Best Vendor Risk Management Software in New Zealand - Page 4

Find and compare the best Vendor Risk Management software in New Zealand in 2025

Use the comparison tool below to compare the top Vendor Risk Management software in New Zealand on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Proteus GDPReady Reviews
    Proteus®, GDPReady™, is an itteration from Proteus® NextGen Data Privacy™ that uses the same code set. If you are only interested GDPR, we can deliver Proteus®, NextGen configured to only show the functionality needed for GDPR. Comprehensive view of Personal Identifiable Information (PII), including a score and graphical illustration. - Roadmap to compliance with recommendations for immediate actions. - Insights to help you build a data protection framework and inform future technology choices. - Helps you meet the regulations at a reduced cost. To see the full capabilities of Proteus NextGen Data Privacy see here https://sourceforge.net/software/product/Proteus-NextGen-Data-Privacy/
  • 2
    SecurityStudio Reviews
    To reduce the burden on your company's employees and vendors, simplify your vendor risk management program. Standardize the process for locating third- and fourth-party vendors. Keep track of vendors that pose a risk to you company. Protect your company from any vendor-related risk and protect it against regulators, lawyers, and customers in the event of a breach. SecurityStudio is different from other vendor risk management tools. It doesn't just communicate risk. SecurityStudio provides an automated workflow that evaluates all third-party vendors. It then brings your weakest links to light. You can then accept, reject or request remediation for each vendor.
  • 3
    Conveyor Reviews
    Customers can build trust around data security. Conveyor is a platform for cloud-based businesses that helps them prove their trustworthiness to their customers. It also helps to ensure that their vendors are trustworthy. Join the network to build trust in data security. Conveyor is creating the largest network of companies that understand data security is a business driver, not a cost center. By simplifying the exchange security information, we are making the internet more trustable. Streamlining the sharing of security information to prospects and customers will help you move compliance forward in your sales cycle. Responding quickly to customer security reviews can help you save 60%.
  • 4
    Proteus NextGen Data Privacy Reviews
    Proteus NextGen Data Privacy software gives DPOs, Privacy Teams and Legal Teams the data privacy management tools they need to manage GDPR compliance, CCPA Compliance or any other data privacy compliance program, efficiently and effectively. Proteus NextGen was designed for enterprises that use current, secure technologies. It is often considered the most flexible and comprehensive data privacy software available. You will find everything you need, including privacy impact assessments, DPIAs and transfer impacts assessments, data mapping, reporting (eg Record of Processing Activity reports), subject access request management, breach notification management, vendor management, risk assessment, risk assessment, and automated SCC generation to help Schrems II compliance. We offer training and consulting to help you get up and running quickly. Our goal is customer satisfaction. Visit our website to request a demonstration www.proteuscyber.com
  • 5
    Contingent Reviews
    Enhance your global due diligence processes by either importing your current database or effortlessly exploring millions of companies to find verified and compliant ownership, financial information, certifications, and a wealth of additional data. This approach aids your team in identifying potential risks throughout your entire supply chain or third-party network while ensuring adherence to regulatory requirements. Reduce the workload with real-time alerts whenever a supplier or third party faces any risks. By specifying tolerance criteria, disruption events, or metrics for monitoring, you can surface pertinent data and receive notifications through your preferred channels. Moreover, gain insights and uncover efficiencies that lead to savings, all while having comprehensive reporting readily available, which accelerates your journey toward digital transformation in a cost-effective manner. Additionally, by following a structured process that aligns with your compliance standards, you can further enhance your organization's regulatory adherence.
  • 6
    Black Kite Reviews
    The Black Kite RSI employs a method of examining, modifying, and analyzing data gathered from various OSINT channels, including internet-wide scanners, hacker communities, and the deep/dark web, among others. This process leverages machine learning to uncover correlations between control items, thereby enabling informed approximations. The system is designed to function seamlessly with platforms that incorporate questionnaires, vendor management systems, and operational workflows. By automating compliance with cybersecurity regulations, it significantly diminishes the likelihood of security breaches through a multi-layered defense strategy. The platform effectively utilizes Open-Source Intelligence (OSINT) and non-invasive cyber scans to pinpoint potential security vulnerabilities, all without directly interacting with the target customer. It identifies vulnerabilities and attack patterns across 20 categories and over 400 controls, rendering the Black Kite platform three times more thorough than its competitors, ultimately enhancing the overall security posture of its users. This extensive approach to threat identification not only helps organizations stay ahead of potential risks but also fosters a proactive culture of cybersecurity awareness.
  • 7
    Counself Reviews
    Counself Risk™, designed for legal, makes onboarding simple and ensures that due diligence is done correctly. Counself has a library of best-practice forms, questionnaires and documents for the legal industry. This will make it easier to streamline your compliance gathering and monitoring. Counself RFP™, which compares AFAs, helps increase price predictability and optimize costs for your legal department. You can host sealed bidding events, conduct conflict checks, attach custom forms, and documents to request information to as many firms as you wish, securely and separately. Because we know how important your data is, we place data security at the heart of everything we do.
  • 8
    VivoSecurity Reviews
    Management and regulators need third-party assessments that are objective and not based on assumptions or opinions. VivoSecuiry helps our customers satisfy regulators by assessing the true 3rd party risk. This is the probability that a vendor will have a data compromise. We do this without the need for questionnaires, maturity scores, or SOC2 reports. The sheer number of vendors increases the risk of third parties. VivoSecurity calculates this risk twice a year with an aggregate forecast. We assist senior management in setting risk appetite goals and providing a forecast of data breaches frequency. We assist cybersecurity teams in identifying the vendors that are most at risk. Then, we quantify the value of mitigation. We provide regulators with a documented and accurate process for vendor assessment that uses an empirical and transparent regression model to determine the probability of data breaches.
  • 9
    D&B Onboard Reviews
    Adhere to your internal guidelines and procedures while striving to reduce both regulatory and reputational risks, allowing for a more rapid engagement with clients. Clearly establish the objective of your verification process, applicable to every new client or vendor. Pinpoint the organization or individual you wish to evaluate. Access compliance-related resources, including sanction databases, news outlets, and Politically Exposed Persons (PEP) lists. Document your observations, such as categorization and reminders for ongoing monitoring. Each assessment is recorded and fully accountable to the staff involved in the operation. These evaluations can subsequently be revisited regularly to enhance and streamline the department's workflows. Conduct thorough data searches and incorporate your own insights into the system. Ensure that you maintain a documented, date-stamped record of each search to fulfill compliance requirements. By gaining a deeper understanding of your clientele, you can make quicker and more compliant decisions. Regularly reviewing the gathered data can further strengthen your compliance efforts and operational efficiency.
  • 10
    3rdRisk Reviews
    The management of supplier relationships, particularly regarding risks associated with cyber threats, sustainability, compliance, and continuity, is becoming increasingly critical. As incidents involving third parties and their compliance responsibilities continue to rise, our platform addresses these challenges by acting as a secure, comprehensive hub that fosters collaboration across various internal risk disciplines, business units, and external partners. It facilitates the efficient and safe exchange of documents and questionnaires, while also offering a shared workspace for those engaged in collaborative projects. Within this unified platform, internal teams have the flexibility to determine the information they wish to share with other departments and outside entities. Additionally, our third-party catalog integrates smoothly with your internal procurement systems and external data sources, providing a consolidated overview of your entire third-party ecosystem. This all-encompassing perspective encompasses vital details about contracts and specific attributes, ensuring that you have all necessary information at your fingertips. By streamlining communication and enhancing visibility, we empower organizations to mitigate risks effectively and strengthen their supplier relationships.
  • 11
    Proof&Trust Reviews

    Proof&Trust

    Proof&Believe LLC

    For six years, we have committed ourselves to developing an exceptional algorithm for assessing vendor risk. This algorithm has undergone extensive refinement and incorporates state-of-the-art AI technologies, which guarantees unmatched precision and operational efficiency. Vendors are required to submit documentation and respond to 32 clear-cut questions that address various elements of their operations, compliance, and security protocols. Thanks to our intuitive interface, 95% of vendors manage to finish the assessment in less than 30 minutes, thereby minimizing any disruption to their daily activities. Our algorithm conducts a thorough evaluation of the evidence and answers provided by vendors, using AI to pinpoint risks, vulnerabilities, and compliance challenges. Businesses receive a detailed report that includes actionable insights and recommendations, empowering them to make well-informed decisions and adopt a proactive approach to risk management. This holistic approach not only enhances security but also fosters stronger partnerships between businesses and their vendors.
  • 12
    Akitra Andromeda Reviews
    Akitra Andromeda represents an advanced AI-driven platform for compliance automation, crafted to enhance and simplify the process of adhering to regulations for companies of various scales. It accommodates a broad spectrum of compliance standards, such as SOC 2, ISO 27001, HIPAA, PCI DSS, SOC 1, GDPR, NIST 800-53, along with tailored frameworks, which empowers enterprises to maintain ongoing compliance with ease. With more than 240 integrations available for major cloud services and SaaS providers, Akitra ensures smooth integration into current operational workflows. By leveraging automation, the platform significantly cuts down both the time and expenses tied to traditional compliance management, as it automates essential tasks like monitoring and evidence collection. Additionally, Akitra features an extensive library of templates for policies and controls, which aids organizations in developing a robust compliance strategy. The platform's continuous monitoring capabilities guarantee that assets are kept secure and compliant at all times, providing peace of mind for businesses navigating the complexities of regulatory requirements. Ultimately, Akitra Andromeda stands out as a vital tool for modern organizations striving for excellence in compliance management.
  • 13
    Aravo Reviews

    Aravo

    Aravo Solutions

    Utilize the capabilities of Aravo’s adaptable, comprehensive workflow automation and AI-driven decision support. Grounded in our award-winning SaaS platform, you will maintain agility in a fast-evolving business and regulatory landscape. Whether transitioning from spreadsheets and requiring a swift and assured program setup, or seeking a solution tailored to your specific third-party governance framework, we offer the ideal solution that aligns with your program's maturity, size, and budget. Capitalize on our extensive experience in successfully implementing third-party risk management programs for numerous esteemed global brands. Our unmatched coverage spans supplier risk and performance, third-party management, and IT vendor risk management, making us a standout choice in the industry. With our expertise, you can enhance your operational resilience and ensure compliance in an increasingly complex environment.
  • 14
    Risk Ledger Reviews
    Clients have all the tools they need to run a thorough, cyber-security-led, third party risk management program against their entire supply chain. It is fast, easy, free, and simple for third parties to get involved and help them improve their risk management maturity. Our unique secure network model allows each organisation to run a third party risk management program and respond to client risks assessments. This creates trust relationships among the organisations on the platform. Organisations that run a third-party program for risk management on the Risk Ledger platform can benefit from: - Continuous monitoring of the supply chain for implementation of risk controls Visibility beyond third-parties to fourth-, fifth-, and sixth parties - Reduced procurement cycles by up to 80% - Increased supplier engagement Low per-supplier costs
  • 15
    COBRA Reviews
    Supply chains are complex, organic networks that connect people and grow over time. Statistics show that security breaches are a majority caused by third parties. C2 Cyber's Cobra platform instantly assesses the supplier's inherent risk, which saves time. It then recommends a level of service that matches the supplier's risk appetite and the client's.