Manage workflows and business processes for procurement.
Contracts
Provide standard procurement contracts that can be customized.
Content
Maintain a repository of content such as catalogs and other documents.
Requisition
Define requisition rules for various types of procurement.
Execution (3)
Sourcing
Identify and assess suppliers for different products and services.
Purchasing
Create and manage purchase orders for products and services.
Invoicing
Include features for procurement invoicing and e-invoicing.
Analytics (3)
Visibility
Improve visibility into procurement activities across the company.
Performance
Monitor the performance of procurement operations.
Spend
Analyze procurement spending and identify future trends.
Risk Analysis (3)
Risk Scoring
Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.
Reporting
Creates reports outlining log activity and relevant metrics.
Risk-Prioritization
Allows for vulnerability ranking by customized risk and threat priorities.
Vulnerability Assesment (4)
Vulnerability Scanning
Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
Stores information related to common vulnerabilities and how to resolve them once incidents occur.
Contextual Data
Identify risk data attributes such as description, category, owner, or hierarchy.
Dashboards
Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data.
Automation (4)
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Workflow Automation
Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Security Testing
Allows users to perfrom hands-on live simulations and penetration tests.
Test Automation
Runs pre-scripted vulnerability scans and security tests without requiring manual work.
Audit Management (5)
Audit Types
Define different types of audits such as regular, ad-hoc, or industry-specific.
Validation Rules
Provide rules that can be used to validate audits based on predefined criteria.
Templates & Forms
Provide out of the box audit templates and forms for various processes and industries.
Checklists
Auditors can use checklists for multiple processes, both online and offline.
Audit Trail
Displays all the changes made during audits, including details such as username, timestamp, or type of change.
Regulatory Change Management (6)
Content Library
Create and maintain a library of regulatory content for compliance purposes.
Updates
Ability to maintain regulatory content and documents up to date.
Learning
Include educational content to update employees and managers on regulatory changes.
Action Plans
Define and implement corrective and preventive action plans for regulatory change.
Tests
Include models and tools to perform internal tests that simulate regulatory controls.
Impact Analysis
Estimate the impact of regulatory changes on the operations of the company.
Risk Management (4)
Risk Identification
Identify various risk factors such as the inadequate use of technology, human factor, or external risks.
Risk Classification
Ability to classify risks based on risk type, severity, and custom criteria.
Risk Methodology
Support for various methodologies and frameworks for risk management.
Goals Monitoring
Monitor risk management performance against goals and objectives.
Third Party & Supplier Risk Management (4)
Supplier Scoring
Users can assign scores to suppliers based on the estimated risk of doing business with them.
Contract Review
Review vendor contracts and profiles to ensure compliance with regulation and internal policies.
Vendor Performance
Track vendor performance using supplier data such as a history of transactions and contracts.
Supplier KPIs
Track vendor risk KPIs such as the time it takes vendors to respond to security incidents.
Business Continuity Management (3)
Recovery Plans
Ability to create and compare recovery plans using standard out of the box templates.
Procedure Templates
Includes a library of procedures and standard plan templates.
Crisis Management
Procedures to implement crisis management plans and actions.
Ethics and Compliance Learning (4)
Standard Courses
Include out of the box courses for ethics and compliance.
Corporate Compliance
Courses that cover corporate compliance issues such as conflicts of interest.
Safety Training
Standard courses for employees who are exposed to potential dangers such as hazardous materials.
Regulatory Certifications
Track mandatory certifications imposed by governmental institutions.
Platform (4)
Integration
Delivers APIs and standard integrations with other software systems.
Security & Privacy
Complies with security and privacy regulations and standards.
Mobile Access
Allows users to access the software using mobile devices.
Flexibility
Facilitates software configuration without the need for technical experise.
Services (4)
Implementation
Assists customes through all the phases of the implementation process.
Training & Learning
Provides software users with training courses and learning content.
Customer Support
Delivers customer and technical support, directly or trough partners.
Professional Services
The vendor provides consulting services such as business process reengineering.
Risk Assessment (2)
Scoring
Users can assign scores to suppliers based on the estimated risk of doing business with them.
AI
Utilize artificial intelligence to analyze third party risks.
Risk Control (3)
Reviews
As reported in 11 Certa reviews.
Review vendor contracts and profiles to ensure compliance with regulation and internal policies.
Policies
As reported in 10 Certa reviews.
Manage and enforce internal policies related to vendor risk management and controls.
Workflows
11 reviewers of Certa have provided feedback on this feature.
Provide workflows to mitigate risk and escalate issues proactively.
Monitoring (3)
Vendor Performance
Track vendor performance using supplier data such as a history of transactions and contracts.
Notifications
As reported in 11 Certa reviews.
Send alerts and notifications when corrective actions are needed to address supplier risk.
Oversight
Based on 10 Certa reviews.
Perform ongoing due diligence activities to auto calculate overall risk for each vendor.
Reporting (3)
Templates
As reported in 10 Certa reviews.
Include reporting templates for activities such as audits and vendor evaluation.
Centralized Data
Consolidate data from multiple systems that manage supplier information.
360 View
Provide a 360 view of suppliers which can be shared with internal or external users.
Generative AI (2)
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
Agentic AI - Third Party & Supplier Risk Management (2)
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Procure to Pay (1)
Multi-step Planning
Ability to break down and plan multi-step processes
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.