Best IT Risk Management Software in New Zealand - Page 2

Find and compare the best IT Risk Management software in New Zealand in 2025

Use the comparison tool below to compare the top IT Risk Management software in New Zealand on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    SecurityScorecard Reviews
    SecurityScorecard has established itself as a frontrunner in the field of cybersecurity risk assessments. By downloading our latest resources, you can explore the evolving landscape of cybersecurity risk ratings. Delve into the foundational principles, methodologies, and processes that inform our cybersecurity ratings. Access the data sheet for an in-depth understanding of our security rating framework. You can claim, enhance, and continuously monitor your personalized scorecard at no cost, allowing you to identify vulnerabilities and develop strategies for improvement over time. Initiate your journey with a complimentary account and receive tailored recommendations for enhancement. Obtain a comprehensive overview of any organization's cybersecurity status through our detailed security ratings. Furthermore, these ratings can be utilized across various applications such as risk and compliance tracking, mergers and acquisitions due diligence, cyber insurance assessments, data enrichment, and high-level executive reporting. This multifaceted approach empowers organizations to stay ahead in the ever-evolving cybersecurity landscape.
  • 2
    ReadiNow Reviews
    ReadiNow’s no-code, agile governance, risk, and compliance platform empowers your team with management tools that facilitate the automation and modification of various processes as required. Enhance your team's productivity while seamlessly connecting your data to enable in-depth analysis, yielding valuable insights for reports and strategic decisions at the board level. You can create stunning, enterprise-grade applications without the need for technical expertise or coding skills. With a straightforward drag-and-drop interface, you can effortlessly design forms, reports, dashboards, workflows, and integrate them with your existing systems. Leverage the visual workflow builder to automate any business process, bringing your applications to life with ease. Transform your extensive data into actionable insights through custom reporting and integrated data analytics. Effortlessly generate invoices, status reports, project plans, timesheets, or any document format using real-time data. Additionally, your applications can be instantly deployed on any mobile device, ensuring you have continuous access to your information while on the move. This adaptability allows teams to remain dynamic and responsive to changing business needs.
  • 3
    VGS Platform Reviews

    VGS Platform

    Very Good Security

    The VGS Vault allows users to securely store their tokenized data. This secures your most sensitive data. There is nothing to be stolen in the event of a breach. It's impossible to hack what isn't there. VGS is the modern approach in data security. Our SaaS solution allows you to interact with sensitive and regulated data while avoiding the responsibility of protecting it. You can see the interactive example of how VGS transforms data. You can choose to hide or show data by choosing Reveal or Redact. VGS can help you, whether you're a startup looking for best-in-class security or an established company seeking to eliminate compliance as a barrier to new business. VGS assumes the responsibility of protecting your data, eliminating any risk of data breaches, and reducing compliance overhead. VGS layers protection on the systems for companies that prefer to vault their data. This prevents unauthorized access and leakage.
  • 4
    BC in the Cloud Reviews

    BC in the Cloud

    Infinite Blue

    $60 per user per month
    BC in the Cloud is a software-as-a-service solution designed to create and sustain an efficient business continuity and disaster recovery program. For those just starting their programs, BC in the Cloud provides a comprehensive, ready-to-use option that includes pre-designed templates and workflows to address all necessary components, facilitating a swift onboarding process and rapid deployment. For organizations with more mature programs, the platform allows for extensive customization and configuration of workflows tailored to specific requirements. We handle the infrastructure and updates, enabling you to concentrate on what truly matters for your business. Additionally, our system ensures that your business continuity plans and vital data remain accessible, even in the event of a data center failure. Your organization can jump right in with our ready-made templates and strategies, while still retaining the flexibility to modify fields and implement changes as necessary. Our platform is designed to evolve alongside your organization's needs, and with its development led by industry professionals, it serves as a comprehensive tool for both continuity planning and disaster recovery efforts. This adaptability ensures that no matter how your business grows or changes, BC in the Cloud will continue to support you effectively.
  • 5
    Apparity Reviews
    Apparity is a powerful platform that helps manage end-user computing (EUC), with a phenomenal customer service. Apparity is designed for identifying, inventorying, assessing and controlling the end-user applications that support critical business processes. This includes spreadsheets and models, databases, programming languages scripts, BI Tools, and more. Our software platform provides enterprise-wide visibility through a complete auditing of all EUC activities. How do we achieve this? It's simple. You can manage your EUC inventory effectively and maintain regulatory compliance with accurate file tracking and versioning. After implementation, users will enjoy enhanced collaboration and process automation.
  • 6
    SafePaaS Reviews
    SafePaaS provides reliable solutions tailored to address Governance, Risk, and Compliance (GRC) challenges specific to various industries. By utilizing SafePaaS Industry Controls Solutions, organizations can enhance their profit margins while reducing the risks associated with operational losses across sectors such as Consumer Goods, Education, Energy, Financial Services, Health Care, High Tech, Life Sciences, Manufacturing, Media & Entertainment, Public Sector, Retail, Transportation, Construction, and Banking. This platform enables companies to transition from a reactive or informal GRC management style to a more proactive and predictive approach by embedding controls within key business processes. Additionally, SafePaaS Process Controls Solutions cater to vital business domains, including Financial Management, Order Management, Procure-to-Pay Management, and Supply Chain Management. Furthermore, SafePaaS stands out as a comprehensive GRC platform that integrates ERP Application Controls Management across all major ERP systems, ensuring a holistic approach to governance and compliance. This integration not only streamlines operations but also fortifies risk management strategies across the enterprise.
  • 7
    Pirani Reviews

    Pirani

    Pirani

    $19,000 per year
    Software that helps companies to identify, prevent, and control the risks of money laundering and terrorist financing. Pirani AML Suite can segment clients based upon similar transactional behavior and monitor operations that may seem suspicious. It also allows it to detect fraud or money laundering in real time by monitoring any financial transaction that is made in any transactional channel. Your company can be exposed to money laundering and terrorist financing if you have controls in place. Request a tour of our solution to learn more about how we can help you. Compliance with regulations and other circulars relating to the implementation of a LAFT-related risk system. To determine the integrity of the data, the client must first identify the data. The client's information on a single screen to allow for analysis of the alerts.
  • 8
    Kovrr Reviews
    Quantum is an innovative platform for cyber risk quantification (CRQ) that offers a range of functionalities and services aimed at helping organizations interpret cyber risk in terms of its impact on business operations. Tailored for CISOs, Chief Risk Officers, and board members, Quantum empowers users to gain insight into the effectiveness of their cybersecurity initiatives while evaluating the potential benefits of future investments aimed at risk reduction. This platform also facilitates the development of robust risk transfer strategies, allowing companies to secure more advantageous terms for their cyber insurance policies. Users can leverage the security control ROI calculator to gain clarity on the financial advantages associated with enhancing their cybersecurity measures. By quantifying cyber risk in financial terms, Quantum enhances the decision-making capabilities of boards and C-Suites, enabling them to prioritize and justify cybersecurity expenditures based on their potential business impacts and risk mitigation outcomes. Furthermore, the platform allows organizations to evaluate the ROI of their cybersecurity efforts and conduct stress tests based on various risk mitigation strategies, ultimately leading to more effective resource allocation and strategic planning. With Quantum, businesses are equipped to proactively manage cyber risks while aligning their cybersecurity investments with overarching business goals.
  • 9
    Powertech Compliance Monitor for IBM i Reviews
    Compliance reporting for IBM i should not be overly complicated. Streamline the process of generating reports across your iSeries environments with ease. Compliance Monitor brings together audit and security information from various systems into one cohesive report, which not only saves your organization valuable time but also reduces costs. It provides auditors with the necessary information without the added expense or risks associated with creating custom reporting solutions. Featuring a user-friendly web interface and adaptable filters, you can customize and present data precisely as auditors need it. Transform vast amounts of IBM i data into actionable reports that aid system administrators in pinpointing areas for enhancing security through our compliance monitoring software. Additionally, you can efficiently retrieve and archive the essential audit data while conserving storage space. With Compliance Monitor’s log aggregation design, audit journal data can be accessed and stored in a highly compressed manner on a centralized system, ensuring optimal efficiency and ease of access. This ensures that your compliance efforts are not just effective but also sustainable in the long run.
  • 10
    Perium Reviews

    Perium

    Perium BV

    $500
    Perium stands out as a highly accessible platform designed for comprehensive risk management solutions. This all-encompassing platform allows users to swiftly access an intuitive and adaptable system for managing risks and generating reports. With Perium, you can effortlessly comply with various standards related to security, privacy, and digital resilience, ensuring the protection of sensitive data belonging to employees, customers, suppliers, and your organization in a fast, straightforward, and intelligent manner. As the platform evolves, it continually incorporates new standards to enhance its offerings, including ISO27001, ISO27002, BIO, NEN7510, NTA7516, NEN7512, NEN7513, ISO27701, HKZ, ISO9001, ISO50001, DigiD, DNB Good Practice, BIC, ISQM, PCI-DSS, Suwinet, Wpg, IBP Onderwijs, NIS2 Directive, DORA, PIMS, ISMS, NCSC Handreiking, NIST CSF, NIST AI, NVZ Gedragslijn, Cloud Control Matrix, and Horizontaal Toezicht. As a result, users can expect an ever-expanding array of compliance options that keeps pace with the evolving landscape of risk management and regulatory requirements.
  • 11
    SmartProfiler for M365 Reviews

    SmartProfiler for M365

    Dynamicpacks

    $2,499 per tenant
    The SmartProfiler assessment for Office 365 is an automated solution aimed at enhancing the health and security of your Microsoft Office 365 environment by conducting thorough health and risk evaluations. It adheres to the CIS workbench controls along with additional assessments crafted by specialists in Office 365. Founded with the goal of improving cyber defense, the Center for Internet Security is a nonprofit organization that collaborates with cybersecurity and IT experts from various sectors worldwide. This organization is dedicated to identifying, developing, validating, and promoting best practice solutions for securing digital environments. Their standards and best practices, including CIS benchmarks and controls, are created through a consensus-driven approach. SmartProfiler is specifically tailored to align with the CIS standards applicable for assessments in both Office 365 and Azure, ensuring that organizations can effectively measure and enhance their security posture in these platforms. By leveraging this comprehensive assessment tool, businesses can proactively address vulnerabilities and bolster their overall cybersecurity strategies.
  • 12
    TrustCloud Reviews

    TrustCloud

    TrustCloud Corporation

    Stop getting overwhelmed by countless vulnerability alerts from your security systems. Instead, bring together data from your cloud, on-premises, and custom applications, integrating it with information from your security tools, to consistently evaluate the effectiveness of controls and the operational health of your complete IT landscape. Align control assurance with business consequences to identify which vulnerabilities to address first. Leverage AI and automated APIs to enhance and streamline risk assessments for first-party, third-party, and nth-party scenarios. Automate the evaluation of documents to obtain contextual and trustworthy insights. Conduct regular, systematic risk assessments across all internal and external applications to eliminate the dangers of relying on isolated or infrequent evaluations. Transition your risk register from being a manual spreadsheet to a dynamic system of predictive risk assessments. Continuously track and project your risks in real-time, allowing for IT risk quantification that can illustrate financial implications to stakeholders, and shift your approach from merely managing risks to actively preventing them. This proactive strategy not only strengthens your security posture but also aligns risk management with broader business objectives.
  • 13
    Whistic Reviews
    The optimal approach to evaluate, disseminate, and exchange vendor security information is to leverage the Whistic Vendor Security Network for streamlined automation. With Whistic, organizations can conduct vendor assessments, distribute security documents, and forge reliable relationships seamlessly. Once businesses start utilizing Whistic, they find it hard to recall how they previously navigated vendor security assessments or handled questionnaire requests. Move away from the opaque security evaluations of yesteryears by transparently communicating vendor security expectations and sharing profiles. Prioritize building trust instead of sifting through endless spreadsheets. You can initiate assessments, assign levels of inherent risk, interact with vendors, compute risk scores, and automate reassessments effortlessly. In today’s rapid-paced business world, the sluggish and antiquated security review methods are no longer viable. Gain immediate insights into the security status of thousands of organizations with Whistic, ensuring that security management is both efficient and effective. This innovative solution empowers companies to stay ahead of potential vulnerabilities while fostering collaboration among vendors.
  • 14
    BowTieServer Reviews

    BowTieServer

    CGE Risk Management Solutions

    BowTieServer consolidates all bowtie, incident, and audit data within a single organizational database. This platform not only aggregates and preserves all risk-related information but also empowers users to access the appropriate level of detail necessary for efficient job performance. By transforming the static bowtie diagram into a dynamic representation of risk, BowTieServer provides a current overview of barrier effectiveness. Understanding your present risk exposure is crucial for making informed decisions. Moreover, BowTieServer integrates various risk management disciplines into one centralized hub, featuring bowties and associated data. It synergizes existing robust tools such as BowTieXP, IncidentXP, and AuditXP, fostering cohesion throughout the organization. The system is modular, allowing you to activate features based on your company's specific requirements. Ultimately, it addresses significant challenges in risk management by enhancing comprehension of risk exposure and facilitating better decision-making processes. This comprehensive approach ensures that organizations are equipped with the insights needed to navigate complex risk landscapes effectively.
  • 15
    Blueprint Reviews

    Blueprint

    Blueprint Software Systems

    Blueprint serves as the driving force behind your digital transformation journey. By seamlessly integrating with your RPA tool, Blueprint accelerates transformation efforts by offering an enhanced method to capture, design, govern, and manage high-quality business processes, or even to move entire RPA bot portfolios. This approach alleviates several obstacles associated with scaling RPA across the enterprise, enabling you to realize your vision swiftly and achieve higher returns on investment. In a centralized database, you can quickly gather and document all process-related information, making it simple to pinpoint current processes and identify potential areas for enhancement. Additionally, you can illustrate the workflow between individuals and systems while incorporating any dependencies, controls, regulations, or transitions. Ultimately, this comprehensive framework empowers organizations to optimize their operations effectively.
  • 16
    Contego Reviews

    Contego

    ASA Development

    Contego is a comprehensive software solution designed to oversee every facet of your operations seamlessly. By enabling systems to communicate with one another, it eliminates the need for redundant data entry across various platforms. As a collaborative platform, Contego enhances efficiency throughout the organization. Its advantages include streamlined management of personnel, equipment, operational challenges, and the relevant documentation all within a single, centralized system. With a unified dataset, information can be analyzed holistically while still being applicable at the operational level. This facilitates informed and proactive decision-making for management, ultimately leading to improved business outcomes and fostering continuous improvement within the organization. The increased accountability and transparency throughout the organization contribute significantly to better governance at all tiers. By integrating data from various platforms, Contego is essential for achieving optimal operational efficiency, ensuring that all departments work in harmony towards common goals.
  • 17
    ZEVA Reviews
    Zeva features a user-friendly interface and leverages Microsoft’s Azure Cloud to deliver a dependable and secure hosting environment, accommodating organizations ranging from small teams with fewer than 10 users to large global enterprises with over 10,000 employees. The true value of ZEVA for any organization lies in its capability to create and manage an unlimited array of custom assessments, providing decision-makers and management with real-time data and analytics accessible from anywhere across the globe. By using centralized secure hosting, enhanced reporting, and real-time dashboards, organizations can effectively mitigate risks and uphold compliance standards. Any issues noted as “Findings” can be promptly assigned corrective actions to ensure that necessary remediations are implemented without delay. The ZEVA platform was developed by the CodeLynx team specifically to address the changing evaluation demands of both commercial and government entities, regardless of their size. This innovative solution not only streamlines assessment processes but also empowers users to make informed decisions that drive organizational success.
  • 18
    Solver SDK Reviews

    Solver SDK

    Frontline Systems

    $2495 one-time payment
    Incorporate optimization and simulation models into your desktop, web, or mobile applications effortlessly by utilizing consistent high-level objects such as Problem, Solver, Variable, and Function, along with their respective collections, properties, and methods across various programming languages. This uniformity extends to a standardized object-oriented API that is accessible remotely via Web Services WS-* standards for clients using languages like PHP, JavaScript, and C#. Additionally, procedural languages are able to invoke traditional calls that align intuitively with the properties and methods of the object-oriented API. The suite of optimization techniques available encompasses linear and quadratic programming, mixed-integer programming, smooth nonlinear optimization, as well as global optimization and non-smooth evolutionary and tabu search methodologies. Furthermore, premier optimization tools from Gurobi™, XPRESS™, and MOSEK™ for handling linear, quadratic, and conic models, along with KNITRO™, SQP, and GRG methods for nonlinear challenges, can be seamlessly integrated into the Solver SDK. You can also effortlessly generate a sparse DoubleMatrix object containing an impressive 1 million rows and columns, making it easier to handle large datasets. This flexibility in creating and managing complex optimization problems allows developers to tailor solutions that meet specific application needs efficiently.
  • 19
    SAI360 Reviews
    Risk management is best done in a fluid and powerful way. Your decisions today can help you mitigate the risks that you might face tomorrow. SAI360 is a cloud-first software that combines modern ethics and compliance content to help organizations navigate risk in a flexible and agile way. All the best in intelligent solutions and global expertise in one platform. Configurability of solution, extensible data model with configurable interface/forms, fields and relationships to extend solutions. Process modeling: Modify or create new processes to automate, streamline, and reduce risk, compliance, audit, and other activities. Data visualization and analysis. Many pre-configured dashboards that are easy to set up allow you to visualize and analyze data. Learning and best practices content - Preloaded frameworks, control library and regulatory content, along with values-based ethics, compliance learning content. Integration framework with APIs, and other protocols.
  • 20
    Xyea Reviews
    Empowering individuals in vulnerable situations to enhance their quality of life is crucial. It is essential that those who provide support feel content and secure, receiving the appropriate level and quality of assistance that allows them to lead meaningful lives. Those receiving support can thrive, feeling safe and well-cared for, which contributes to their overall fulfillment. Families can take comfort in their choice of service provider and remain actively involved in their loved ones' lives to the extent they desire. Both vulnerable individuals and their families experience a sense of security, assured by the provider's proven ability to facilitate risk-taking, which fosters positive life experiences. With the help of the Xyea COVID-19 package, service providers can meet the expectations of individuals and their families even in these demanding times. It is vital that every person enjoys an enriched life experience, one that prioritizes their personal aspirations and is delivered in a friendly, approachable manner, at a pace that they find comfortable. Ultimately, this comprehensive support system leads to a more connected and fulfilling existence for all involved.
  • 21
    Verba Recording System Reviews

    Verba Recording System

    Verba Technologies

    $500 one-time payment
    Transform your compliance operations to confidently navigate financial services and trading regulations. To reduce effort, track trends and mitigate liability, capture and retrieve recordings quickly even in unstructured content and improve compliance, For quality management, compliance, liability protection and quality control purposes, organizations have been recording interactions between customers and employees for a long time. These recordings can contain a lot of valuable information, but it can be difficult to extract actionable intelligence quickly. Verint Interaction recording is a prepackaged solution that allows couples to record calls with the power speech processing. This will help you get more value from captured interactions. Verint Cloud Interaction Recording allows you to capture, index and archive interactions across voice, chat, video, social media, face–to-face, and other unified communication channels.
  • 22
    MetricStream Reviews
    Mitigate losses and minimize risk occurrences through proactive risk visibility. Foster a contemporary and cohesive risk management strategy that leverages real-time, consolidated risk intelligence to assess their influence on business goals and investments. Safeguard your brand’s reputation, reduce compliance costs, and cultivate trust among regulators and board members. Keep abreast of changing regulatory demands by actively managing compliance risks, policies, case evaluations, and control assessments. Promote risk-conscious decision-making and enhance business performance by aligning audits with strategic priorities, organizational goals, and associated risks. Deliver prompt insights on potential risks while bolstering collaboration among different departments. Decrease vulnerability to third-party risks and enhance sourcing choices. Avert incidents related to third-party risks through continuous monitoring of compliance and performance. Streamline and simplify the entire lifecycle of third-party risk management while ensuring that all stakeholders are informed and engaged throughout the process.
  • 23
    Citicus ONE Reviews
    Citicus ONE software is accessible through our basic and premium hosted services, which serve as an effective alternative to traditional in-house installations. With our basic hosted service, you can begin using the software right away without needing to establish the necessary internal infrastructure. On the other hand, our premium hosted service provides a customizable option, allowing you to determine the exact level of service needed and manage its connectivity to your corporate intranet, such as through a Virtual Private Network (VPN). If necessary, a hosted implementation can later be transitioned to an in-house installation. Our hosted solutions are trusted by organizations that prioritize high-level security and have undergone extensive independent evaluations to ensure their reliability and safety. Furthermore, this flexibility in deployment options caters to the diverse needs of businesses in today's fast-paced environment.
  • 24
    STREAM Integrated Risk Manager Reviews
    STREAM Integrated Risk Manager, an award-winning GRC platform, allows organizations to centralize and automate, quantify, report on, and report on risk. It can be used in a variety of applications, including cyber / IT and enterprise risk management, BCM, and vendor risk management. STREAM is available as a SaaS and on-premise deployment. It has been around for more than 10 years. It has been adopted worldwide by organizations in many industries, including finance, energy and healthcare, legal, and IT. For more information, please contact us.
  • 25
    Tectia Reviews

    Tectia

    SSH Communications Security

    We are a cybersecurity firm focused on protecting essential data during transit, use, and storage for prominent organizations globally. Evaluate your SSH key inventory and the associated risks with our self-service tool, SSHerlock, designed for discovering and auditing SSH keys and post-quantum resilience, all available at no cost. Our offerings extend to passwordless authentication, operational technology (OT) security, and defensive cybersecurity, among others. What significant trends are anticipated to influence cybersecurity in the coming year? PrivX is ideally suited for the secure management and monitoring of superuser and power user access across hybrid cloud environments while also removing dangerous privileged passwords from critical systems. UKM Zero Trust efficiently manages and automates the lifecycle of millions of encryption keys to enhance risk mitigation and ensure successful audits, promoting keyless access. Additionally, our software-based NQX delivers unparalleled performance and security, setting new standards in cybersecurity solutions. As technology continues to evolve, staying informed about these trends is crucial for maintaining robust security measures.