Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Cybersecurity Risk Assessment Application

Wolters Kluwer’s ELM Solutions Cybersecurity Risk Assessment application is designed to help corporate legal departments manage IT security risk across their law firms and other legal service providers.

Work for Cybersecurity Risk Assessment Application?

Learning about Cybersecurity Risk Assessment Application?

We can help you find the solution that fits you best.

Cybersecurity Risk Assessment Application Reviews

Ask Cybersecurity Risk Assessment Application a Question
Write a Review
Filter Reviews
Showing 0 Cybersecurity Risk Assessment Application reviews
LinkedIn Connections

What Security Risk Analysis solution do you use?

Thanks for letting us know!

There are not enough reviews of Cybersecurity Risk Assessment Application for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Sophos UTM Logo
Sophos UTM
4.1
(67)
The global network of highly skilled researchers and analysts, protecting businesses from known and emerging malware - viruses, rootkits and spyware.
2
Qualys Logo
Qualys
4.3
(32)
Vulnerability Management
3
Symantec Risk Insight Logo
Symantec Risk Insight
4.3
(18)
See all your risk, in every form, from every angle. Strengthen your security posture with automated risk assessments.
4
Tripwire Enterprise Logo
Tripwire Enterprise
3.6
(15)
Tripwire is a provider of advanced threat, security and compliance solutions to confidently detect, prevent and respond to cybersecurity threats
5
Cyberoam UTM Logo
Cyberoam UTM
4.3
(15)
Cyberoam Unified Threat Management appliances, available as hardware and virtual appliances, offer comprehensive security to organizations.
6
Core Insight Enterprise Logo
Core Insight Enterprise
3.8
(12)
Vulnerability Management
7
Change Tracker Gen7 R2 Logo
Change Tracker Gen7 R2
4.7
(5)
NNT Change Tracker Generation 7 uses either an agent-based or agentless architecture. After initial discovery, NNT-Change Tracker scans your devices and compares them to a standard policy.
8
Tenable.io Logo
Tenable.io
4.4
(4)
Tenable.io is the only cybersecurity company that empowers customers to gain control of their risk by knowing and prioritizing vulnerabilities across their entire attack surface including traditional, cloud, mobile and DevOps environments.
9
Symantec Network Forensics & Security Analytics Logo
Symantec Network Forensics & Security Analytics
4.1
(5)
Symantec Security Analytics delivers enriched, full-packet capture for full network security visibility, advanced network forensics, anomaly detection, and real-time content inspection for all network traffic. Armed with this detailed record, you can conduct forensic investigations, respond quickly to incidents, and resolve breaches in a fraction of the time you would spend with conventional processes.
10
Google Cloud Security Command Center Logo
Google Cloud Security Command Center
4.3
(3)
Cloud Security Command Center helps security teams gather data, identify threats, and act on them before they result in business damage or loss. It offers deep insight into application and data risk so that you can quickly mitigate threats to your cloud resources and evaluate overall health.
Show more
Kate from G2

Learning about Cybersecurity Risk Assessment Application?

I can help.
* We monitor all Cybersecurity Risk Assessment Application reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.