Introducing G2.ai, the future of software buying.Try now
Perimeter
Sponsored
Perimeter
Visit Website
Product Avatar Image
Prewave

By Prewave

3.5 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Prewave?

Perimeter
Sponsored
Perimeter
Visit Website
It's been two months since this profile received a new review
Leave a Review

Prewave Reviews & Product Details

Profile Status

This profile is currently managed by Prewave but has limited features.

Are you part of the Prewave team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Prewave before?

Answer a few questions to help the Prewave community

Prewave Reviews (1)

Reviews

Prewave Reviews (1)

3.5
1 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
FB
Tax Manager
Mid-Market (51-1000 emp.)
"Unclear and Difficult Chain Parts Risk Management"
What do you like best about Prewave?

The core power of Prewave nations that spreads across the globe beyond natural borders. By using native and area sources from diverse languages, it provides a wider net for info trapping than traditional methods. Therefore I have learned to differentiate few early indicators of problems beyond overseas manufacturers and its features that could have not been noticed other way. Review collected by and hosted on G2.com.

What do you dislike about Prewave?

Prewave can serve up too much information and therefore, may go over a person's head. Crawling through many alerts, some of which not needful for the narrow purposes, is also another very time-consuming activity. It is desirable to have an efficient search that could sort the data according to our preferences among various aspects. Review collected by and hosted on G2.com.

There are not enough reviews of Prewave for G2 to provide buying insight. Below are some alternatives with more reviews:

1
AuditBoard Logo
AuditBoard
4.6
(1,572)
AuditBoard’s modern connected risk platform is designed to elevate your teams, engage the front lines of your business, and help you leverage risk as a strategic driver. At the heart of our connected risk architecture is a unified data core that centralizes your organization's risks, controls, policies, frameworks, issues, and more. The core is surrounded by a set of powerful platform capabilities, including collaboration, automation, a robust workflow engine, business intelligence, and a highly extensible integration layer. Together, AuditBoard’s unified core and purposefully designed platform capabilities set a strong, dynamic foundation for our award-winning applications — RiskOversight, CrossComply, SOXHUB, OpsAudit, ESG, and TPRM.
2
SAP Ariba Logo
SAP Ariba
4.1
(707)
Spend Management, Invoice Management, Payment Management, and Contract Management Software.
3
Vanta Logo
Vanta
4.6
(2,128)
It was clear that security and privacy had become mainstream issues, and that we all increasingly relied on cloud services to store everything from our personal photos to our communications at work. Vanta’s mission is to be the layer of trust on top of these services, and to secure the internet, increase trust in software companies, and keep consumer data safe. Today, we're a growing team in San Francisco passionate about making the internet more secure and elevating the standards for technology companies.
4
Secureframe Logo
Secureframe
4.7
(765)
Secureframe helps companies get enterprise ready by streamlining SOC 2 and ISO 27001 compliance. Secureframe allows companies to get compliant within weeks, rather than months and monitors 40+ services, including AWS, GCP, and Azure.
5
UpGuard Logo
UpGuard
4.5
(585)
UpGuard is a cybersecurity platform that helps global organizations prevent data breaches, monitor third-party vendors, and improve their security posture. Using proprietary security ratings, world-class data leak detection capabilities, and powerful remediation workflows, we proactively identify security exposures for companies of all sizes.
6
Descartes Denied Party Screening Logo
Descartes Denied Party Screening
4.8
(196)
Descartes Denied Party Screening (also known as Descartes Visual Compliance and Descartes MK Data) provides a range of solutions covering third-party risk management requirements as they relate to international trade regulations, including restricted and denied party screening, OFAC compliance (incl. sanctioned ownership screening and OFAC 50), automation, classification, documentation and license management, and beyond. Descartes provides compliance for tomorrow - today.
7
LogicGate Risk Cloud Logo
LogicGate Risk Cloud
4.6
(183)
LogicGate's Risk Cloud Platform® is the most nimble and collaborative GRC solution out there. With Risk Cloud®, you can quickly adapt processes, workflows, and content to keep pace with change — without waiting for IT.
8
Ncontracts Logo
Ncontracts
4.7
(178)
The Ncontracts suite of GRC solutions covers vendor management, enterprise risk management, business continuity, compliance, audit and findings management, and cybersecurity. We provide seamless management of the complete lifecycle of risk and compliance, backed by dedicated support, unlimited training, and guaranteed accuracy.
9
Resolver Logo
Resolver
4.3
(177)
All implementations include training and advice on the most effective way to manage your processes within the application.
10
Cyberint, a Check Point Company Logo
Cyberint, a Check Point Company
4.6
(151)
Cyberint is now a Check Point Company. Its impactful intelligence solution combines cyber threat intelligence, external attack surface management, brand protection, and digital supply chain intelligence into a single, powerful solution. By leveraging autonomous discovery of all of an organization’s external-facing assets, coupled with open, deep & dark web intelligence, the solution enables cybersecurity teams to accelerate the detection and disruption of their most pressing cyber risks. Global customers, including Fortune 500 leaders across all major market verticals, rely on us to prevent, detect, investigate, and remediate phishing, malware, fraud, brand abuse, data leaks, external vulnerabilities, and more, ensuring continuous external protection from cyber threats.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Prewave
View Alternatives