Cetbix GRC & ISMSCetbix
|
||||||
Related Products
|
||||||
About
The most comprehensive, yet easiest-to-use Audit, Risk and Compliance Management SaaS solution in the market.
Best-in-class, fully integrated SOX, ERM, Issues, PBCs, Certifications, Flowcharting, Document and Resource & Project Management and more.
Unlimited Controls, Risk Frameworks and Cross-Functional Capabilities.
Fastest to implement (2-4 weeks) and Best-in-Class support by experts.
All-inclusive, Fixed Pricing delivering over 600% ROI.
Role-model predictable execution through world-class collaboration, real-time visibility, reporting and team productivity.
Built by Audit & Risk Leaders for Audit & Risk Leaders.
|
About
In three steps, you can achieve information security self-assessment, ISO 27001, NIST, GDPR, NFC, PCI-DSS, HIPAA, FERPA, and more. Cetbix® ISMS strengthens your certification. Information security management system that is comprehensive, integrated, documents ready and paperless. Cetbix® online SaaS ISMS. ISMS software from Cetbix®. Other features include IT/OT Asset Management, Document Management, Risk Assessment and Management, Scada Inventory, Financial Risk, Software Implementation Automation, Cyber Threat Intelligence Maturity Assessment, and others. More than 190 enterprises worldwide rely on Cetbix® ISMS to efficiently manage information security and ensure ongoing compliance with the Data Protection Regulation and other regulations.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Internal Audit Director, Internal Audit Manager, Enterprise Risk Director, Compliance Professional
|
Audience
Organizations in need of an information security management system
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationAudit Prodigy
Founded: 2016
United States
auditprodigy.com
|
Company InformationCetbix
Founded: 2019
United Kingdom
www.cetbix.com/products/cetbixismssoftware
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
GDPR Compliance Features
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Integrated Risk Management Features
Audit Management
Compliance Management
Dashboard
Disaster Recovery
Incident Management
IT Risk Management
Operational Risk Management
Risk Assessment
Safety Management
Vendor Management
Audit Features
Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management
Compliance Features
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
Incident Management
ISO Compliance
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
GRC Features
Auditing
Disaster Recovery
Environmental Compliance
Incident Management
Internal Controls Management
IT Risk Management
Operational Risk Management
Policy Management
|
GDPR Compliance Features
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Integrated Risk Management Features
Audit Management
Compliance Management
Dashboard
Disaster Recovery
Incident Management
IT Risk Management
Operational Risk Management
Risk Assessment
Safety Management
Vendor Management
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
|
|||||
|
|
|