Ratings and Reviews 1 Rating

Total
ease
features
design
support

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Resolver Reviews & Ratings
    273 Ratings
    Company Website
  • Hyperproof Reviews & Ratings
    277 Ratings
    Company Website
  • Predict360 Reviews & Ratings
    18 Ratings
    Company Website
  • Carbide Reviews & Ratings
    88 Ratings
    Company Website
  • HSI Donesafe Reviews & Ratings
    149 Ratings
    Company Website
  • Borealis Reviews & Ratings
    11 Ratings
    Company Website
  • Interfacing Enterprise Process Center (EPC) Reviews & Ratings
    63 Ratings
    Company Website
  • Guardz Reviews & Ratings
    99 Ratings
    Company Website
  • Cloudflare Reviews & Ratings
    1,882 Ratings
    Company Website
  • Intelex Reviews & Ratings
    161 Ratings
    Company Website

What is TrustMAPP?

TrustMAPP® stands at the forefront of Cybersecurity Performance Management. Recognized by Gartner as a top contender in both Cybersecurity Performance Management and Cybersecurity Maturity Assessments, TrustMAPP is utilized by organizations worldwide. It empowers information security leaders to effectively measure, quantify, and communicate significant control performance, while also tracking improvement initiatives, forecasting investment needs, and crafting narratives for executive stakeholders. The platform offers remediation guidance tailored to individual controls based on their maturity scores and outlines both resource and financial investments to anticipate future cybersecurity funding requirements. Furthermore, TrustMAPP delivers the decision science and forecasting tools essential for enhancing cybersecurity discussions in the boardroom. With its dynamic analytics and reporting capabilities, information security leaders can align their efforts with crucial business objectives. This innovative approach provides a new way for information security leaders to communicate with business stakeholders who may be unfamiliar with the complexities of cybersecurity program management, ensuring that the conversation remains relevant and engaging.

What is Perimeter?

Perimeter VRM is a next-generation Vendor Risk Management platform engineered to make vendor oversight seamless, intelligent, and continuous. It automates the full VRM lifecycle—onboarding, risk assessment, monitoring, verification, and reporting—through an integrated system powered by AI and data extraction technology. The platform goes beyond self-attestations by validating vendor claims across multiple independent data sources, reducing the reliance on manual audits. With 24/7 continuous monitoring, organizations gain real-time insight into their vendors’ evolving security postures, including early alerts for breaches or compliance gaps. Perimeter’s built-in AI extraction engine scans evidentiary documentation, pulling key intelligence for validation and audit readiness automatically. Its Respond feature streamlines RFP and questionnaire responses, while Share ensures secure document exchange between vendors and stakeholders. Deployable in less than a week and requiring no technical expertise, Perimeter offers the fastest time-to-value in the VRM market. Its customizable workflows and reporting capabilities adapt to complex enterprise requirements without additional integrations. Built with AI guardrails and designed for risk professionals, it enhances accuracy, transparency, and trust throughout the supply chain. By merging automation, monitoring, and intelligence, Perimeter delivers true end-to-end vendor risk management that’s both effortless and accountable.

Media

Media

Integrations Supported

Cisco Secure Cloud Analytics
Jira

Integrations Supported

Cisco Secure Cloud Analytics
Jira

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

TrustMAPP

Date Founded

2019

Company Location

United States

Company Website

trustmapp.com

Company Facts

Organization Name

Perimeter

Date Founded

2017

Company Location

United States

Company Website

perimeter.net

Categories and Features

Business Performance Management

Ad Hoc Reports
Ad hoc Analysis
Budgeting & Forecasting
Consolidation / Roll-Up
Dashboard
Key Performance Indicators
Predictive Analytics
Qualitative Analysis
Quantitative Analysis
Scorecarding
Strategic Planning

Compliance

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Integrated Risk Management

Audit Management
Compliance Management
Dashboard
Disaster Recovery
IT Risk Management
Incident Management
Operational Risk Management
Risk Assessment
Safety Management
Vendor Management

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Categories and Features

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Popular Alternatives

Popular Alternatives

CyberStrong Reviews & Ratings

CyberStrong

CyberSaint Security
STREAM Integrated Risk Manager Reviews & Ratings

STREAM Integrated Risk Manager

Acuity Risk Management