Best IT Risk Management Software in New Zealand - Page 3

Find and compare the best IT Risk Management software in New Zealand in 2025

Use the comparison tool below to compare the top IT Risk Management software in New Zealand on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    ClusterSeven Reviews
    ClusterSeven Shadow IT manager gives you control over hidden spreadsheets and other data assets that could put your business at risk. Manage the sensitive, hidden spreadsheets, apps, and data assets that are not under IT's control. This can create risk. You can now quickly and efficiently take inventory of files that your organization relies on and monitor who is making changes. This will help you to meet compliance and audit requirements, and prevent potential problems from affecting your enterprise.
  • 2
    Apptega Reviews
    Secure compliance and cybersecurity are simplified with the platform that is highly rated by customers.
  • 3
    Isora GRC Reviews

    Isora GRC

    SaltyCloud, PBC

    Isora GRC streamlines your IT Risk Assessments. Use Isora GRC to perform IT Risk Assessments. It is a lightweight and powerful surveying tool. Create self-assessment questions for departments, people and facilities. Use our preloaded questionnaires such as NIST, HIPAA and GLBA to help you. Build or upload your custom questionnaires. To simplify your questionnaires, you can change question weights, allow partial credits, gate conditional questions, or add question logic. Automatically score and rollup collected qualitative and quantitative survey data. Access dynamic risk reports. The risk map can be used to identify high-risk units. The trend graph can be used to track risk scores over time. The RESTful API allows you to easily export the raw data into data analytics tools such as Microsoft PowerBI.
  • 4
    Archer Reviews
    With decades of expertise and numerous deployments across various areas of risk management, our platform caters to organizations at any stage of their risk management journey. Whether your team is seeking to consolidate visibility in an advanced Risk Management function or is just beginning to explore a specific risk area, our solution fosters efficiency and collaboration among all stakeholders. Archer provides a unified understanding of risk, simplifying cooperative efforts in its management. By employing consistent taxonomies, policies, and metrics for all risk data, we enhance visibility for all users, boost collaboration, and streamline processes. Delve into our all-encompassing strategy for integrated risk management by scheduling a demo of Archer. Experience the user interface firsthand and learn how our features, dashboards, and capabilities can effectively tackle your organization’s distinct risk and compliance challenges, regardless of whether you choose our on-premises solution or SaaS model. Additionally, our commitment to innovation ensures that we continuously adapt and improve our offerings to meet the evolving needs of your organization.
  • 5
    Global Risk Exchange Reviews
    Safeguard your third-party digital landscape with a strategy grounded in data that ensures comprehensive visibility and anticipatory insights into your portfolio. Global Risk Exchange, previously known as CyberGRX, offers in-depth and agile evaluations of third-party vendors, enabling you to effectively navigate your changing external partnerships through a collaborative and crowd-sourced Exchange that houses a wealth of verified and predictive assessment information. By employing advanced data analytics, actual attack scenarios, and up-to-the-minute threat intelligence, we deliver an extensive analysis of your third-party ecosystem, empowering you to pinpoint your risks and enhance your decision-making processes. Additionally, harness structured data and actionable intelligence to uncover patterns and establish benchmarks that can guide your risk management strategies. This proactive approach not only fortifies your defenses but also equips you to respond adeptly to emerging challenges within your vendor network.
  • 6
    ControlPanelGRC Reviews
    NTT's ControlPanelGRC software suite is designed to deliver a thorough automation solution for compliance within SAP environments. This platform, ControlPanelGRC®, stands out as a robust, adaptable, and user-friendly governance, risk management, and compliance (GRC) tool. It offers an outstanding user experience, swift implementation, seamless integration with SAP systems, and comprehensive reporting and analytics, ensuring that SAP users are Always Audit Ready™ — effectively conserving resources and alleviating stress associated with compliance tasks. There are no hardware costs involved, as ControlPanelGRC integrates directly into your existing SAP setup through SAP transport. The implementation process is quick, allowing for a go-live in as little as one day and training for your team to be completed in under a week. Additionally, it boasts lower implementation costs with no upgrade fees, significantly reducing the time dedicated to compliance activities. The ControlPanel GRC AutoAuditor feature streamlines report approvals, enabling your staff to accomplish their responsibilities more efficiently, which ultimately enhances productivity and supports organizational goals.
  • 7
    LogicManager Reviews
    Our risk management platform and consultancy equip you to foresee future challenges, maintain your reputation, and enhance business performance through effective governance strategies. Recognizing that risks are interwoven, we have developed our governance sector and point solution packages on a comprehensive taxonomy platform, allowing seamless integration across all departments and supporting you throughout your organization's complete risk management journey. Conducting a risk assessment enables you to pinpoint banking risk trends across various branches while identifying control and process deficiencies. Additionally, understanding location-specific risk elements—such as vulnerability to natural disasters and employee distribution—is crucial for grasping the overall risk landscape of your enterprise. We connect clients with our skilled team of risk management consultants to propel your business forward, complemented by a variety of tailored training sessions and consulting services focused on best practices. This comprehensive approach ensures that you are well-prepared to tackle the complexities of risk in today’s dynamic environment.
  • 8
    Allgress Reviews
    Allgress is dedicated to delivering top-notch Risk Management solutions, and your insights are invaluable for our improvement. We encourage you to share your perspective by submitting a new review or updating one you’ve previously written. Please take a moment to assess our IT Risk Management and IT Vendor Risk Management Tools on Gartner Peer Insights. In just 15 minutes or so, you can assist others in discovering the most effective Risk Management Solutions available. Your participation makes a difference in guiding peers toward informed decisions.
  • 9
    Workscope Reviews
    Monitor, map and improve your spreadsheets and end-user computing resources. Every spreadsheet process and every End-User Developed Application converts knowledge into code on a desktop. These files were previously managed only through a strict control system. Workscope allows you to automatically assess, govern, and manage these assets without compromising your people or technology.
  • 10
    Interfacing Digital Business Platform Reviews
    Interfacing's Digital Business Platform uses flow technology to illustrate tasks and work in a flow diagram. This focuses on the people who are performing the tasks and their respective roles. The Digital Business Platform is a tool that can be used by companies to improve, share, and build processes from a central repository. To automate tasks and minimize manual intervention, business rules can be applied at any stage in the workflow. You can track and provide status reports at every stage of a process, which allows for precise performance and coordination between manual and systemized tasks. Our Digital Business Platform and our EPC system will greatly improve collaboration between IT operations and IT development, streamline testing, automate workflows, as well as offer significant bottom-line benefits. Interfacing's digital platform - Rapid Application Development Tools (RAD) Tools, and its Low-Code Development methodology, will maximize your technical resources.
  • 11
    Soterion Reviews
    Introducing a robust, scalable GRC application tailored for organizations seeking on-premise solutions, particularly well-suited for smaller firms with in-house GRC teams. This application offers compelling reasons to trust its capabilities. Experience a comprehensive On-Premise GRC solution that is not only effective but also enjoyable to interact with. It boasts powerful yet sensible features, encompassing all essential GRC capabilities your organization requires, while steering clear of cumbersome and extraneous functions. The user interface has been thoughtfully redesigned to enhance the GRC experience, ensuring that Soterion is a joy to navigate. Our reporting tools are designed for business users, allowing for targeted reports that cater to specific business areas. Furthermore, our application provides timely insights to prevent unexpected external audit issues, enabling users to access straightforward risk reports whenever necessary. As a cost-effective solution, it offers substantial value by delivering all necessary on-premise GRC functions without the hefty price tag associated with premium enterprise features that are often only relevant to the largest multinational corporations. Additionally, this approach ensures that your organization can scale its GRC capabilities effectively as needed.
  • 12
    Patrol Points Reviews

    Patrol Points

    Condo Control

    Contact us for a quote
    Condo Control's Patrol Points security guard tour system is a cutting-edge solution that improves and streamlines the patrol guard checkpoint experience. It uses cloud-based NFC technology, which can be accessed from any smartphone or tablet. Security guards can set up routes and interactive checkpoints around a premises, file incident reports on-the-spot, notify security staff of upcoming patrols and sync patrol reports to the security dashboard in real time. Our cloud-based technology makes it reliable and easy to use. It also offers off-line access if there is no network connection. Remote access is available to organize and monitor security remotely.
  • 13
    Oracle Risk Management and Compliance Reviews
    Enhance financial controls by automating sophisticated security measures and transaction oversight, which helps maintain separation of duties (SoD), combat fraud, and simplify audit processes. Implement automated analyses to guarantee that all roles remain prepared for audits. Leverage visual tools and simulations to facilitate optimal design choices. Incorporate sensitive access and SoD regulations within the system to confirm compliance for roles before going live. Design secure ERP roles in advance to prevent expensive user acceptance testing and audit complications after the system launch. Continuously watch over transactions and sensitive ERP information using integrated AI to deter tampering effectively. Adopt an AI-based strategy for risk management and security to promote business continuity and resilience. Link risk management to business outcomes to enhance financial oversight, enabling employees to navigate the balance between opportunities and associated risks. Optimize efforts related to business continuity and readiness to create a robust framework for future challenges. By doing so, organizations can ensure a more secure and efficient operational environment.
  • 14
    ServiceNow Integrated Risk Management Reviews
    Manage risk and compliance enterprise-wide through change and disruption created by evolving global regulations including privacy and ESG, human error, cyberattacks, digital transformation, and more. By seamlessly embedding risk management and compliance into your daily workflows and familiar user experiences you can enable a common language to improve risk-informed decisions, reduce costs, gain real-time visibility into risk, and effectively communicate with stakeholders at all levels.
  • 15
    SAP Ariba Supplier Risk Management Reviews
    Using SAP Ariba Supplier Risk enables buyers to enhance their decision-making process by seamlessly incorporating risk assessments into the procurement workflow, thereby promoting smarter and safer purchasing choices. This proactive approach ensures that well-informed buyers are less likely to encounter supply chain disruptions, ultimately safeguarding revenue and protecting brand reputation. Furthermore, it instills a strong sense of assurance regarding the accuracy and currency of supplier information. The solution, recognized as a leader in the market, allows businesses to customize their risk alerts and views based on specific supplier relationships and individual roles within the organization. Additionally, you can categorize suppliers according to the level of risk they present. By having a comprehensive understanding of each supplier, businesses can make quicker, more relevant, and precise decisions while fostering better collaboration with their trading partners. Moreover, the integration with SAP ERP, SAP Ariba Procurement, and Ariba Network provides valuable data insights into your supply chain, allowing for an even deeper understanding of your supply base. Embracing this level of insight can significantly enhance operational efficiency and strategic planning.
  • 16
    Reciprocity ROAR Platform Reviews
    The Reciprocity® ROAR Platform serves as the foundation for Reciprocity ZenRisk and ZenComply, empowering you to identify, comprehend, and address your IT and cyber risks effectively. By providing a cohesive, real-time perspective on risk and compliance that aligns with your business objectives, you will gain the contextual clarity necessary for engaging with key stakeholders, enabling you to make informed, strategic choices that safeguard your enterprise, systems, and data while fostering trust among customers, partners, and employees. Additionally, it highlights the risk implications associated with various business processes and priorities, facilitating the ability to make data-driven decisions that have a substantial impact on the organization. With expert guidance and best practices at your disposal, you can confidently develop, enhance, and advance your risk and compliance initiatives. Furthermore, the platform helps dismantle the silos that lead to inefficiencies, gaps, and blind spots by utilizing a comprehensive view of compliance and risk, ensuring that your organization operates with maximum effectiveness and clarity. This holistic approach not only streamlines processes but also enhances overall risk management maturity within the organization.
  • 17
    SAFE Reviews

    SAFE

    Safe Security

    Currently, the typical CISO at a Fortune 2000 company manages an average of 12 different cybersecurity solutions, resulting in a fragmented view with numerous dashboards but no centralized aggregation point. This situation often leads to the inability to demonstrate a clear return on investment for many cybersecurity purchases. A significant gap exists in assessing the organization's cyber resilience, as there's no concrete measurement of the changes from the state before implementing a product to its condition afterward. Furthermore, the absence of industry standards for evaluating the effectiveness of cybersecurity product implementations exacerbates the issue. SAFE offers a solution by allowing organizations to forecast potential cyber breaches, effectively consolidating signals from their existing cybersecurity tools, external threat intelligence, and relevant business context. The system incorporates information into a supervised Machine Learning Bayesian Network designed to predict breach likelihood, providing valuable scores, prioritized actionable insights, and a clear assessment of the risks that the organization faces, thereby enhancing overall security posture. By utilizing SAFE, companies can improve their cybersecurity strategy and make more informed decisions in a complex threat landscape.
  • 18
    Pathlock Reviews
    Pathlock has transformed the market through a series strategic mergers and acquisitions. Pathlock is changing the way enterprises protect their customer and financial data. Pathlock's access orchestration software supports companies in their quest to Zero Trust by alerting them to violations and taking steps to prevent loss. Pathlock allows enterprises to manage all aspects related to access governance from one platform. This includes user provisioning and temporary elevation, ongoing User Access Review, internal control testing, continuous monitoring, audit preparation and reporting, as well as user testing and continuous controls monitoring. Pathlock monitors and synthesizes real user activity across all enterprise apps where sensitive activities or data are concentrated, unlike traditional security, risk, and audit systems. It identifies actual violations and not theoretical possibilities. All lines of defense work together to make informed decision with Pathlock as their hub.
  • 19
    TruOps Reviews
    The TruOps platform serves as a centralized hub for all relevant information, linking assets to data concerning risk and compliance, which encompasses policies, controls, vulnerabilities, issue management, and exceptions. As a holistic cyber risk management solution, TruOps is structured to enhance efficiency and address the process challenges organizations encounter today while also equipping them for future demands. By integrating various pieces of information and their interconnections, it empowers users to make informed, automated decisions and navigate risk-based workflows seamlessly. This module also facilitates the oversight of vendor relationships, allowing for thorough due diligence and continuous monitoring of third parties. Furthermore, it simplifies and automates risk management procedures, utilizing conditional inquiries and a scenario engine to pinpoint risks effectively. The platform efficiently automates the processes of risk identification, planning, and responses, enabling organizations to manage plans, actions, and resources while swiftly resolving any arising issues. Ultimately, TruOps not only improves compliance but also fosters a proactive approach to risk management.
  • 20
    Trustero Reviews
    Numerous organizations are well-acquainted with the intricate and often exhausting process of SOC 2 Type 1 or Type 2 audits, which are now essential for securing many business agreements. Trustero Compliance as a Service leverages the capabilities of artificial intelligence (AI) and other advanced technologies to assist clients in identifying their source of truth, with policies and controls aligned to a designated security framework. Consequently, businesses can save hundreds of hours by automating numerous tasks, facilitating a smoother and faster journey toward reliable, ongoing compliance and trust. Streamlining the audit readiness process helps maintain compliance effortlessly, avoiding the last-minute scramble when an initial or annual SOC 2 audit approaches. Our user-friendly dashboard provides a real-time overview of your organization's audit readiness, ensuring you are always informed about your compliance status. This way, you can easily identify what is effective and what requires attention, ensuring you stay on course and compliant with necessary regulations. By incorporating these insights, you empower your organization to maintain a proactive stance on compliance and audit preparation.
  • 21
    Seemplicity Reviews
    The essential elements of productivity in the workplace have undergone a transformation due to the introduction of automated workflows across various sectors. However, the question remains: what is the state of security? In efforts to minimize risks, security teams often find themselves in a role akin to air traffic controllers, where they must deduplicate, sort, and prioritize an influx of security alerts, all while coordinating with developers throughout the organization to ensure that issues are addressed. This dynamic leads to a significant administrative load for teams that are already short on resources, resulting in frustratingly prolonged remediation times, tension between security and development departments, and challenges related to scalability. Seemplicity offers a groundbreaking solution by automating and enhancing the efficiency of all risk management workflows within a single platform. By consolidating findings with the same tool on a shared resource, the process becomes more streamlined. Any exceptions, like rejected tickets or those marked as fixed yet still containing unresolved issues, are automatically sent back to the security team for examination, thus alleviating some of the burden and improving overall workflow efficiency. This innovative approach not only simplifies the process but also empowers security teams to operate more effectively in a fast-paced environment.
  • 22
    Vyapin Microsoft 365 Reports Reviews
    Vyapin Microsoft 365 Reports stands out as a leading solution for reporting and analytics, tailored specifically for the administration, governance, and planning needs of Office 365. With the Vyapin Exchange Online Reporting tool, you gain in-depth insights into various aspects of your Office 365 environment, including user accounts, groups, mailbox configurations, security measures, usage statistics, folders, contacts, mail items, and public folders. This tool provides you with essential statistics on mailboxes and emails, enabling you to effectively monitor and optimize the use of Exchange Online. In terms of license reporting and usage analysis for Office 365, when you create user accounts, you typically assign licenses based on their specific job roles. The default Microsoft Office 365 portal falls short, as it requires individual license assignments instead of allowing group assignments. Therefore, after assigning licenses, it becomes crucial to have the capability to analyze the distribution of Office 365 licenses throughout your organization, utilizing diverse criteria to discern between utilized and idle licenses, which can greatly enhance your resource management strategy. As a result, using Vyapin’s solutions can significantly streamline your Office 365 administration processes and improve overall efficiency.
  • 23
    EGERIE Reviews
    EGERIE is supported by a network of over 450 specialized consultants who are well-trained and certified in our solutions. We collaborate with these experts to share knowledge and jointly develop risk analyses that align with user requirements specific to their markets and situations. It is essential that agility and security are seamlessly integrated into cyber project management to foster effective risk detection and prevention measures. The essence of risk analysis lies in its management through an adaptive, dynamic framework. To swiftly identify malicious activities and respond efficiently to incidents, organizations must achieve comprehensive visibility over their infrastructure and systems. This necessitates conducting thorough diagnostics to understand potential threats and the extent of their protection. Moreover, by enhancing their situational awareness, companies can significantly improve their resilience against cyber threats.
  • 24
    Telivy Reviews
    Discover the ultimate audit tool in the industry, offering unparalleled flexibility and easy deployment through a single script. Safeguard your networks, devices, and sensitive information by identifying potential vulnerabilities that could be exploited by cybercriminals, whether from internal or external sources. Shield your data from threats that could encrypt, alter, corrupt, or obliterate it, including devastating ransomware attacks. Guarantee that data remains accessible to all authorized personnel within your organization. Conduct thorough audits and configure appropriate access controls for all corporate assets, whether they reside on-premises or in the cloud. Implement strict policies governing user authentication, validation, and privileges while tackling the challenges associated with privilege creep. Additionally, assess your organization's resilience against email phishing schemes and attempts to capture application passwords, which could lead to unauthorized access and the potential exfiltration of confidential information. This multifaceted approach ensures a robust defense against evolving cyber threats.
  • 25
    eramba Reviews
    The driving force behind eramba's continuous development and enhancement is its worldwide community of users who take advantage of our straightforward and accessible code, documentation, forums, release strategies, and business approach. With over a decade of experience in managing community software, we have successfully transitioned to developing enterprise software that offers limitless email support, enhanced features, and consistent updates. Our remarkably straightforward business model and competitive pricing are specifically designed to sustain this initiative. Additionally, our community-curated repository of GRC templates is available for free to everyone, regardless of whether they use eramba. It seems unreasonable to charge for templates when you consider the vast intellectual contributions from the GRC community, which encompass compliance, internal controls, policies, mappings, questionnaires, and more. By keeping these resources open, we foster collaboration and innovation within the industry.