how each third party interacts with critical assets, including data access, permission changes, and actual usage patterns, to reveal real attack paths and hidden vulnerabilities. Its Agentic Risk Engineering capabilities surface verified risks that traditional tools miss and deliver actionable remediation guidance that helps teams quickly reduce exposure, with some assessments completed in under five minutes. -
39
UXRisk
Proactima
Build all your GRC and management system workflows on one platform. Our risk assessment workflows are built around the complete assessment process, from planning, identifying risk, assessing risk, establishing a plan for mitigation including assigning responsibilities and action tracking. When you work with risk management in UXRisk, we have worklows that are compliant with most recognized standards such as ISO 31000, COSO, ISO 14001, ISO 27001, OSHA, PMI Project Risk Management and others. Supporting a wide range of qualitative risk assessment methods such as HAZID, HAZOP, bow-tie, and others. Our audit workflow lets you plan, carry out and follow up audits, supervision and verifications directly in our app. The workflow also lets you assign responsibilities for and track actions. When you work with process, product or management system audits, verifications, and inspections in UXRisk. You are in compliance with most recognised standards.Starting Price: $2 per month -
40
Nova-Cleaning Validation
Novatek International
Nova-Cleaning Validation software significantly enhances product integrity by managing changes and assessing the risks associated with cross-contamination and product impurities within a dynamic production environment. All changes to methods, APIs, products, equipment, and family groups are automatically evaluated to ensure product integrity and regulatory compliance. Nova-Cleaning Validation complies with 21 CFR Part 11 and EU Annex 11. The system uses a risk-based approach and is designed based on PDA Technical Reports 29 and 49, ISPE MaPP, 21 CFR Part 211.67. -
41
SoftExpert ERM
SoftExpert
SoftExpert ERM software enables organizations to identify, analyze, evaluate, monitor, and manage their enterprise risks using an integrated approach. It brings together all risk management-related data in a single and comprehensive environment, including a reusable library of risks and their corresponding controls and assessments, events such as losses and non-conformities, key risk indicators, issues and treatment plans. The solution streamlines the risk assessment process, while the risk heat map feature enables organizations to set their priorities and make strategic decisions based on risk levels. The software serves as the foundation for the company’s enterprise risk management efforts through its ability to unite and support different risk categories like strategic, financial, security, compliance, environmental, assets, products, processes and projects. -
42
It is a cyber information risk management tool aligned with ISO 27001:2013. It saves time spent on risk management and gives you results that can be audited on yearly basis. It is web based tool that allows you to conduct an information security risk assessment quickly and easily. It supports multiple devices (desktop, laptop, ipad or mobile) and can be accessed from anywhere and anytime. An organisation should be aware of the risks it faces when managing its information. It should be aware of its information assets (applications, services, processes, location etc.), the importance of these assets and the risks associated with them. The arc tool supports the organisation to achieve the above and more by providing modules targeting: Asset Management, Business Impact Assessment, Risk Assessment & User Administration. It helps you to produce consistent, repeatable and reliable risk assessments that save time and money.
-
43
Vendor360
CENTRL
Vendor360, CENTRL’s Vendor Risk Management Software, streamlines the entire process of managing the 3rd party risk lifecycle. Through centralized, easy-to-use workflows, and powerful internal and external collaboration capabilities, Vendor360 provides you with the tools and content needed to identify, manage, assess and mitigate third party risks across all stages of your organization’s vendor life-cycle. Advanced and flexible third party risk management platform for aggregating your vendor data, automating your assessments and getting control over your vendor risk management process. -
44
Cotality Climate Risk Analytics
Cotality
Cotality’s Climate Risk Analytics provides advanced solutions for assessing and mitigating climate-related risks, offering businesses valuable insights to future-proof their operations. By leveraging CoreAI, the platform evaluates environmental factors and helps organizations understand exposure to climate hazards, including natural disasters and weather patterns. With real-time data analysis, predictive modeling, and customizable risk assessments, Climate Risk Analytics empowers companies to make data-driven decisions and develop strategies to minimize the impact of climate risks on their assets, operations, and sustainability goals. -
45
foodflou
foodflou
foodflou gives food companies full supplier visibility and strong document control across all food safety and compliance work. CAPAs, NCRs, complaints, forms, inspections, audits, risk assessments, supplier questionnaires, and all related documents sit in one accurate and customizable system. This removes scattered PDFs, spreadsheets, and shared drives that cause version problems and audit issues. Teams work with clear ownership and up to date information, and suppliers stay aligned through direct sharing and easy imports. Automated tasks and simple workflows keep requirements on track and reduce common audit risks. With fast onboarding and everything in one place, companies strengthen food safety management and maintain consistent GFSI and BRCGS audit performance.Starting Price: €129/month -
46
TCT Portal
Total Compliance Tracking
Overwhelmed by the storm of multiple compliance assessments year after year? TCT Portal lights the path to audit efficiency to reduce thrashing, organizational risk, and resources caught up in the maelstrom. Total Compliance Tracking helps organizations and auditors take control of their audit and assessment information, in even the most complex compliance environments. Managing multiple compliance standards? The more compliance assessments and audits you have, the more time and effort you will save. Choose from dozens of ready-built compliance audit and assessment templates for common audit standards - such as GLBA, HIPAA, ISO, NAID, NIST, PCI, and SOC 2 - to start managing compliance out of the box. And, yes, if you have a requirement that maps to multiple audits, you can map your evidence across multiple audit requirements. Or, you can completely customize your compliance requirements.Starting Price: $249 per month -
47
Imperium
Imperium
The Imperium platform is an integrated risk platform designed for operational risk and compliance functions. Organize different types of risk and control assessments on a single platform to remove duplication in effort, thereby improving business engagement. Manual processes and complex system stacks are expensive. A streamlined operational risk platform can remove much of the inefficiency and therefore significantly reduce cost. Operational risk has a ‘tick box’ brand problem. Designing highly engaging/initiative tools can change this mindset. Simplify the data model to drive efficient insightful reporting across all three lines of defense. Data is a critical issue for operational risk functions. Due to the broad nature of the risks involved: data capture, data maintenance, data governance and data analysis are extremely complex to manage efficiently. Imperium uses best-in-class tools to manage this data in the implementation of the platform. -
48
ModelRisk
Vose Software
ModelRisk is a Monte Carlo simulation Excel add-in that allows the user to include uncertainty in their spreadsheet models. ModelRisk has been the innovation leader in the marketplace since 2009, being the first to introduce many technical Monte Carlo method features that make risk models easier to build, easier to audit and test, and more precisely match the problems you face. A ModelRisk user replaces uncertain values within their Excel model with special ModelRisk quantitative probability distribution functions that describe the uncertainty about those values. ModelRisk then uses Monte Carlo simulation to automatically generate thousands of possible scenarios. In the same way that Excel is used for many different types of analysis, ModelRisk is used to assess the uncertainty in the numbers produced by the Excel model. Users have performed risks analyses with ModelRisk in a vast range of fields. -
49
Controllo
Controllo
Controllo is an AI-enhanced Governance, Risk, and Compliance (GRC) platform that unifies data, tools, and teams to streamline audit and compliance processes, thereby reducing timelines and costs. It offers comprehensive end-to-end GRC management, providing information security teams with a 360-degree view of compliance across multiple frameworks, all mapped to each other, along with risk assessments and control implementations. The platform features high-level dashboards for real-time insights and integrates seamlessly with ticketing systems like Jira and ServiceNow, as well as communication tools, to drive effective risk mitigation. It prioritizes vulnerabilities based on actual cyber risk impact rather than just technical severity scores, empowering data-driven mitigation decisions and ensuring regulatory compliance. Controllo supports various frameworks. -
50
BigOceanData
BigOceanData
Online vessel tracking, fleet management, port activity and maritime intelligence from our cost effective and user-friendly online vessel tracking platform. The BigOceanData software platform is optimized for re-use by third parties making it ideal for organizations seeking a quick-to-market, low-risk, cost effective business solution. With the increasing risk of global piracy activity, caused by unpredictable factors such as seasonal variations, regional economic crisis and even global pandemics, BigOceanData has developed an extensive range of easy to use MARSEC tools. These tools are standard with their offering to provide maritime situational awareness. BigOceanData’s new package produces a Risk Assessment document per vessel. For an identified vessel, it assesses the scheduled Vessel Route against historic piracy incidents. The Risk Assessment can be annotated with comments provided by the user. The output is a vessel specific Risk Assessment document in a single PDF document.