Alternatives to SmartProfiler
Compare SmartProfiler alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to SmartProfiler in 2026. Compare features, ratings, user reviews, pricing, and more from SmartProfiler competitors and alternatives in order to make an informed decision for your business.
-
1
SmartProfiler for M365
Dynamicpacks
SmartProfiler for Office 365 assessment is an automated health & risk assessment solution to help you significantly improve your Microsoft Office 365 ecosystem health & security posture. SmartProfiler for Office 365 assessment follows CIS workbench controls and other tests designed by our Office 365 experts. The Center for Internet Security is a nonprofit entity whose mission is to ‘identify, develop, validate, promote, and sustain best practice solutions for cyberdefense.’ It draws on the expertise of cybersecurity and IT professionals from government, business, and academia from around the world. To develop standards and best practices, including CIS benchmarks, controls, and hardened images, they follow a consensus decision-making model. SmartProfiler is designed to support CIS standards designed for Office 365 and Azure assessments.Starting Price: $2,499 per tenant -
2
Netwrix PingCastle
Netwrix
Netwrix Active Directory Risk Assessment is a free tool that identifies security gaps in your Active Directory and Group Policy. It provides visibility into account permissions and configurations, helping to detect and mitigate potential risks. The tool offers a comprehensive report detailing vulnerabilities, such as accounts with passwords set to never expire, disabled accounts that are not securely managed, and accounts with high privileges. By highlighting these issues, it enables organizations to take corrective actions to enhance their security posture. The assessment is straightforward to use, requiring no installation; it runs as a portable executable, making it convenient for IT administrators to evaluate their Active Directory environments quickly. Regular use of this tool can assist in maintaining a secure and compliant IT infrastructure by proactively identifying and addressing potential security weaknesses.Starting Price: Free -
3
Ossisto 365 IT Health & Risk Scanner
Ossisto 365
Ossisto 365 IT Scanner delivers complete IT Risk Assessments, uncovering all hidden issues within Microsoft Active Directory effortlessly and provides effective recommendations for AD Risk Remediation, Security and Hardening initiatives. Additional Assessment Coverage is available for other Microsoft Server Technologies like: -
4
Cyber360
CENTRL
Streamline cybersecurity assessments and transform your practice to serve more clients with a best-in-class cloud platform. Identify, analyze, and mitigate cybersecurity risks with full transparency and control. Comprehensive out-of-the-box yet highly configurable workflows and controls framework provide flexibility while driving efficiencies. Design a repeatable cybersecurity assessment process that maps to your organization needs. Gain visibility if your organization’s risk profile across business units, third parties, regions. Collect and store all assessments, documents, policies, issues in a centralized repository. Proactively manage exceptions through analytics, alerts and collaboration. Start with pre-built and pre-seeded industry assessment templates, or upload your own standard practice questionnaire. Multiple modes for assessments to suit business needs, self assessments, onsite assessments, and more. -
5
Netwrix 1Secure
Netwrix
Netwrix 1Secure is a SaaS solution designed to protect your IT infrastructure by monitoring critical changes in your environment, enabling you to respond to potential threats before serious damage occurs. It helps you discover risks in your IT environment before they become a problem. The solution offers alerts on critical changes, advanced search and filtering, risk assessment, human-readable reports, actionable dashboards, and exportable risk reports. Netwrix 1Secure relies on certified Microsoft Azure data centers, encrypts all data at rest and in transit, and supports multifactor authentication. Catch unintended or malicious changes in your IT infrastructure and assess the risks that threaten your organization. Be notified promptly about suspicious activity in your Microsoft 365 environment, Active Directory, or file servers, so you can respond in time to prevent serious damage. Customize the alerts based on your needs. -
6
FortifyData
FortifyData
FortifyData uses non-intrusive active assessments to assess both your external and internal infrastructure, including considerations to security and compliance controls implemented. Fully manage your cyber rating and the factors affecting your risk profile using FortifyData, ensuring your risk rating is accurate-free of misattributions and false positives. You need the freedom to customize what is most important to you for each risk factor so you can measure what really matters. This results in a more accurate rating. Assess all aspects of risks within an organization’s security posture, including external and internal systems, policies and compliance. One-size-fits-all security ratings are neither accurate nor meaningful; Tune your risk profile to accurately represent your risk level. Manage and mitigate first- or third-party risks efficiently through integrated task management and FortifyData partner services. -
7
Specops Deploy
Specops Software
Specops Deploy simplifies the installation of operating systems, software, and applications in your Microsoft Active Directory environment. Extending the functionality of Group Policy, the solution lets you target any number of computer objects within Active Directory. Use Specops Deploy to save user state during installation, manage local user settings, or capture operating system images. Specops Deploy removes time-consuming manual tasks and improves IT efficiency through a simplified software deployment process. Whether you are installing applications on multiple devices, or upgrading your computers to a new operating system, it is the key to ensuring your time is well spent. Specops Deploy uses existing technologies such as Active Directory, Group Policy, Windows Deployment Services (WDS), Windows Assessment and Deployment Kit (Windows ADK), and Microsoft Deployment Toolkit (MDT). -
8
OGP TurnCheck
OGP
TurnCheck software is fast and easy to program with a focus on what you want to measure rather than how to measure it. Automatic feature extraction immediately finds and measures all part features in a single scan. A single image displaying the entire part allows you to easily see all basic shaft measurements at once. Rotational scans can be done for form and runout measurements providing plots to truly visualize the results. Pre-programmed parts are automatically rotationally aligned allowing for fast and intelligent one-touch measurement every time. For effortless thread analysis, a large variety of common types are part of an integrated thread library to quickly obtain results such as pitch and major/minor diameter. Data points can be compared directly to a DXF model including 2D GD&T analysis. Additional data points can be output to optional SmartProfile® software for 3D analysis and advanced GD&T. -
9
DomainTools
DomainTools
Connect indicators from your network with nearly every active domain and IP address on the Internet. Learn how this data can inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure. Gain insight that is necessary to make the right decision about the risk level of threats to your organization. DomainTools Iris is a proprietary threat intelligence and investigation platform that combines enterprise-grade domain and DNS-based intelligence with an intuitive web interface. -
10
TrustCloud
TrustCloud Corporation
Don’t struggle with 1000s of vulnerability smoke signals from your security tools. Aggregate feeds from your cloud, on-premises, and bespoke apps, and combine them with feeds from your security tools, to continuously measure the control effectiveness and operational status of your entire IT environment. Map control assurance to business impact to assess which gaps to prioritize and remediate. Use AI and API-driven automation to accelerate and simplify first-party, third-party, and nth-party risk assessments. Automate document analysis and receive contextual, reliable information. Run frequent, programmatic risk assessments on all your internal and third-party applications to eradicate the risk of one-time or point-in-time evaluations. Take your risk register from manual spreadsheets to programmatic, predictive risk assessments. Monitor and forecast your risks in real-time, enable IT risk quantification to prove financial impact to the board, and prevent risk instead of managing it. -
11
IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities and suggest remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges. Full reports are provided as well as suggestions to address all vulnerabilities. Guardium Vulnerability Assessment detects behavioral vulnerabilities such as account sharing, excessive administrative logins and unusual after-hours activity. It identifies threats and security gaps in databases that could be exploited by hackers. Discover and classify sensitive data in heterogeneous environments. View detailed reporting on entitlements and risky configurations. Automate compliance audits and exception management.
-
12
Microsoft Secure Score
Microsoft
Assess your current security posture and identify potential improvements across all your Microsoft 365 workloads with centralized visibility from Secure Score. Assess your organization’s security posture across its entire digital estate. Identify where to improve your security posture using threat-prioritized insights and guidance. Protect your organization against cyberincidents with a good security posture and cyberinsurance. Participating insurers now use Microsoft Secure Score to provide posture-based rates to small and medium businesses. Assess the state of your security posture across identity, devices, information, apps, and infrastructure. Benchmark your organization’s status over time and compare it to other organizations. Use integrated workflow capabilities to help determine potential user impact and the procedures necessary to implement each recommendation in your environment. -
13
SECTARA
SECTARA
SECTARA™ (Security Threat And Risk Assessor) was created for security consultants and corporate security managers frustrated with the lack of advanced security risk assessment (specific) software and tools. Performing risk assessments using MS Office products, in particular, can be a tedious process, plagued by styling / formatting problems, layout selection and the routine need for reverse engineering to assure logic throughout. Such methods are not particularly collaborative, present data security concerns and often drift beyond the bounds of recommended security standards and their assessment methodologies (because we are all human). Moreover, enterprise risk systems are necessarily generic and security risk consultant’s needs are very specific. It’s also difficult to get IT and expenditure approval for internally hosted systems, especially ones that are not part of ‘core’ business. SECTARA™ was developed in response to those problems, providing a security risk assessment. -
14
It is a cyber information risk management tool aligned with ISO 27001:2013. It saves time spent on risk management and gives you results that can be audited on yearly basis. It is web based tool that allows you to conduct an information security risk assessment quickly and easily. It supports multiple devices (desktop, laptop, ipad or mobile) and can be accessed from anywhere and anytime. An organisation should be aware of the risks it faces when managing its information. It should be aware of its information assets (applications, services, processes, location etc.), the importance of these assets and the risks associated with them. The arc tool supports the organisation to achieve the above and more by providing modules targeting: Asset Management, Business Impact Assessment, Risk Assessment & User Administration. It helps you to produce consistent, repeatable and reliable risk assessments that save time and money.
-
15
CYRISMA
CYRISMA
CYRISMA is an all-in-one cyber risk management platform that enables you to discover, understand, mitigate, and manage risk in a holistic and cost-effective manner. Identify and mitigate network and endpoint vulnerabilities, discover and secure sensitive data across cloud and on-prem environments, strengthen OS configuration settings, track compliance, and generate cyber risk assessment reports in a few easy steps. Platform capabilities include (everything included in the price): -- Vulnerability and Patch Management -- Secure OS Configuration Scanning -- Sensitive data discovery; data protection (both on-prem cloud including Microsoft Office 365 and Google Workspace) -- Dark web monitoring -- Compliance Tracking (NIST CSF, CIS Critical Controls, SOC 2, PCI DSS, HIPAA, ACSC Essential Eight, NCSC Cyber Essentials) -- Active Directory Monitoring (both on-prem and Azure) -- Cyber risk quantification in multiple currencies -- Cyber risk assessment and reporting -
16
ADREPLSTATUS
Microsoft
The Active Directory Replication Status Tool (ADREPLSTATUS) analyzes the replication status for domain controllers in an Active Directory domain or forest. ADREPLSTATUS displays data in a format that is similar to REPADMIN /SHOWREPL * /CSV imported into Excel but with significant enhancements. Expose Active Directory replication errors occurring in a domain or forest. Prioritize errors that need to be resolved in order to avoid the creation of lingering objects in Active Directory forests. Help administrators and support professionals resolve replication errors by linking to Active Directory replication troubleshooting content on Microsoft TechNet. Allow replication data to be exported to source or destination domain administrators or support professionals for offline analysis. Use FIPS 140 compliant cryptographic algorithms, including encryption, hashing and signing algorithms.Starting Price: Free -
17
TraceSRA
TraceSecurity
If you've tried completing your security risk assessment using tools or automated spreadsheets that you found online, you know how labor-intensive and difficult it can be to complete. Assigning risk scores to questions and identifying threats that correlate to those risks can be confusing, and the average user doesn't have the time to study and comprehend the methodology to perform this type of risk assessment correctly. If you're looking for a better, simpler solution to completing your SRA, you're in the right place. Be confident in building your security program, regulatory bodies present vague compliance requirements and the internet is littered with contradictory, low-value content. The fact is, you're responsible for your IT security and oftentimes it's difficult to get other key stakeholders to understand that responsibility. Use this tool to cut through the noise and easily communicate what is important to your organization. -
18
Cybersecurity risks are present due to hackers, wayward or careless employees, bad configuration settings, and even failing hardware. Misdiagnosing these risks often results in an expensive loss of data, so it's important to take stock of what's happening across your environment. Here's how Powertech Risk Assessor for IBM i helps to assess and mitigate cybersecurity risks. Powertech Risk Assessor for IBM i gathers detailed security data and compares your system settings to best practices in minutes. The simple, automated process saves system administrators from spending days preparing reports and makes the audit process more efficient. Government and industry security mandates, including PCI DSS and HIPAA, require annual assessments of security risks. Powertech Risk Assessor for IBM i is an independent, third-party assessment that enables you to meet these requirements.
-
19
BowTieXP
A-RisC
BowTieXP is a next generation risk assessment tool that uses the Bowtie Method to assess risks. BowTieXP is unique in its ability to visualise complex risks in a way that is understandable. The power of a BowTieXP diagram is that it gives you an overview of multiple plausible scenarios, in a single picture. In short, it provides a simple, visual explanation of a risk that would be much more difficult to explain otherwise. Where the power of BowTie is that is very easy to understand for everybody, from top management to shop floor, developing a good BowTie is a completely different story. It requires a good knowledge of the BowTie concept, an understanding of the guidelines and how to apply them and a good overview of the subject that is being assessed. -
20
AWS Config
Amazon
AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources. Config continuously monitors and records your AWS resource configurations and allows you to automate the evaluation of recorded configurations against desired configurations. With Config, you can review changes in configurations and relationships between AWS resources, dive into detailed resource configuration histories, and determine your overall compliance against the configurations specified in your internal guidelines. This enables you to simplify compliance auditing, security analysis, change management, and operational troubleshooting. AWS Config is designed to be your primary tool to perform configuration audit and compliance verification of both your AWS and third-party resources. You can publish the configuration of third-party resources such as GitHub repositories, Microsoft Active Directory resources, or any on-premises server into AWS.Starting Price: $0.001 per rule evaluation -
21
ClearGRC
Clear Infosec
ClearGRC helps you with Policy and Process Reviews, Exception Management, Compliance Management, Risk Management, Internal Control maintenance, Assessments, Notifications, Reminders, and Reports. For every known pain we built a simple feature that makes the job easier and far more professional. ClearGRC provides a centralized process to identify, assess, respond to, and continuously monitor Enterprise and IT risks that may negatively impact business operations. -
22
Triplebyte
Triplebyte
Accelerate sourcing, eliminate wasted onsites, and reduce time to hire with Triplebyte. Triplebyte is a directory of highly-skilled, technically-assessed software engineers. Search in our database of tens of thousands of developers, each with technical skills scores in their profile, to source candidates for your job openings. Triplebyte assesses every engineer's technical skills using advanced machine learning and adaptive techniques, trained on over 100K engineers with real hiring outcomes. This proprietary skills data lets you hire smarter, faster, and without bias. Triplebyte recommends the most relevant candidates by lining up the requirements of your open positions with the actual skills of candidates. Triplebyte is a highly engaged community of engineers. As a result, hiring companies experience more than three times the response rate on their outreach efforts to candidates, as compared to other services like LinkedIn Recruiter. -
23
RiskRecon
RiskRecon
Automated risk assessments tuned to match your risk appetite. Get the intimate risk performance assessments you need to efficiently manage your third-party risk. RiskRecon’s deep transparency and risk contextualized insights enable you to understand the risk performance of each vendor. RiskRecon’s workflow enables you to easily engage your vendors to realize good risk outcomes. RiskRecon knows a lot about your systems. Know what RiskRecon knows. Get continuous objective visibility of your entire internet risk surface, spanning managed, shadow and forgotten IT. RiskRecon knows a lot about your systems. Know what RiskRecon knows. Get continuous objective visibility of your entire internet risk surface, spanning managed, shadow and forgotten IT. See the intimate details of every system, the detailed IT profile and security configuration. We’ll even show you the data types at risk in every system. RiskRecon’s asset attribution is independently certified to 99.1% accuracy. -
24
CyberRiskAI
CyberRiskAI
Conduct cybersecurity risk audit with CyberRiskAI. We offer a fast, accurate, and affordable service for businesses that want to identify and mitigate their cybersecurity risks. Our AI-powered assessments provide businesses with valuable insights into potential vulnerabilities, enabling you to prioritize their security efforts and protect your company’s sensitive data. Comprehensive cybersecurity audit & risk assessment. All-in-one risk assessment tool and template. Uses the NIST cybersecurity audit framework. Quick and easy to set up and run, we offer a hands-off service. Automate your quarterly cybersecurity risk audit. Data gathered is confidential and stored securely. By the end of the audit, you’ll have all the information you need to mitigate your organization’s cybersecurity risks. With the valuable insights gained in potential vulnerabilities, you can prioritize your team’s security efforts to protect and mitigate cybersecurity risks.Starting Price: $49 -
25
ActiveView 360
SurveyConnect
ActiveView 360 is a fully-automated, configurable feedback tool for 360 degree assessments designed with HR, Talent Management and OD professionals in mind. Our team supports provides expert counsel to ensure that project objectives are met. Advice on the number of questions, internal communication process, and how to select raters is all part of our support process. Question libraries are also available if needed. ActiveView 360 minimizes time-consuming administrative tasks, allows for various types of email notifications that are project-specific, and shows multiple status reports to the assessment administrator. Assessment administrators can select specific report modules for a personalized individual report. Report module titles and introductions can be easily modified. Demographic and roll-up reports allow for group profiles to add another level of understanding.Starting Price: $500 one-time payment -
26
Forte HCM
Forte HCM
A talent mining tool that integrates with assessment data & engages users to search based on position profile or weights; compare candidate profiles, view standardized & ranked results. An assessment platform with a multitude of features like adaptive test authoring, customized tests, cyber- proctoring, collaborative interview, granular scoring & performance reporting across tests. Custom reports that add value in the decision making process with features like candidate compare & group analysis: used to compare candidate performances in a specific test or generate reports that are representative of the combined performances of the select group. We are a Talent acquisition infrastructure company. In addition to helping our clients build a qualified talent funnel, our patent pending platform with features like contextual search, proactive build, customizable assessments & cyber proctoring puts objectivity back in hiring!Starting Price: $59 per month -
27
Nessus
Tenable
Nessus is trusted by more than 30,000 organizations worldwide as one of the most widely deployed security technologies on the planet - and the gold standard for vulnerability assessment. From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk. Today, Nessus is trusted by more than 30,000 organizations worldwide as one of the most widely deployed security technologies on the planet - and the gold standard for vulnerability assessment. -
28
SACT (Self-Assessment Compliance Toolkit) by SwiftSafe is a comprehensive tool designed to help organizations stay compliant with major cybersecurity regulations like GDPR, HIPAA, PCI DSS, and ISO 27001. The platform simplifies compliance management by offering hassle-free assessments, real-time reporting, and automated updates on regulatory changes. SACT helps businesses generate instant audit reports, track security improvements, and maintain compliance without the need for costly consultations. With its user-friendly interface and 24/7 support, SACT streamlines the process, making it easy for businesses to meet their compliance obligations efficiently.Starting Price: $150
-
29
Migrator Pro for Active Directory is a highly secure and customizable Active Directory migration tool that lets you merge, consolidate, or restructure your Active Directory environment. You can keep users, devices, and applications in sync, adapt the tool to your unique requirements, and migrate remote workstations even when they aren’t connected to the corporate network. Migrator Pro for Active Directory (formerly Active Directory Pro) automates the restructuring, consolidation, and separation of Active Directory environments. This Active Directory migration tool synchronizes and migrates objects, settings, properties, workstations,s, and servers within and between AD forests–even if they’re disconnected or are on isolated networks. You can safely migrate during normal business hours as your users can keep working during the migration without interruption. Migrator Pro for Active Directory is highly secure as it does not use RPC or remote registry access.
-
30
Cetbix GRC & ISMS
Cetbix
In three steps, you can achieve information security self-assessment, ISO 27001, NIST, GDPR, NFC, PCI-DSS, HIPAA, FERPA, and more. Cetbix® ISMS strengthens your certification. Information security management system that is comprehensive, integrated, documents ready and paperless. Cetbix® online SaaS ISMS. ISMS software from Cetbix®. Other features include IT/OT Asset Management, Document Management, Risk Assessment and Management, Scada Inventory, Financial Risk, Software Implementation Automation, Cyber Threat Intelligence Maturity Assessment, and others. More than 190 enterprises worldwide rely on Cetbix® ISMS to efficiently manage information security and ensure ongoing compliance with the Data Protection Regulation and other regulations. -
31
Helical
Helical
Smarter, simpler, and comprehensive management of your company’s cybersecurity and data privacy programs. People, process, technology, supporting the three pillars of an effective cybersecurity program. Intuitive interfaces that surface the most important data with rich detail a click away. Our dashboard knits together best of breed solutions with our own proprietary technology to reduce security risks attributable to gaps across security products. Helical’s assessments and monitoring supports all security frameworks including FFIEC, NIST, and ISO frameworks, as well as applicable regulations and agency, SRO (e.g., SEC, CFTC, FINRA, HIPAA, PCI) and industry best practices. Helical can help enterprises with intrusion detection systems, malware detection, smarter security, it security audit, cloud security tools, cloud security solutions, security auditing, information security risk management, information security risk assessment, cybersecurity risk assessment, etc. -
32
The adoption of smart contracts has increased significantly since the launch of the Ethereum blockchain. Smart contracts are becoming more complex. They govern ownership of digital assets and drive key business logic. Greater transparency around the execution of decentralized finance (DeFi) transactions will increase confidence for companies, investors, and end-users. Identify common vulnerabilities and mitigate risks by utilizing customized tests to assess alignment with industry standards and best practices. Understand the expected outcome of the business logic within the smart contract’s code to assess the intended system design and functionality. Increase trust between counterparties in your DeFi ecosystem to help assess the validity of cryptocurrency tokens and smart contracts. Gain insights about the potential behavior of the token or smart contract’s functionality, security, compliance, and design implications.
-
33
Zoho Directory
Zoho
Zoho Directory is a cloud-based identity and access management platform designed to streamline authentication, authorization, and user management for organizations. It offers Single Sign-On (SSO) capabilities, allowing employees to access multiple applications with a single set of credentials, thereby enhancing security and user convenience. The platform supports Multi-Factor Authentication (MFA), adding an extra layer of protection against unauthorized access. Device authentication ensures secure access to both applications and devices, enabling employees to use the same credentials across platforms. Zoho Directory also provides robust provisioning features, allowing IT administrators to create and manage user profiles across various applications directly from the platform, reducing the time spent on repetitive tasks. Integration with existing directories, such as Microsoft Active Directory and Azure AD, is facilitated through directory stores.Starting Price: $1.70/user/month -
34
Perimeter
Perimeter
Our Mission Is Simple: Deliver painless, real-time vendor risk management through one integrated platform - from onboarding to assessment to continuous monitoring. We give teams the tools they need to automate assessments, validate vendor responses, monitor risk continuously, and respond to issues before they escalate - all without adding headcount, complexity, or overhead. We were founded to fix the inefficiencies and blind spots plaguing traditional VRM programs - programs that are too slow to scale, too manual to trust, and too fragmented to protect against real-world threats. -
35
Apptega
Apptega
Simplify cybersecurity and compliance with the platform that’s highest rated by customers. Join thousands of CISOs, CIOs, and IT professionals who are dramatically reducing the cost and burden of managing cybersecurity and compliance audits. Learn how you can save time and money, have great cybersecurity, and grow your business with Apptega. Go beyond one-time compliance. Assess and remediate within a living program. Confidently report with one click. Quickly complete questionnaire-based assessments and use Autoscoring to pinpoint gaps. Keep your customers’ data safe in the cloud and out of the hands of cybercriminals. Ensure your compliance with the European Union's official privacy regulation. Prepare for the new CMMC certification process to maintain your government contracts. Enjoy Enterprise-class capabilities paired with consumer app. Quickly connect your entire ecosystem with Apptega’s pre-built connectors and open API. -
36
RightChoice
RightChoice
RightChoice.ai is an AI-driven platform designed to enhance local business visibility across multiple directories, including Google, Bing, Apple, and over 20 others. It offers tools such as local keywords finder to identify relevant local search terms, AI content generation for optimized content creation, and profile protection to defend against unauthorized changes and Google updates. The platform also features a local heat map to discover customer interaction hotspots, a competitors tracker for monitoring local competitors, and an AI review auto-reply for generating contextual responses to customer reviews. Additionally, RightChoice.ai provides profile suspension risk assessment to evaluate listing vulnerabilities and business performance data tracking to monitor metrics like impressions, call clicks, and visits. These features collectively aim to improve local search rankings, customer engagement, and overall business performance.Starting Price: $19.30 per month -
37
Cognigram
Cognigram
Cognigram is a web-based system that automatically processes data to generate and deliver reports summarizing test results. On average, the Cognigram test takes about 10-15 minutes to complete. It is intended to aid healthcare professionals with an objective measurement of cognition for individuals aged 6 to 99 years old. Easy-to-read report for clinicians compares results to healthy age-matched individuals. Takes approximately 15 minutes to assess four cognitive domains. Results are automatically calculated. The four tests use playing cards to ask simple “yes” or “no” questions. Instructions and practice are presented for each. The Cognigram system can be used to assess cognition on a single occasion or cognitive change over periodic assessments. -
38
Proof&Trust
Proof&Believe LLC
We’ve dedicated 6 years to crafting the perfect algorithm for vendor risk assessment. This algorithm has been meticulously refined and enhanced with cutting-edge AI technologies, ensuring unparalleled accuracy and efficiency. Vendors provide evidence and answer 32 straightforward questions covering various aspects of their operations, compliance, and security measures. With our user-friendly interface, 95% of vendors complete the assessment in under 30 minutes, minimizing disruption to their operations. Our algorithm thoroughly analyzes vendor-provided evidence and responses, leveraging AI to identify risks, vulnerabilities, and compliance issues. Businesses receive a comprehensive report with actionable insights and recommendations, enabling informed decision-making and proactive risk management. -
39
Fine-grained rollback and recovery for Active Directory. Malicious or accidental changes to AD represent a significant security and performance risk. As the primary authentication and authorization service for the majority of IT systems, the importance of Active Directory (AD) integrity and availability is paramount. Rolling back or recovering changes – whether from human error or malicious intent – leveraging native AD capabilities is difficult at best, and in some cases impossible. While the AD Recycle Bin, when enabled, can recover a deleted object, Microsoft does not offer an out-of-the-box way to rollback changes to directory objects to a previous state. Netwrix Recovery for Active Directory enables organizations to quickly and easily rollback and recover unintended directory changes. e. Easily browse multiple snapshots and leverage granular full text search to effortlessly rollback and recover only the information that is required.
-
40
Breach Secure Now
Breach Secure Now!
Cybersecurity & HIPAA Compliance Training made easy for Managed Service Providers to automate, support, and empower employees to become the superhuman firewall that every business needs. With our automated, ongoing training programs, we give MSPs the tools and data they want, and their customers the instant insight they crave with our easy-to-understand Employee Secure Score (ESS). The Breach Prevention Platform (BPP) Subscription is a per client upgrade that provides continuous weekly micro training, simulated phishing attacks, security policies, a security risk assessment and our Employee Vulnerability Assessment (EVA). EVA helps clients identify which employees will cause the next data breach and allows them to take actions to lower the risk of data breaches. -
41
Jombay
Jombay
Designing & Administering an Assessment center could be complex Introducing Jombay’s Assessment Center Technology Platform! We have single dashboard for the assessment taker to access all these tools. We have integrated Assessor dashboards to rate candidates real-time. Assessors can choose associated Smart-text as a reference to populate the report and add their observations. Our platform publishes Analytics dashboard around group development areas. Seamless integration with tools from different Personality & Cognitive Assessment providers. Configure the competencies you want to measure. Select the assessment templates. Upload your assessment content (case studies, role plays etc.) Integrate any personality or cognitive assessment of your choice. Send out the links of the assessment taker dashboard to the candidate. Use the video technology platform and assessor dashboard to evaluate role plays, interviews and case studies -
42
EmployInsight
EmployInsight
EmployInsight combines Pre- Employment Screening with Psychometric Tests for a holistic profile of the candidate’s past and current behavior and performance. By leveraging this process, we assist you to predict the candidate’s future behavior, integrity, and performance in the world of work. Our cutting- edge approach can also be seen as a pro-active step in the mitigation of corruption, fraud, and bribery. We are therefore, the first and only Background Screening Company in South Africa to integrate Pre-Employment screening and Psychometric assessments in a holistic report. This is the fairest and most profound Pre – Employment Screening process for candidates and clients requiring this assessment. -
43
Examplify
ExamSoft
Our approach to improving assessments and learning outcomes is simple. We provide computer-based assessment software that collects assessment data and generates easy-to-apply reports to help educators improve course and student performance. Now you can tackle the biggest challenges in student assessment while providing the most secure testing environment possible. ExamSoft’s testing software, Examplify, provides students with a secure and stable exam environment for all assessment types. With plenty of in-exam tools such as question highlighting, answer choice cross-out, item flagging, and multiple alarms—Examplify makes assessment navigation a breeze. And since Examplify does not require an internet connection during the exam, students and educators can rest assured that work is safe and secure throughout the entire assessment process. -
44
eNetAssess
eCom Scotland
Organizations around the world are realizing that teaching, evaluating and assessing their audience are essential actions that can no longer be restricted to the confines of traditional, physical locations. Many organizations are transitioning from using the traditional assessment methods to using online assessment tools that not only benefit learners and instructors, but also organizations that embrace them. eNetAssess is our flexible online assessment platform for designing, delivering and managing online exams and assessments where integrity and security are paramount. eNetAssess offers a complete online assessment solution that includes test creation, question authoring, center management, scheduling, authentication, invigilation and verification, reporting and analytics and more. -
45
ProfileXT
Profiles International
Making the wrong talent decision is costly. No one enjoys dealing with high turnover, especially when it can cost up to 30% (or more!) of an employee's first-year salary, and it compromises your organization's ability to succeed. The PXT Select™ and ProfileXT® assessments provide your organization with objective, reliable, and accurate data so you can confidently hire, manage, and retain high-performing employees. Whether you are hiring remote or in person, these assessments will give you the insight you need to hire and retain the best talent for your organization. As a comprehensive, “full person” assessment, the PXT Select assessment measures how well a candidate fits specific jobs in an organization by assessing three key areas that help predict future job success. Paired with its job-matching feature, the PXT Select assessment enables organizations to evaluate an individual relative to the qualities required to perform a job successfully. -
46
DragonSoft DVM
DragonSoft Security Associates
The DVM detection project includes security vulnerability detection, vulnerability audit detection, account and setting audit detection, and supports risk assessment and statistics functions. It also has a database scanner to support database vulnerability detection and security risk assessment. D-GCB can detect the information and communication software of government agencies and units to test whether the endpoint device conforms to the TW GCB configuration settings, thereby reducing the risk of internal computer attacks and avoiding information security concerns. Hyper EDR can detect more than 5000 kinds of popular APT malware and hacking tools. This threat-aware mode does not require any Kernel Driver operation and consumes almost no extra CPU resources. -
47
RateYourCyber
RateYourCyber
RateYourCyber is an enterprise-grade cybersecurity maturity platform that delivers professional assessments, strategic implementation roadmaps, and continuous monitoring—without enterprise-level costs. It enables organizations to evaluate their security posture across eight key domains using a comprehensive 1,000-point assessment framework. The platform provides clear, board-ready reports, actionable 3-year improvement plans, and compliance documentation aligned with industry and regulatory standards. With continuous vulnerability scanning and automated tracking, users can maintain real-time awareness of their security maturity and risk exposure. Unlike traditional consulting or complex GRC systems, RateYourCyber simplifies cybersecurity management through guided steps and plain-English reporting. Designed for growing organizations, it makes achieving and demonstrating security maturity accessible, affordable, and measurable.Starting Price: £799 -
48
Capti Voice
Capti Voice
An all-in-one reading solution for everyone to assess, accommodate, and advance reading. Capti offers tools that enable educators to assess reading proficiency and accommodate all learners in classroom, remote, or hybrid settings. A reading assessment for elementary and beyond, tested and normed for grades 3-12. Choose what skills to assess and reassess as needed, one skill, two, or all six at once. Difficulty level is automatically personalized on a per-skill basis. Understand the areas of strength and weakness to drive instruction. Get nationally normed percentiles and grade level equivalency. Get score profiles, interpretations, and RTI Tier 1-3 suggestions. Use level-appropriate instructional activity recommendations. Benchmark all students 2-3 times a year remotely or in person, synchronously or asynchronously. Diagnose the foundational skills with Subtests, and monitor progress and evaluate the effectiveness of your intervention on specific skills every 4 weeks. -
49
JANUSEC Privacy
JANUSEC
JANUSEC Privacy, provides an accountability framework and on-premise IT solutions for privacy compliance governance, including records of processing activities, privacy impact assessments, asset security assessments, control measures, etc., to help enterprises demonstrate privacy compliance with accountability (GDPR, CCPA etc.). Records of Processing Activities (GDPR Article 30). PIA (Privacy Impact Assessment) or DPIA (Data Protection Impact Assessment, GDPR Article 35). Data classification, demonstrate compliance with accountability (GDPR Article 5). JANUSEC Privacy, provides an accountability framework and on-premise IT solutions for privacy compliance governance, including records of processing activities, privacy impact assessments, asset security assessments, control measures, etc., to help enterprises demonstrate privacy compliance with accountability (GDPR etc.).Starting Price: $299/month -
50
Alexio Inspector
Alexio Corporation
Alexio™ Inspector was specifically designed for healthcare practices to find IT security gaps and vulnernabilities and provide recommendations on how to fix them. Even if you have an IT company currently monitoring your network, our 3rd party assessment will allow you to see how well they’ve protected you and identify blind-spots. An annual security risk assessment is the best way to keep data safe from ransomware, hacking, data theft, and employee mistakes. Alexio inspector always finds security gaps, and that's the point. Find and fix the gaps before you become a victim. Get a full report of your hardware, software, backup, and network status. Plus, you'll get a risk management plan consultation with a Certified Cybersecurity Professional. Thorough check of hundreds of system parameters, vulnerabilities, risks, and specifications.