App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Governance, Risk & Compliance (GRC) Software - Page 7

338 software options

Sponsored

Filter results

Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

JupiterOne logo

JupiterOne

5.0
(5)

Security & Compliance. At the Speed of DevOps.

learn more
Maintain complete visibility across your digital environments leveraging the graph-based, API-powered and data-driven JupiterOne. Simplify compliance evidence collection, shorten the time between findings and remediation and manage configuration of your critical resources.

Read more about JupiterOne

Users also considered
Position Green logo

Position Green

4.3
(9)

ESG Transformation Software

learn more
Identify potential ESG risks and opportunities for potential investments and within the existing portfolio. Access a structured methodology for metrics and assessment aligned with regulatory requirements and reporting initiatives to better understand where additional action plans are required.

Read more about Position Green

Users also considered
Vendor360 logo

Vendor360

4.6
(7)

Cloud-based third-party vendor risk management software

learn more
Vendor360 is risk management software designed to help businesses assess, track and mitigate risks across third-party vendors and streamline evaluation, selection, and onboarding processes. It offers a centralized vendor directory to manage vendor information including documents and risk profiles.

Read more about Vendor360

Users also considered
Portnox CLEAR logo

Portnox CLEAR

4.1
(11)

Network security and access control software

learn more
Portnox’s cloud-native network & endpoint security essentials enable resource-constrained IT teams to address today’s most pressing security challenges.

Read more about Portnox CLEAR

Users also considered
SecurityScorecard logo

SecurityScorecard

4.4
(8)

The global leader in cybersecurity ratings

learn more
SecurityScorecard is the global leader in cybersecurity ratings, helping thousands of organizations of all types and sizes gain instant visibility into their own security posture and that of their third parties.

Read more about SecurityScorecard

Users also considered
BIC GRC logo

BIC GRC

4.8
(5)

Governance, risk and compliance management software platform

learn more
BIC GRC lets you digitalize your GRC processes professionally, sustainably and cost-effectively. Depending on your business model, you can choose from a fast-to-implement, pre-built solution or a BIC Custom GRC solution tailored to your specific requirements.

Read more about BIC GRC

Users also considered
Sapience Vue logo

Sapience Vue

4.1
(9)

Business performance management and analytics software

learn more
Sapience Vue is a data analytics software that helps organizations track performance, assess risks, monitor compliance, and more on a centralized platform. Supervisors can compare data in real time to ensure team and department productivity is in line with predefined business goals and overall KPIs.

Read more about Sapience Vue

Users also considered
Secureframe logo

Secureframe

5.0
(4)

Automate SOC 2, ISO 27001, HIPAA and PCI DSS compliance

learn more
Secureframe helps organizations manage their governance, risk, and compliance by streamlining SOC 2 and ISO 27001. We monitor 40+ services to manage risk, and can get you compliant in weeks, rather than months!

Read more about Secureframe

Users also considered
ZEBSOFT logo

ZEBSOFT

5.0
(4)

Governance, risk, and compliance (GRC) management software

learn more
ZEBSOFT platform takes a holistic approach and combines all the principles of Risk Management into one platform. All the modules are included in a single system. THE ONE SYSTEM FOR FULL GRC CONTROL. ZEBSOFT helps you to control & communicate risk & compliance effectively across any organisation.

Read more about ZEBSOFT

Users also considered
HID SAFE logo

HID SAFE

4.5
(6)

Physical Identity & Access Management

learn more
Seamlessly Enforce Physical Security Policy
Synchronize identity management and physical access controls globally. Automate internal policy enforcement by integrating business, physical, and IT systems.

Read more about HID SAFE

Users also considered
Compliance Manager GRC logo

Compliance Manager GRC

3.8
(13)

Web-based governance, risk management & compliance solution

learn more
Compliance Manager GRC is online governance, risk management, and compliance solution designed to help businesses reduce risk and meet industry, regulatory, or internal security requirements without adding staff or stretching your already thin budget. It gives you greater confidence that the information security programs you’ve put into place are actually working – and generates the documentation to prove it. Whether you work for an organization or an MSP, Compliance Manager GRC makes compliance

Read more about Compliance Manager GRC

Users also considered
Risk Warden logo

Risk Warden

4.6
(5)

Compliance under control.

learn more
Risk Warden is a cloud-based software platform that provides a digital framework to manage all your property risk and compliance, from compliance governance to data capturing through to analysis and everything in between, providing you with a single source of truth.

Read more about Risk Warden

Users also considered
Protecht.ERM logo

Protecht.ERM

4.6
(5)

Complete Risk and Compliance management solutions (GRC).

learn more
Access the complete suite of GRC modules. Suitable for the needs of all stages of risk and compliance management maturity.

Read more about Protecht.ERM

Users also considered
Cyanic HSE logo

Cyanic HSE

4.9
(4)

A cloud based electronic HSE software for SMBs

learn more
Cyanic is a cloud-based customizable health, safety and environment (HSE) software for SMBs that can be used on desktops, android devices, iPhone and iPad

Read more about Cyanic HSE

Users also considered
Sprinto logo

Sprinto

4.8
(4)

Move fast without breaking things

learn more
Sprinto makes it easy to comply with the business compliance requirements. It helps you follow the best practices when it comes to meeting the compliance requirements. Solve your compliance problems with minimum effort and without any manual intervention.

Read more about Sprinto

Users also considered
Persona logo

Persona

4.8
(4)

Identity Verification Management

learn more
Persona helps businesses of all sizes easily and securely manage fully compliant KYC, AML, and identity verification programs.

Read more about Persona

Users also considered
Cyberday logo

Cyberday

4.4
(5)

Your ISMS for cyber compliance and defence management

learn more
Cyberday as your modern turnkey solution: No matter if you want to improve your cyber defence, be certification ready, or comply with legal regulation, everything is managed under one roof - in a single solution. Our software works directly as app in your trusted MS Teams environment.

Read more about Cyberday

Users also considered
Ideagen Internal Audit logo

Ideagen Internal Audit

4.2
(6)

Automation solution for risk-based auditing

learn more
Pentana is an audit automation solution for risk-based auditing, offering risk assessment analysis & summarization, automated reporting, action tracking & more

Read more about Ideagen Internal Audit

Users also considered
CODA Footprint logo

CODA Footprint

5.0
(3)

Multi-tenant vulnerability & contextual risk management tool

learn more
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.

Read more about CODA Footprint

Users also considered
Beakon logo

Beakon

5.0
(3)

Highly configurable EHS, risk safety and compliance solution

learn more
Risk safety and compliance solution for businesses of all sizes, specializing in contractor management, safety and e-learning

Read more about Beakon

Users also considered
CLUE#ZO logo

CLUE#ZO

5.0
(3)

CLUE#ZO is the digital and anonymous whistleblowing system

learn more
CLUE#ZO is a digital, cloud-based, and multilingual whistleblowing service. This solution is for small businesses to enterprise companies to comply with EU-directive 2019/ 1937. It helps to avoid reputational damage and financial losses for your organization. It is GDPR compliant, easy and secure.

Read more about CLUE#ZO

Users also considered
condignum logo

condignum

5.0
(3)

Cloud-based compliance management solution

learn more
condignum is a cloud-based compliance management solution designed to help businesses of all sizes and industries handle security requirements and risks. It allows administrators to automatically evaluate complex issues using knowledge databases within the platform.

Read more about condignum

Users also considered
Opsware Data logo

Opsware Data

5.0
(3)

The no-code data privacy platform for the modern enterprise.

learn more
Demonstrate and automate compliance for GDPR, CCPA/CPRA, Colorado CPA, and Virginia's CDPA. Build trust with your customers. Simplify & scale privacy at your business.

Read more about Opsware Data

Users also considered
CleanCloud by SEK logo

CleanCloud by SEK

5.0
(3)

A cloud computing management tool

learn more
CleanCloud is a cloud computing management tool that offers integration with Azure, AWS, and Google Cloud. It provides an overview of vulnerable items, analyzes all cloud resources, monitors critical assets, and performs audits that detail each identified event. Available in Portuguese and English.

Read more about CleanCloud by SEK

Users also considered
GDPR Register logo

GDPR Register

5.0
(3)

GDPR compliance tool that will save your time. 14-day trial

learn more
GDPR Register is a cloud-based solution, which helps businesses in retail, banking, healthcare, and other sectors manage GDPR documentation via data processing, breach management, contract lifecycle tracking, and more. The solution offers various features such as activity tracking, pre-made templates, reporting, data import/export, and agreement management. GDPR Register also ensures data protection and security via encryption, authentication, audit trails, and vulnerability scanning.

Read more about GDPR Register

Users also considered