Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at Centraleyes, reclaim access to make changes.
Ada
Sponsored
Ada
Visit Website
Product Avatar Image
Centraleyes

By Centraleyes

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Centraleyes, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.3 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Centraleyes?

Ada
Sponsored
Ada
Visit Website
It's been two months since this profile received a new review
Leave a Review

Centraleyes Reviews & Product Details

Product Avatar Image

Have you used Centraleyes before?

Answer a few questions to help the Centraleyes community

Centraleyes Reviews (3)

Reviews

Centraleyes Reviews (3)

4.3
3 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Higher Education
UH
Enterprise (> 1000 emp.)
"CentralEyes Review"
What do you like best about Centraleyes?

The reduction in redundancy of work across frameworks. Review collected by and hosted on G2.com.

What do you dislike about Centraleyes?

It is sometimes laggy moving between areas of the solution. Review collected by and hosted on G2.com.

TY
Project Manager
Telecommunications
Enterprise (> 1000 emp.)
"Reduces GRC activities to be carried out manually"
What do you like best about Centraleyes?

I believe that Centraleyes has been beneficial to my company in doing GRC management. It gives an insight into the potential cyber threats that we face and strengths and weaknesses where we conform or struggle to meet the compliance standards. Review collected by and hosted on G2.com.

What do you dislike about Centraleyes?

It might become difficult at times for Centraleyes to write reports in a manner that satisfies the needs of all the stakeholders within an organization. Some of the reports have poor drill-down capacity, which hampers the opportunity to drill further. Review collected by and hosted on G2.com.

Patty B.
PB
Courtesy Professor
Mid-Market (51-1000 emp.)
"Short learning curve to obtain comprehensive feedback!"
What do you like best about Centraleyes?

From my experience I found Centraleyes to be the first GRC platform I’ve seen which can truly be onboarded in a few single days and start automating cyber risk and compliance tasks. The features we are most impressed with in particular are the automated remediation and unique risk register that can literally help us understand our cyber risk exposure in a strategic way and with minimal time and effort. I also appreciate the ease at which other people can be brought into the assessment and control process. Review collected by and hosted on G2.com.

What do you dislike about Centraleyes?

I have not seen any real downsides yet. We had some minor confusion at first with navigating the site because it is so comprehensive, but the learning curve was short! Review collected by and hosted on G2.com.

There are not enough reviews of Centraleyes for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Vanta Logo
Vanta
4.6
(2,127)
It was clear that security and privacy had become mainstream issues, and that we all increasingly relied on cloud services to store everything from our personal photos to our communications at work. Vanta’s mission is to be the layer of trust on top of these services, and to secure the internet, increase trust in software companies, and keep consumer data safe. Today, we're a growing team in San Francisco passionate about making the internet more secure and elevating the standards for technology companies.
2
Scrut Automation Logo
Scrut Automation
4.9
(1,291)
Automatically test your cloud configurations against 150+ CIS benchmarks across multiple cloud accounts on AWS, Azure, GCP and more, to maintain a strong infosec posture.
3
Sprinto Logo
Sprinto
4.8
(1,510)
Sprinto productizes and automates all compliance requirements that would otherwise require manual effort, documentation, and paperwork, end to end. It integrates with your business systems like GSuite, AWS, Github, Google Cloud, etc., and ensures that these systems are in the state required by SOC2/ISO27001. Sprinto also comes builtin with features like policies, security training, org charts, device monitoring, etc., to help you meet SOC 2/ISO27001 requirements without having to purchase new software for these. All in all, Sprinto takes care of all the compliance roadblocks and speaks the audit language on your behalf, while you focus on increasing revenue.
4
AuditBoard Logo
AuditBoard
4.6
(1,569)
AuditBoard’s modern connected risk platform is designed to elevate your teams, engage the front lines of your business, and help you leverage risk as a strategic driver. At the heart of our connected risk architecture is a unified data core that centralizes your organization's risks, controls, policies, frameworks, issues, and more. The core is surrounded by a set of powerful platform capabilities, including collaboration, automation, a robust workflow engine, business intelligence, and a highly extensible integration layer. Together, AuditBoard’s unified core and purposefully designed platform capabilities set a strong, dynamic foundation for our award-winning applications — RiskOversight, CrossComply, SOXHUB, OpsAudit, ESG, and TPRM.
5
Drata Logo
Drata
4.8
(1,109)
Drata is the world's most advanced security and compliance automation platform with the mission to help businesses earn and keep the trust of their users, customers, partners, and prospects. With Drata, thousands of companies streamline risk management and over 12 compliance frameworks—such as SOC 2, ISO 27001, GDPR, CCPA, PCI DSS and more—through automation, resulting in a strong security posture, lower costs, and less time spent preparing for audits.
6
Responsive, formerly RFPIO Logo
Responsive, formerly RFPIO
4.5
(1,234)
Responsive is a cloud-based RFP software that eliminates the friction often associated with responding to Requests for Proposal (RFPs), through a no-nonsense set-up, simple and intuitive user interface, and robust integrations with Salesforce and Slack.
7
UpGuard Logo
UpGuard
4.5
(579)
UpGuard is a cybersecurity platform that helps global organizations prevent data breaches, monitor third-party vendors, and improve their security posture. Using proprietary security ratings, world-class data leak detection capabilities, and powerful remediation workflows, we proactively identify security exposures for companies of all sizes.
8
Secureframe Logo
Secureframe
4.8
(1,191)
Secureframe helps companies get enterprise ready by streamlining SOC 2 and ISO 27001 compliance. Secureframe allows companies to get compliant within weeks, rather than months and monitors 40+ services, including AWS, GCP, and Azure.
9
Loopio Logo
Loopio
4.6
(812)
Loopio’s response management platform helps companies streamline their response process for RFPs, DDQs, Security Questionnaires, and more. Currently serving over 1,700 companies globally at world-leading organizations, Loopio enables sales and proposal teams to respond faster, improve response accuracy, and win more business.
10
CloudBees Logo
CloudBees
4.4
(623)
Enabling the world’s biggest and brightest companies to transition from incoherent, disconnected DevOps to self-service, fast, secure workflows connecting software delivery to business outcomes.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.