App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Integrated Risk Management Software - Page 4

Last updated: January 2025

AvatarImg
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.
Filter results


Integrated with


Pricing model




User rating


176 software options

Case IQ logo

Detect, Investigate, and Prevent.

learn more
Case IQ is the leading investigative case management software for ethics and compliance, HR, fraud, and corporate security within mid-sized and large organizations. Case IQ’s omnichannel case intake and advanced analytics increases the capacity and efficiency of workplace investigation teams.

Read more about Case IQ

Users also considered
Vantage Software logo

Software for managing incidents, risks, and compliance

learn more
Vantage Software offers a robust platform for Incident, Risk, Compliance, and Facilities Management. It tracks and reports on incidents, safety procedures, risks, audits, quality, targets, feedback, CQC evidence, policies, contracts, staff concerns, training, compliance, fire and equipment assessments, assets, events, contractors, vehicles, and maintenance. It also secures ASB, allegations, sensitive data, safeguarding, and community safety.

Read more about Vantage Software

Users also considered
ePSM logo

Ammonia safety and compliance made easy

learn more
ePSM offers a cloud-based solution designed to meet OSAH and EPA compliance obligations for Ammonia refrigeration safety and process safety management.

Read more about ePSM

Users also considered
Aeneis logo

Aeneis is a tool for managing business processes

learn more
Aeneis enables companies to manage business processes with the support of software. The application has many features, including an auto-layout function designed to accelerate the creation of models. Users can access the program via a BPM portal.

Read more about Aeneis

Users also considered
COSHH365 logo

Manage chemical risk and prevent accidents in your workplace

learn more
COSHH365 protects any company that uses hazardous substances that endanger people within their team. The system was developed to reach and maintain compliance to UK COSHH regulations.

Read more about COSHH365

Users also considered
MyVCM logo

Integrated risk management platform for SMBs

learn more
MyVCM by Ostendio is an integrated risk management platform designed to help SMBs operate their cybersecurity programs. MyVCM offers organizations the tools they need to perform security audits, manage incidents, establish security controls, configure risk alerts, and more.

Read more about MyVCM

Users also considered
Phinity logo

Automating peace of mind

learn more
We integrate the Phinity platform into your risk management processes to automate your risk identification, assessing and reporting. We take you through the last mile; the Phinity platform automates the management of your risk treatment process to effectively implement your treatment plans.

Read more about Phinity

Users also considered
S2Vendor logo

Solutions to secure your information

learn more
SecurityStudio is a vendor risk management tool designed to streamline third-party information security risk management programs through an automated workflow, including vendor list import, vendor relationship management, renewal scheduling, S2SCORE risk assessments, built-in metrics, and more.

Read more about S2Vendor

Users also considered
EQS Integrity Line logo

Integrated risk and incident management software

learn more
EQS Integrity Line is an integrated risk management software designed to help businesses manage cases regarding unethical behavior and misconduct across workplaces. The platform enables whistleblowers to anonymously report and communicate with legal teams on details related to incidents.

Read more about EQS Integrity Line

Users also considered
Decision Time Risks logo

Enterprise risk management solution

learn more
Decision Time Risks is a cloud-based risk management solution that enables users to assess, control, & manage risks on a centralized platform. It allows users to create categories to report, group, & filter risks, score descriptions to identify risk types, & assign accountable owners for actions.

Read more about Decision Time Risks

Users also considered
Cyberday logo

Your ISMS for cyber compliance and defence management

learn more
Cyberday as your modern turnkey solution: No matter if you want to improve your cyber defence, be certification ready, or comply with legal regulation, everything is managed under one roof - in a single solution. Our software works directly as app in your trusted MS Teams environment.

Read more about Cyberday

Users also considered
Strike Graph logo

Web-based cybersecurity compliance certification software

learn more
Strike Graph software is a SaaS platform for building compliance to help speed up the certification process for companies. Its main features are risk assessment, assigning controls, and creating cybersecurity programs to match company needs. The software is suitable for risk managers and auditors.

Read more about Strike Graph

Users also considered
Centralpoint logo

Digital experience platform & content management solution

learn more
Centralpoint by Oxcyon is a digital experience platform & content management solution for enterprises. The cloud-based tool allows users to control knowledge, data, documents, forms, emails, learning, compliance, & more whilst also providing features for managing employees, clients & partners.

Read more about Centralpoint

Users also considered
Camms GRC logo

Redefine the way you pursue opportunity and manage risk.

learn more
Make the right business decisions with an easy to use solution that provides a comprehensive integrated approach to governance, risk and compliance.

Read more about Camms GRC

Users also considered
BIC GRC logo

Governance, risk and compliance management software platform

learn more
BIC GRC lets you digitalize your GRC processes professionally, sustainably, and cost-effectively. Depending on your business model, you can choose from a fast-to-implement, pre-built solution or a BIC Custom GRC solution tailored to your specific requirements.

Read more about BIC GRC

Users also considered
ISMS.online logo

Compliance and risk management solution

learn more
ISMS.online helps hundreds of companies around the world with their information security, data privacy and other compliance needs. ISMS.online simplifies the process of getting compliant with a range of standards and regulations, including ISO 27001, GDPR, ISO 27701 and many more.

Read more about ISMS.online

Users also considered
Battleground logo

Business continuity and crisis management solution

learn more
Battleground is an online and mobile based resilience solution focussed on BCM, crisis, emergency and incident management.

Read more about Battleground

Users also considered
Vendor360 logo

Cloud-based third-party vendor risk management software

learn more
Vendor360 is risk management software designed to help businesses assess, track and mitigate risks across third-party vendors and streamline evaluation, selection, and onboarding processes. It offers a centralized vendor directory to manage vendor information including documents and risk profiles.

Read more about Vendor360

Users also considered
RSA Archer Suite logo

IT & Security Risk Management platform

learn more
Archer IT & Security Risk Management is a cloud-based platform that helps businesses maintain compliance and manage, investigate, and resolve technological risks. It enables users to record and report on security vulnerabilities, audit findings, regulatory obligations and more.

Read more about RSA Archer Suite

Users also considered
Matrix Requirements logo

Spend your time building Medical Devices, not on paperwork!

learn more
Matrix Requirements is a Quality, Requirements, Application Lifecycle, Risk & Test Management Systems for Medical Devices, plus an ISO13485 and ISO2700 certified company.

Read more about Matrix Requirements

Users also considered
Analytica logo

Build models visually: The way you think

learn more
Analytica is a decision-support platform that helps people visualize problems with clarity and power beyond what is possible with spreadsheets. Existing use cases include strategic planning, research, financial planning, energy modeling, constraint optimization and Monte Carlo analysis.

Read more about Analytica

Users also considered
TrustMAPP Platform logo

Cybersecurity performance management platform

learn more
TrustMAPP is a cybersecurity performance management platform that leverages recommendations sized to an organization's needs to quantify their cybersecurity roadmap and remediation priorities. It provides capabilities for maturity or compliance assessment, automated improvement recommendations, analytics to inform strategy, cross-mapping analytics, workflow, and integrations.

Read more about TrustMAPP Platform

Users also considered
Aperitisoft logo

Enterprise risk management software

learn more
Aperitisoft is a cloud-based, flexible, and configurable risk management system that helps companies put risk management processes into practice. It can be configured to support the already established risk management workflows across the organizations, or it can be customized to create and implement a new risk management process.

Read more about Aperitisoft

Users also considered
Risk Warden logo

Compliance under control.

learn more
Risk Warden is a cloud-based software platform that provides a digital framework to manage all your property risk and compliance, from compliance governance to data capturing through to analysis and everything in between, providing you with a single source of truth.

Read more about Risk Warden

Users also considered
eTHIC logo

Audit management software

learn more
eTHIC is a software tool that helps businesses manage the ethical risks and opportunities they face in their daily operations.

Read more about eTHIC

Users also considered