Certa Features
Planning (4)
Processes
Manage workflows and business processes for procurement.
Contracts
Provide standard procurement contracts that can be customized.
Content
Maintain a repository of content such as catalogs and other documents.
Requisition
Define requisition rules for various types of procurement.
Execution (3)
Sourcing
Identify and assess suppliers for different products and services.
Purchasing
Create and manage purchase orders for products and services.
Invoicing
Include features for procurement invoicing and e-invoicing.
Analytics (3)
Visibility
Improve visibility into procurement activities across the company.
Performance
Monitor the performance of procurement operations.
Spend
Analyze procurement spending and identify future trends.
Risk Analysis (3)
Risk Scoring
Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.
Reporting
Creates reports outlining log activity and relevant metrics.
Risk-Prioritization
Allows for vulnerability ranking by customized risk and threat priorities.
Vulnerability Assesment (4)
Vulnerability Scanning
Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
Stores information related to common vulnerabilities and how to resolve them once incidents occur.
Contextual Data
Identify risk data attributes such as description, category, owner, or hierarchy.
Dashboards
Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data.
Automation (4)
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Workflow Automation
Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Security Testing
Allows users to perfrom hands-on live simulations and penetration tests.
Test Automation
Runs pre-scripted vulnerability scans and security tests without requiring manual work.
Risk Assessment (2)
Scoring
Users can assign scores to suppliers based on the estimated risk of doing business with them.
AI
Utilize artificial intelligence to analyze third party risks.
Risk Control (3)
Reviews
Review vendor contracts and profiles to ensure compliance with regulation and internal policies.
Policies
Manage and enforce internal policies related to vendor risk management and controls.
Workflows
Provide workflows to mitigate risk and escalate issues proactively.
Monitoring (3)
Vendor Performance
Track vendor performance using supplier data such as a history of transactions and contracts.
Notifications
Send alerts and notifications when corrective actions are needed to address supplier risk.
Oversight
Perform ongoing due diligence activities to auto calculate overall risk for each vendor.
Reporting (3)
Templates
Include reporting templates for activities such as audits and vendor evaluation.
Centralized Data
Consolidate data from multiple systems that manage supplier information.
360 View
Provide a 360 view of suppliers which can be shared with internal or external users.
Agentic AI - Third Party & Supplier Risk Management (2)
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Procure to Pay (1)
Multi-step Planning
Ability to break down and plan multi-step processes


