getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Gordon Security Checklist Logo

Security assessment and remediation platform

Table of Contents

usersusersusers

Is this product right for your business?

Find out with a

Gordon Security Checklist - 2026 Pricing, Features, Reviews & Alternatives

Verified reviewer profile picture
Verified reviewer profile picture

All user reviews are verified by in-house moderators and provider data by our software research team.  Learn more

Last updated: April 2026

Gordon Security Checklist overview

What is Gordon Security Checklist?

Gordon Security Checklist is an automated security assessment and compliance management platform developed by Mitigata. It conducts a sixty point evaluation across an organization’s technology infrastructure. The platform is designed for enterprises in regulated industries such as financial services, healthcare, manufacturing and technology. It ensures alignment with frameworks including the National Institute of Standards and Technology cybersecurity framework, ISO twenty seven thousand one, CIS Controls and Indian regulations such as the Reserve Bank of India IT framework, Securities and Exchange Board of India guidelines, Insurance Regulatory and Development Authority of India standards and the digital personal data protection act.

The platform automates assessment across eight security domains including identity and access management, endpoint security, network security, data protection, incident response, backup and recovery, cloud security and security awareness. Identity and access management checks evaluate enforcement of multi factor authentication, privileged access controls and password policies. Endpoint security assessments review detection and response capabilities, patch management processes and encryption coverage. Network security checks analyze firewall configurations, network segmentation and virtual private network settings. Data protection evaluations cover data loss prevention measures, data classification and encryption at rest arrangements. Incident response reviews examine incident response plans, playbooks and tabletop exercises. Backup and recovery verifications assess backup frequency, restoration testing practices and recovery objectives. Cloud security examinations review identity and access configurations, benchmarked misconfigurations and logging practices. Security awareness measurements track training completion, phishing simulation outcomes and policy acknowledgements.

Each check receives a weighted score based on risk impact. Critical checks carry greater weight. Scores are assigned as pass for full compliance, partial for incomplete implementation and fail for non compliance. Domain scores aggregate into an overall security score ranging from zero to one hundred. Continuous monitoring reruns the assessment every thirty days to track score trends and alert on declines. The prioritised remediation roadmap ranks failed checks by risk impact and remediation effort. Each remediation task includes step by step instructions, an estimated effort in hours and an assessment of risk reduction value. Peer benchmarking provides comparative analysis of security scores by industry vertical, revenue band and geographic region to identify performance relative to sector medians and top performers.

The platform integrates with enterprise environments through read only API connections to platforms such as Microsoft three hundred sixty five via Microsoft Graph API, Google Workspace through the Admin SDK and cloud providers including Amazon Web Services, Microsoft Azure and Google Cloud Platform via read only identity and access management roles. This approach requires no agent installation or firewall modifications and accesses only configuration metadata. Setup completes in twenty to thirty minutes. The platform generates security posture reports suitable for board level review and audit ready evidence packs with a single action. Reports include overall scores, domain breakdowns, trend analyses and peer comparisons. Framework specific mapping reports align assessment checks with ISO twenty seven thousand one controls, Reserve Bank of India IT requirements, Securities and Exchange Board of India guidelines and digital personal data protection act obligations to support audit preparation. A built in AI module generates compliance documentation, risk narratives, remediation playbooks and executive summaries.

Starting price

1787flat rate /
per month

Gordon Security Checklist’s user interface

Ease of use rating:

Gordon Security Checklist reviews

Overall rating

empty-state-img

No reviews

Rating breakdown
  • Value for money
  • Ease of use
  • Features
  • Customer support
  • Likelihood to recommend0.00/10
Rating distribution

5

4

3

2

1

0

0

0

0

0

Gordon Security Checklist's key features

Most critical features, based on insights from Gordon Security Checklist users:

Activity tracking
Assessment management
Audit management
Audit trail
Compliance tracking
Data security
Data visualization
Incident management
Monitoring
Policy management

All Gordon Security Checklist features

Activity tracking
Assessment management
Audit management
Audit trail
Compliance tracking
Data security
Data visualization
Incident management
Monitoring
Policy management
Regulatory intelligence feeds
Regulatory reporting
Risk management

Gordon Security Checklist pricing

Pricing plans

Pricing details:

Free plan
Free trial
Subscription

Startup

1,787

Per month

Features included:

  • Core Security
  • GRC And Insurance In One Platform

Mid-Market Plan

3,382

Per month

Features included:

  • Expanded Limits Across All Modules

Enterprise Plan

6,607

Per month

Features included:

  • Unlimited Scale
  • Dedicated Support
  • Custom SLAs

User opinions about Gordon Security Checklist price and value

Value for money rating:

Gordon Security Checklist support options

Typical customers

Freelancers
Small businesses
Mid size businesses
Large enterprises

Platforms supported

Web
Android
iPhone/iPad

Support options

Email/Help Desk
Knowledge Base
Phone Support
Chat

Training options

Live Online
Webinars
Documentation

Gordon Security Checklist FAQs

Q. Who are the typical users of Gordon Security Checklist?

Gordon Security Checklist has the following typical customers:
Freelancers, Small Business, Mid-size Business, Large Enterprises


Q. What level of support does Gordon Security Checklist offer?

Gordon Security Checklist offers the following support options:
Email/Help Desk, Knowledge Base, Phone Support, Chat

Related categories