Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Guardz Reviews & Ratings
    118 Ratings
    Company Website
  • Predict360 Reviews & Ratings
    18 Ratings
    Company Website
  • Reflectiz Reviews & Ratings
    29 Ratings
    Company Website
  • Source Defense Reviews & Ratings
    7 Ratings
    Company Website
  • D&B Risk Analytics Reviews & Ratings
    80 Ratings
    Company Website
  • cside Reviews & Ratings
    33 Ratings
    Company Website
  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    104 Ratings
    Company Website
  • Captain Compliance Reviews & Ratings
    201 Ratings
    Company Website
  • Safetica Reviews & Ratings
    414 Ratings
    Company Website
  • HSI Donesafe Reviews & Ratings
    155 Ratings
    Company Website

What is Kroll Compliance?

Relationships with third parties, including customers and partners, present a range of legal, reputational, and compliance hurdles for your organization. The Kroll Compliance Portal provides essential tools to effectively navigate these risks on a comprehensive scale. To accurately gauge relative risk, a deeper analysis may be required. Lengthy back-and-forth email communications with analysts and the manual handling of files can significantly reduce your operational efficiency, result in gaps in the audit trail, and increase the risk of information security breaches. By streamlining your due diligence process, you can eliminate the chaos of excessive emails and cumbersome file storage; the Kroll Compliance Portal introduces a structured approach to managing these tasks. Compliance initiatives often become overwhelming due to tedious manual processes or inflexible software, yet the Workflow Automation feature of the Kroll Compliance Portal allows you to change that scenario for the better. Your organization needs an efficient third-party onboarding process that includes accurate risk assessments. With the Kroll Compliance Portal Questionnaire, you can speed up onboarding through automated tracking and scoring that fits your unique risk framework, ultimately conserving both time and resources. Thus, the Kroll Compliance Portal not only boosts operational efficiency but also strengthens your compliance strategy as a whole, ensuring a more robust approach to managing third-party relationships.

What is Cyber360?

Enhance your cybersecurity assessments and expand your practice to serve a broader range of clients by utilizing a premier cloud solution. Accurately identify, analyze, and resolve cybersecurity weaknesses while ensuring full transparency and oversight throughout the process. Employ a comprehensive, ready-to-implement, yet flexible framework of workflows and controls that fosters adaptability and enhances operational effectiveness. Create a structured cybersecurity evaluation strategy that aligns precisely with the unique needs of your organization. Gain a deeper insight into your organization's risk landscape across different business sectors, external collaborators, and geographical locations. Consolidate the gathering and storage of all evaluations, documentation, policies, and identified issues into a single repository for better organization. Proactively manage exceptions through the utilization of analytics, alerts, and collaborative efforts among team members. Embark on your journey with pre-built, industry-standard assessment templates, or opt to upload your tailored questionnaires for customization. Various assessment formats, including self-assessments and on-site reviews, are available to meet the diverse requirements of different businesses. This all-encompassing strategy not only empowers you to tackle cybersecurity challenges effectively but also facilitates the scaling of your operations, ensuring long-term success. Ultimately, taking such a comprehensive approach can significantly bolster your organization's resilience against evolving cyber threats.

Media

Media

Integrations Supported

Adobe Marketo Engage
Blend
Dropbox
Elpha Secure
HubSpot CRM
HubSpot Customer Platform
Jira
Microsoft Dynamics 365
Microsoft SharePoint
NetSuite
Oracle Cloud Infrastructure
Oracle Siebel CRM
SAP Cloud Platform
SAP Concur
SAP SuccessFactors
Salesforce
Sugar Connect
Twilio
Workday Extend
Zuora

Integrations Supported

Adobe Marketo Engage
Blend
Dropbox
Elpha Secure
HubSpot CRM
HubSpot Customer Platform
Jira
Microsoft Dynamics 365
Microsoft SharePoint
NetSuite
Oracle Cloud Infrastructure
Oracle Siebel CRM
SAP Cloud Platform
SAP Concur
SAP SuccessFactors
Salesforce
Sugar Connect
Twilio
Workday Extend
Zuora

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Kroll

Date Founded

1972

Company Location

United States

Company Website

kroll.com

Company Facts

Organization Name

CENTRL

Date Founded

2015

Company Location

United States

Company Website

www.centrl.ai/products/cyber-security-risk-assessment-software/

Categories and Features

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Popular Alternatives

Popular Alternatives

CyberStrong Reviews & Ratings

CyberStrong

CyberSaint Security