IT risk management software protects business data against all risks associated with the use of software and hardware. This type of software is used to identify, assess, and mitigate IT risks across all business entities of a company. IT risk management solutions also help companies ensure the security and privacy of customer or supplier data. Organizations use IT risk management to comply with governmental regulations and internal policies related to data security. This type of software is implemented by IT departments and can be used by all employees. IT risk management can be deployed as part of a broader governance, risk, and compliance system.
IT risk management systems need to consolidate data from multiple sources and integrate with solutions for IT infrastructure, IT management, and security. When deployed as a standalone product, IT risk management software integrates with governance, risk, and compliance software and other risk management software.
To qualify for inclusion in the IT Risk Management category, a product must:
IT Risk Management reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
CIMCON Software is the leading provider of Model risk and EUC risk management software. Our solutions help to minimize the likelihood of errors and sensitive data loss in end-user controlled applications (EUC or UDA). This includes Excel spreadsheets, Access databases and other modeling tools. CIMCON Software has been consistently recognized as the industry standard in end-user controlled computing risk management & compliance, helping hundreds of the world’s largest organizations.
Lime Software puts your business back in control of your Oracle Licensing. Helping you understand your compliance position, manage your risks and maintain accurate reporting of actual usage of all Oracle Technology . Lime does not require any infrastructure to deploy, no middleware or databases are required. Inventory turn around in days not months (Zero Footprint)
Reduce risk, prevent fraud and meet regulatory compliance requirements through a highly extensible and flexible platform that delivers unparalleled fraud protection.
Citicus ONE enables organizations to measure and manage the risk posed by the IT systems, suppliers, sites and other key assets and processes on which they depend, using a methodology that reflects over 25 years of research into the factors that drive risk up or down and those which make risk programmes successful.
One platform for global privacy needs. Clym is the data privacy platform that helps organisations meet their data protection obligations. Manage cookies, policies, procedures, terms & data subjects requests while automatically building evidence through consent receipts. Features: Cookie Consent Management Make consent easier. Capture or withdraw cookie consent in a clear, unambiguous and ongoing way, at any moment. Consent Receipts Proving compliance is just as important as being compliant. We help you demonstrate compliance by generating a Consent Receipt whenever a user performs a new consent action. Subjects’ Requests Empower users to enforce their legal rights. Collect, Track and Manage subjects’ requests related to their rights and get notified when new requests are submitted, so you can act on them on a timely manner. Documents Management Manage Terms, Policies, Agreements & Procedures. Simplify and streamline policy management, adaptable by jurisdiction. Create and manage agreements and procedures in accordance with privacy legislation. Organisation & DPO Data Management Build trust and show transparency by creating a public organisation profile that includes both organisation and DPO contact information. Localisation Keep your doors open to all parties, regardless of their location, as we provide flexible setup per country. This gives users a choice of their prefered language and you the option of managing policies individually for different jurisdictions. Through all its functionalities, Clym provides a head start in data privacy compliance. Benefits: - Gain customer trust. Display transparency and grow your business by showing your customers you respect their rights and care about their privacy. - Save time on your compliance process. Clym’s 10 minute integration and pre-built GDPR processes allow you to focus on your business while working through compliance requirements. - Avoid risk. Clym helps you minimise the risk of being fined, losing customer data or business to a minimum through encryption, anonymisation and control. - Prove compliance. Rest assured you're covering GDPR's principle of accountability through consent receipts published in Clym's ledger and a fully audited system. - Make consent easier. Don’t overwhelm your customers with time-consuming GDPR processes. Clym makes consent management a breeze, while allowing them to withdraw consent at any moment. - Keep your doors open to European customers. Europe’s new privacy law is changing the face of business, but is no reason for you to give up on your EU customers. We help you keep them close. - Minimise your GDPR compliance costs. Keep your IT resources focused on the projects that truly move the needle for your organisation. We provide an enterprise product for an affordable monthly payment. - You focus on your business. We focus on compliance. We optimise for compliance by keeping a close eye on data privacy legislation around the world, so you can focus on what matters most: your business.
The Control app provides organizations with the ability to identify and manage sensitive information that could cause harm if it violates internal policies or is leaked externally. Control is built on top of Connected Capture for specific channels and includes feature controls/message blocking, alerts, ethical walls, and the ability to add disclaimers.
As adoption increases so does the complexity associated with securing, administering and governing your SharePoint environment. While out-of-the-box tools may initially be suitable, managing your SharePoint environment quickly becomes a time consuming and daunting task. Even the simplest of activities can consume significant portion of your most precious asset, time. Even then, most organizations do not get the information they need to support governance processes and ensure that SharePoint has been successfully deployed within their organization. Metalogix ControlPoint provides the necessary control without taking away from the freedom that users have come to expect when using SharePoint. ControlPoint provides support for securing, automating repetitive administrative tasks and providing the tools necessary to govern your SharePoint environment.
Enterprise Reporter Suite helps you keep your Microsoft environment, both on premises and cloud-based, secure and compliant. Comprehensive access assessments and built-in reporting provide deep visibility into Active Directory (AD)/Azure AD, Exchange/Exchange Online, Office 365, Azure, OneDrive for Business, Windows Servers, SQL Servers and NAS/SAN storage, including Azure resources, users, groups, permissions and other configurations.
From the financial to the scientific, anyone who faces uncertainty in their quantitative analyses can benefit from @RISK. @RISK helps both Fortune 100 companies and private consultancies paint a realistic picture of possible scenarios. This allows businesses to not only buffer risks, but also identify and exploit opportunities for growth.
Symantec Shared Service Provider PKI provides an SSP PKI service and a complementary Card Management System to comply with HSPD-12 and FIPS 201. Federal agencies can leverage Symantec's highly available and scalable Internet-based infrastructure to help ensure the availability of their mission-critical strong authentication services
TrustMAPP is not a classic GRC tool but rather a maturity and risk performance platform. TrustMAPP is designed to solve the top key challenges faced by security teams and those leaders responsible for the security and compliance program. The top challenges solved by TrustMAPP include: 1. Determining how much is enough with regard to the security program performance 2. Prioritization of resources to areas of greatest impact 3. Prioritization of capital budget to areas if greatest impact 4. Consistent and repeatable KPI's effectively communicating security and risk performance to business leadership For a personalized demonstration please visit: https://trustmapp.com/information-security-dashboard-free-trial/