getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Integrated Risk Management Software with Audit Trail (2026) - Page 4

Last updated: March 2026

Verified reviewer profile picture
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.
1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


127 software options

MyVCM logo

Integrated risk management platform for SMBs

learn more
MyVCM by Ostendio is an integrated risk management platform designed to help SMBs operate their cybersecurity programs. MyVCM offers organizations the tools they need to perform security audits, manage incidents, establish security controls, configure risk alerts, and more.

Read more about MyVCM

Users also considered
S2Vendor logo

Solutions to secure your information

learn more
SecurityStudio is a vendor risk management tool designed to streamline third-party information security risk management programs through an automated workflow, including vendor list import, vendor relationship management, renewal scheduling, S2SCORE risk assessments, built-in metrics, and more.

Read more about S2Vendor

Users also considered
Zazoon logo

GRC automation tool

learn more
We aim to serve anyone with the highest quality advisory and ISO 27001-certified technical cloud solution who faces pain in fulfilling legal and regulatory obligations and is in touch with compliance, legal or auditing responsibilities. We support SMEs through MNEs and are based in the DACH region.

Read more about Zazoon

Users also considered
Decision Time Risks logo

Enterprise risk management solution

learn more
Decision Time Risks is a cloud-based risk management solution that enables users to assess, control, & manage risks on a centralized platform. It allows users to create categories to report, group, & filter risks, score descriptions to identify risk types, & assign accountable owners for actions.

Read more about Decision Time Risks

Users also considered
Cyberday logo

Your ISMS for cyber compliance and defence management

learn more
Cyberday as your modern turnkey solution: No matter if you want to improve your cyber defence, be certification ready, or comply with legal regulation, everything is managed under one roof - in a single solution. Our software works directly as app in your trusted MS Teams environment.

Read more about Cyberday

Users also considered
Strike Graph logo

Web-based cybersecurity compliance certification software

learn more
Strike Graph software is a SaaS platform for building compliance to help speed up the certification process for companies. Its main features are risk assessment, assigning controls, and creating cybersecurity programs to match company needs. The software is suitable for risk managers and auditors.

Read more about Strike Graph

Users also considered
Centralpoint logo

Digital experience platform & content management solution

learn more
Centralpoint by Oxcyon is a digital experience platform & content management solution for enterprises. The cloud-based tool allows users to control knowledge, data, documents, forms, emails, learning, compliance, & more whilst also providing features for managing employees, clients & partners.

Read more about Centralpoint

Users also considered
Camms GRC logo

Cloud-based GRC platform for risk and assurance.

learn more
Camms (GRC) is a cloud-based governance, risk, and compliance (GRC) solution that helps businesses in healthcare, manufacturing, construction, and other industries manage workplace health, internal and external audits, third-party risks, and more. The platform offers a suite of tailored solutions to address an organization's priorities. This includes integrated risk management, cyber and IT risk management, compliance management, social and governance (ESG) planning, and more.

Read more about Camms GRC

Users also considered
Matrix Requirements logo

Spend your time building Medical Devices, not on paperwork!

learn more
Risk management needs to be integrated in the design process and the quality system, not in some Excel file on some server. With Matrix Requirements, the risks are part of the traceability matrix.

Read more about Matrix Requirements

Users also considered
ISMS.online logo

Compliance and risk management solution

learn more
ISMS.online is a cloud-based compliance management platform that empowers organizations to achieve and maintain compliance with most standards including ISO 27001, SOC 2, GDPR, NIST, and more. Designed for experienced, well-informed business software users, the platform offers a detailed and complex set of features to streamline the compliance process. ISMS.online platform provides risk management capabilities, allowing users to manage all their business risks in one centralized location.

Read more about ISMS.online

Users also considered
Battleground logo

Business continuity and crisis management solution

learn more
Battleground is an online and mobile based resilience solution focussed on BCM, crisis, emergency and incident management.

Read more about Battleground

Users also considered
Vendor360 logo

Cloud-based third-party vendor risk management software

learn more
Vendor360 is risk management software designed to help businesses assess, track and mitigate risks across third-party vendors and streamline evaluation, selection, and onboarding processes. It offers a centralized vendor directory to manage vendor information including documents and risk profiles.

Read more about Vendor360

Users also considered
eTHIC logo

eTHIC GRC & Audit Platform

learn more
eTHIC is a powerful software solution that helps businesses identify, manage, and monitor risks and opportunities in their daily operations, ensuring responsible decision-making without compromising business goals.

Read more about eTHIC

Users also considered
Drata logo

Cloud-based compliance and audit management software

learn more
Designed for businesses of all sizes, Drata is a cloud-based compliance management software that allows users to monitor risk assessments, create treatment plans, and streamline auditing processes.

Read more about Drata

Users also considered
Protecht ERM logo

Complete Risk and Compliance management solutions (GRC).

learn more
Dynamically manage all your risks in a single platform, including: Risks, Compliance, Health and Safety, Internal Audit, Incidents and KRIs.

Read more about Protecht ERM

Users also considered
Risk Warden logo

Compliance under control.

learn more
Risk Warden is a cloud-based software platform that provides a digital framework to manage all your property risk and compliance, from compliance governance to data capturing through to analysis and everything in between, providing you with a single source of truth.

Read more about Risk Warden

Users also considered
TenForce logo

EHSQ platform to manage operational risks

learn more
TenForce provides an EHSQ platform that helps organizations manage operational risks through integrated modules for incident management, audits, and compliance tracking. The software combines document control with action tracking capabilities, enabling teams to streamline processes and maintain regulatory compliance across manufacturing, pharmaceutical, and food industries.

Read more about TenForce

Users also considered
Ideagen Risk Management logo

Centralize risk for full visibility, control and reporting.

learn more
Ideagen Risk Management is a complete system for recording, monitoring and reporting risk across your organization.

Companies that use Ideagen Risk Management are able to demonstrate compliance with ISO 31000 because it gives them a way to directly connect risks to specific objects.

Read more about Ideagen Risk Management

Users also considered
Beakon logo

Highly configurable EHS, risk safety and compliance solution

learn more
Risk safety and compliance solution for businesses of all sizes, specializing in contractor management, safety and e-learning

Read more about Beakon

Users also considered
CODA Footprint logo

Multi-tenant vulnerability & contextual risk management tool

learn more
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.

Read more about CODA Footprint

Users also considered
Vision logo

Risk, compliance, asset, and audit management software

learn more
Vision Pro is a cloud-based integrated risk management software solution that allows businesses to manage all their statutory risk compliance, assets, fire risk, audit, building condition and legionella compliance responsibilities - all from one secure, online location.

Read more about Vision

Users also considered
SafeBase logo

The leading Trust Center for friction-free security reviews

learn more
SafeBase is the leading trust center platform designed for friction-free security reviews. With our enterprise-grade Trust Center Platform, we automate the security review process and transform how you communicate your trust posture.

Read more about SafeBase

Users also considered
Isora GRC logo

The easier way to conduct GRC assessments

learn more
GRC Assessment Platform for Enterprice Cyber Risk, Regulatory Compliance, and Vendor Risk.

Read more about Isora GRC

Users also considered
TrustLayer logo

Insurance tracking and compliance management software

learn more
TrustLayer is third-party risk management and COI tracking powered by AI

Read more about TrustLayer

Users also considered
The CyberStrong Platform logo

Automated, Intelligent Cyber Compliance and Risk Management

learn more
CISOs rely on CyberStrong to achieve real-time cyber/IT risk management and continuous compliance from assessment to Boardroom. CyberStrong uses risk quantification, intuitive workflows, patented AI, and executive reports to build cyber resilience through measurement and communication.

Read more about The CyberStrong Platform

Users also considered