A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | ||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | FullTrust | JupiterOne | Bytechek | CarbideSecure | A-Lign | BigID | Hyperproof | Vanta | Laika | Drata | Anecdotes | Axonius | Tugboat Logic | ||||
2 | USER EXPERIENCE: - intuitive; - low customer abandonment rate; - high quality data capture. | Consumer data protection | Consent management | Yes | Yes | Yes | Yes | ||||||||||
3 | Privacy Impact Assessments (PIA) and Data Protection Impact Assessments (DPIA) | Yes | Yes | ||||||||||||||
4 | Dedicated support + Ask a compliance expert | Search/Filter | Yes | ||||||||||||||
5 | Expert support | Yes | |||||||||||||||
6 | Deep-Dive Training | Yes | Yes | Yes | Yes | ||||||||||||
7 | Content Library | Yes | |||||||||||||||
8 | Live Chat | Yes | Yes | ||||||||||||||
9 | Security reports | Reporting center | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | |||||||
10 | Report templates | Yes | |||||||||||||||
11 | Real-time analytics | Yes | Yes | Yes | Yes | ||||||||||||
12 | Data Visualization (interactive Dashboards) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | ||||
13 | Data import/export | Yes | Yes | ||||||||||||||
14 | Data Mapping | Yes | |||||||||||||||
15 | Version History | Yes | Yes | ||||||||||||||
16 | Archiving & Retention | Yes | |||||||||||||||
17 | File Storage | Yes | Yes | ||||||||||||||
18 | Integrations | Third Party Integrations | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | |||||||
19 | Alert System | Alerts, Notifications, Escalations | Yes | Yes | Yes | Yes | Yes | Yes | |||||||||
20 | OPERATIONAL BENEFITS: - instant customization; - speed of integration; - saved time; - lower total cost of ownership; - real-time outcomes; - enhance vulnerability management. | Self-assessment | Self-assessment status | Yes | Yes | Yes | Yes | Yes | |||||||||
21 | Automated readiness assessment | Yes | Yes | Yes | |||||||||||||
22 | Policy management | Policy Management | Yes | Yes | Yes | Yes | Yes | Yes | |||||||||
23 | Policy generator | Yes | Yes | ||||||||||||||
24 | Backup policy | Yes | |||||||||||||||
25 | Customer policy builder | Yes | Yes | ||||||||||||||
26 | Policy updates & task reminders | Yes | Yes | Yes | |||||||||||||
27 | Policy Creation for multiple frameworks | Yes | Yes | Yes | |||||||||||||
28 | Task management | Task Management (task reminders) | Yes | Yes | Yes | Yes | |||||||||||
29 | Task Prioritization | Yes | |||||||||||||||
30 | Vendor management | Vendor asessment and management | Yes | Yes | Yes | ||||||||||||
31 | Progress tracking | Progress tracking | Yes | Yes | |||||||||||||
32 | Gap analysis to your next framework | Gap analysis to your next framework | Yes | Yes | |||||||||||||
33 | Team management | Assign control ownership | Yes | ||||||||||||||
34 | Active Directory Integration | Yes | Yes | ||||||||||||||
35 | Access Controls/Permissions | Yes | Yes | Yes | Yes | Yes | |||||||||||
36 | Asset inventory | Asset manager (Hardware + Cloud asset inventory) | Yes | Yes | Yes | Yes | Yes | ||||||||||
37 | *Due Diligence workbench | Yes | |||||||||||||||
38 | ROBUST COMPLIANCE: - biometric verification checks; - avoid fraud; - Anti Money Laundering (AML) and Know Your Customer (KYC) compliance | Security ensurance | Threat Intelligence | Yes | Yes | Yes | |||||||||||
39 | Encrypted communication | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | |||||||
40 | Cloud Gap analytics | Yes | |||||||||||||||
41 | Cyber Asset Attack Surface Management | Yes | Yes | Yes | |||||||||||||
42 | Risk Assessment and Management | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | ||||||||
43 | Cloud Security Posture Management | Yes | Yes | Yes | Yes | ||||||||||||
44 | Vulnerability Scanning and Protection | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | ||||||||
45 | - application Security | Yes | |||||||||||||||
46 | - networking scanning | Yes | Yes | Yes | Yes | ||||||||||||
47 | Audit Management | Audit Management, Consolidate, Control and Planning | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | ||
48 | Invite auditor on platfrom | Yes | |||||||||||||||
49 | Evidence collection | Standardized evidence collection | Yes | ||||||||||||||
50 | Streamline monitoring and control | Streamline control management | Yes | Yes | |||||||||||||
51 | Define cadences for controls monitoring | Yes | |||||||||||||||
52 | Incident management | Yes | |||||||||||||||
53 | Configuration Management | Yes | |||||||||||||||
54 | Data management | Data Security | Yes | Yes | Yes | ||||||||||||
55 | Sensitive Data Identification | Yes | Yes | Yes | Yes | ||||||||||||
56 | Data classification | Yes | |||||||||||||||
57 | Forecast compliance work | Yes | |||||||||||||||
58 | TECHNICAL ARCHITECTURE: - end-to-end echitecture provided; - covers all business use cases. | API | Yes | Yes | Yes | Yes | |||||||||||
59 | Multi-Cloud Management | Yes | |||||||||||||||
60 | PENETRATION TESTING | API Testing | Yes | ||||||||||||||
61 | Network Layer Testing | Yes | |||||||||||||||
62 | Mobile Application Testing | Yes | |||||||||||||||
63 | Web Application Testing | Yes | |||||||||||||||
64 | Wireless Network Testing | Yes | |||||||||||||||
65 | Facility Penetration Testing | Yes | Yes | ||||||||||||||
66 | Ransomware Preparedness Assessment | Yes | Yes | ||||||||||||||
67 | FRAMEWORKS | SOC 1 | Yes | Yes | Yes | ||||||||||||
68 | SOC 2 | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | ||||||
69 | SOC for Supply Chain | Yes | |||||||||||||||
70 | ISO 27001 | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | ||||||
71 | ISO 27701 | Yes | Yes | Yes | Yes | ||||||||||||
72 | ISO 22301 | Yes | Yes | ||||||||||||||
73 | ITGC | ||||||||||||||||
74 | PCI DSS | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | ||||||||
75 | HITRUST | Yes | Yes | ||||||||||||||
76 | HIPPA (USA) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | |||||||
77 | FEDRAMP | Yes | Yes | ||||||||||||||
78 | FISMA (USA) | Yes | Yes | ||||||||||||||
79 | CMMC | Yes | |||||||||||||||
80 | NIST 800-53 | Yes | Yes | ||||||||||||||
81 | NIST 800-172 | Yes | |||||||||||||||
82 | NIST 800-171 | Yes | Yes | Yes | Yes | Yes | Yes | ||||||||||
83 | NIST CSF | Yes | Yes | Yes | |||||||||||||
84 | NIST Privacy | Yes | |||||||||||||||
85 | MICROSOFT SSPA | Yes | Yes | Yes | |||||||||||||
86 | CSA STAR | Yes | |||||||||||||||
87 | NIST (USA) | Yes | |||||||||||||||
88 | CIS | Yes | |||||||||||||||
89 | GDPR (Europe) | Yes | Yes | Yes | Yes | Yes | |||||||||||
90 | BCDR Plan Assessment | Yes | Yes | ||||||||||||||
91 | BCBS 239 (USA) | Yes | |||||||||||||||
92 | PIPEDA (CANADA) | Yes | |||||||||||||||
93 | Lei Geral de Proteção de Dados (LGPD) (Brazil) | Yes | |||||||||||||||
94 | California Consumer Privacy Act (CCPA) (USA) | Yes | Yes | Yes | |||||||||||||
95 | Personal Data Protection Act (PDPA) (Thailand) | Yes | |||||||||||||||
96 | Personal Data Protection Act (PDPA) (Singapore) | Yes | |||||||||||||||
97 | Children's Online Privacy Protection Act (COPPA) (USA | Yes | |||||||||||||||
98 | New York SHIELD Act | Yes | |||||||||||||||
99 | Federal Data Protection Law 2000 (Mexico) | Yes | |||||||||||||||
100 | The Privacy Protection Act (PPA) 2017 (Israel) | Yes |