Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • StandardFusion Reviews & Ratings
    88 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • Hyperproof Reviews & Ratings
    228 Ratings
    Company Website
  • Terranova Security Reviews & Ratings
    221 Ratings
    Company Website
  • Onspring Reviews & Ratings
    169 Ratings
    Company Website
  • Hoxhunt Reviews & Ratings
    4,064 Ratings
    Company Website
  • myACI Learn Reviews & Ratings
    368 Ratings
    Company Website
  • CBT Nuggets Reviews & Ratings
    440 Ratings
    Company Website
  • NINJIO Reviews & Ratings
    390 Ratings
    Company Website
  • Resolver Reviews & Ratings
    246 Ratings
    Company Website

What is securityprogram.io?

Tailored security solutions for small businesses provide a robust foundation for cybersecurity. Effortlessly create an audit-ready framework while ensuring that high-quality security measures are accessible to smaller enterprises. Our aim is to help these businesses develop credible security programs that enhance their market competitiveness. These resources are particularly beneficial for startups navigating a dynamic environment, as they are crafted to support rapid growth. With a comprehensive set of tools and expert assistance, you can pursue your ambitions with greater confidence. Our offerings include document templates and integrated training that facilitate practical improvements to security while demonstrating compliance with established standards. The journey towards a resilient security program begins with the assessment and implementation of pertinent security policies. We have crafted clear guidelines that align with NIST 800-53 standards, providing transparency regarding your coverage. Furthermore, we connect our program activities with other frameworks, such as SOC 2, ISO 27001, NIST CSF, CIS 20, and CMMC, ensuring that your investment in security initiatives and client relationships is recognized. By employing our solutions, small businesses can enhance their security posture while retaining the agility necessary to succeed in today's competitive market. Ultimately, our commitment is to empower you with the tools and knowledge needed to navigate the complexities of cybersecurity effectively.

What is Diligent Risk Intelligence Data?

We are excited to unveil an advanced tool that enables automated, real-time tracking and searching of negative news, as well as information related to watchlists, sanctions, and politically exposed individuals. This innovative solution allows organizations to effectively reduce risks associated with reputation management, anti-money laundering (AML), and financial crimes. Utilizing cutting-edge machine learning and relevancy scoring, Diligent’s monitoring and search capabilities provide accurate and timely insights into negative news and risk factors. Our system can screen against over 1,400 watchlists, sanctions, and embargoes in real time, making our screening capabilities second to none. Furthermore, the automated oversight of sanctions, watchlists, and state-owned entities significantly bolsters your risk management frameworks. We take pride in our ability to map beneficial ownership while identifying potential risks in critical scenarios for both customers and vendors. Our unwavering commitment to providing a secure and robust service guarantees the protection of our clients' data at all times. Adhering to the NIST Cybersecurity Framework, Diligent’s Security Program complies with ISO/IEC 27001 standards, employing a thorough Information Security Management System (ISMS) to effectively safeguard information assets. This security dedication not only strengthens our offerings but also reassures our clients about the confidentiality and integrity of their sensitive information. Additionally, our proactive approach to risk management ensures that organizations will be well-equipped to navigate the complexities of today's financial landscape.

Media

Media

Integrations Supported

Amazon Web Services (AWS)
GitHub
Google Cloud Platform
Microsoft Azure

Integrations Supported

Amazon Web Services (AWS)
GitHub
Google Cloud Platform
Microsoft Azure

API Availability

Has API

API Availability

Has API

Pricing Information

$99 one-time payment
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Jemurai

Date Founded

2012

Company Location

United States

Company Website

www.jemurai.com/securityprogram-io/

Company Facts

Organization Name

Diligent

Date Founded

1998

Company Location

United States

Company Website

www.diligent.com/products/risk-intelligence-data

Categories and Features

Security Awareness Training

Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library

Categories and Features

Financial Risk Management

Compliance Management
Credit Risk Management
For Hedge Funds
Liquidity Analysis
Loan Portfolio Management
Market Risk Management
Operational Risk Management
Portfolio Management
Portfolio Modeling
Risk Analytics Benchmarks
Stress Tests
Value At Risk Calculation

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Popular Alternatives

Popular Alternatives