App comparison
Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Our commitment
Independent research methodology
Our researchers use a mix of verified reviews, independent research, and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.
Verified user reviews
GetApp maintains a proprietary database of millions of in-depth, verified user reviews across thousands of products in hundreds of software categories. Our data scientists apply advanced modeling techniques to identify key insights about products based on those reviews. We may also share aggregated ratings and select excerpts from those reviews throughout our site.
Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI.
How GetApp ensures transparency
GetApp lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. GetApp is free for users. Software providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider’s website.

Gordon Security Checklist
Security assessment and remediation platform
Table of Contents



Is this product right for your business?
Find out with a
Gordon Security Checklist - 2026 Pricing, Features, Reviews & Alternatives


All user reviews are verified by in-house moderators and provider data by our software research team. Learn more
Last updated: April 2026
Gordon Security Checklist overview
What is Gordon Security Checklist?
Gordon Security Checklist is an automated security assessment and compliance management platform developed by Mitigata. It conducts a sixty point evaluation across an organization’s technology infrastructure. The platform is designed for enterprises in regulated industries such as financial services, healthcare, manufacturing and technology. It ensures alignment with frameworks including the National Institute of Standards and Technology cybersecurity framework, ISO twenty seven thousand one, CIS Controls and Indian regulations such as the Reserve Bank of India IT framework, Securities and Exchange Board of India guidelines, Insurance Regulatory and Development Authority of India standards and the digital personal data protection act.
The platform automates assessment across eight security domains including identity and access management, endpoint security, network security, data protection, incident response, backup and recovery, cloud security and security awareness. Identity and access management checks evaluate enforcement of multi factor authentication, privileged access controls and password policies. Endpoint security assessments review detection and response capabilities, patch management processes and encryption coverage. Network security checks analyze firewall configurations, network segmentation and virtual private network settings. Data protection evaluations cover data loss prevention measures, data classification and encryption at rest arrangements. Incident response reviews examine incident response plans, playbooks and tabletop exercises. Backup and recovery verifications assess backup frequency, restoration testing practices and recovery objectives. Cloud security examinations review identity and access configurations, benchmarked misconfigurations and logging practices. Security awareness measurements track training completion, phishing simulation outcomes and policy acknowledgements.
Each check receives a weighted score based on risk impact. Critical checks carry greater weight. Scores are assigned as pass for full compliance, partial for incomplete implementation and fail for non compliance. Domain scores aggregate into an overall security score ranging from zero to one hundred. Continuous monitoring reruns the assessment every thirty days to track score trends and alert on declines. The prioritised remediation roadmap ranks failed checks by risk impact and remediation effort. Each remediation task includes step by step instructions, an estimated effort in hours and an assessment of risk reduction value. Peer benchmarking provides comparative analysis of security scores by industry vertical, revenue band and geographic region to identify performance relative to sector medians and top performers.
The platform integrates with enterprise environments through read only API connections to platforms such as Microsoft three hundred sixty five via Microsoft Graph API, Google Workspace through the Admin SDK and cloud providers including Amazon Web Services, Microsoft Azure and Google Cloud Platform via read only identity and access management roles. This approach requires no agent installation or firewall modifications and accesses only configuration metadata. Setup completes in twenty to thirty minutes. The platform generates security posture reports suitable for board level review and audit ready evidence packs with a single action. Reports include overall scores, domain breakdowns, trend analyses and peer comparisons. Framework specific mapping reports align assessment checks with ISO twenty seven thousand one controls, Reserve Bank of India IT requirements, Securities and Exchange Board of India guidelines and digital personal data protection act obligations to support audit preparation. A built in AI module generates compliance documentation, risk narratives, remediation playbooks and executive summaries.
Starting price
per month
Gordon Security Checklist’s user interface
Gordon Security Checklist reviews
Overall rating
No reviews
- Value for money
- Ease of use
- Features
- Customer support
- Likelihood to recommend0.00/10
5
4
3
2
1
0
0
0
0
0
Gordon Security Checklist's key features
Most critical features, based on insights from Gordon Security Checklist users:
All Gordon Security Checklist features
Gordon Security Checklist pricing
Pricing plans
Pricing details:
User opinions about Gordon Security Checklist price and value
Value for money rating:
Gordon Security Checklist support options
Typical customers
Platforms supported
Support options
Training options
Gordon Security Checklist FAQs
Gordon Security Checklist has the following typical customers:
Freelancers, Small Business, Mid-size Business, Large Enterprises
Q. What level of support does Gordon Security Checklist offer?
Gordon Security Checklist offers the following support options:
Email/Help Desk, Knowledge Base, Phone Support, Chat
