This feature was mentioned in 23 Risk Ledger reviews.
Data Subject Access Request (DSAR) functionality helps companies comply with user access and deletion requests.
Identity Verification
21 reviewers of Risk Ledger have provided feedback on this feature.
Identity verification functionality validates a person's identity prior to a company complying with a data subject access request.
Privacy Impact Assessments
Based on 24 Risk Ledger reviews.
Privacy Impact Assessment (PIA) features help companies evalute, assess, track and report on the privacy implications of their data.
Data Mapping - survey-based
As reported in 22 Risk Ledger reviews.
Data mapping functionality, which helps companies understand how data flows throughout their organization, is achieved through manual surveys sent to company employees.
Data Discovery
This feature was mentioned in 22 Risk Ledger reviews.
Data discovery features collect and aggregate data from a variety of sources and prepares it in formats that both people and software can easily use it to then run analytics.
Data Classification
This feature was mentioned in 22 Risk Ledger reviews.
Data classification features tag the discovered data to make it easy to search, find, retrieve, and track.
De-identification/pseudonymization
Based on 22 Risk Ledger reviews.
De-identification or pseudonymization features replace personally identifiable information with artificial identifiers, or pseudonyms to comply with privacy regulations.
Data access governance
This feature was mentioned in 22 Risk Ledger reviews.
Data Access Governance functionality helps limit the number of people who have access to data unless they are permissioned to do so.
Customized Vendor Pages
44 reviewers of Risk Ledger have provided feedback on this feature.
Allows vendors to own and update their vendor page with security and compliance documentation to share with customers
Centralized Vendor Catalog
43 reviewers of Risk Ledger have provided feedback on this feature.
Allows companies to assess vendors profiles in a centralized catalog
Questionnaire Templates
As reported in 44 Risk Ledger reviews.
Offers standardized security and privacy framework questionnaire templates
User Access Control
46 reviewers of Risk Ledger have provided feedback on this feature.
Offers role based access controls to allow only permissioned users to utilize various parts of the software.
Risk assessment (4)
Risk Scoring
Based on 43 Risk Ledger reviews.
Offers built-in or automated vendor risk scoring
4th Party Assessments
As reported in 40 Risk Ledger reviews.
Offers tools to assess fourth parties -- your vendor's vendors
Monitoring And Alerts
As reported in 46 Risk Ledger reviews.
Monitors changes in risk and sends notifications, alerts, and reminders for specific actions including: upcoming assessments, profile access requests, etc
AI Monitoring
Uses AI to alert administrators to changes in risk scoring through continuous monitoring.
Risk Assessment (2)
Scoring
71 reviewers of Risk Ledger have provided feedback on this feature.
Users can assign scores to suppliers based on the estimated risk of doing business with them.
AI
This feature was mentioned in 14 Risk Ledger reviews.
Utilize artificial intelligence to analyze third party risks.
Risk Control (3)
Reviews
Based on 68 Risk Ledger reviews.
Review vendor contracts and profiles to ensure compliance with regulation and internal policies.
Policies
69 reviewers of Risk Ledger have provided feedback on this feature.
Manage and enforce internal policies related to vendor risk management and controls.
Workflows
Based on 67 Risk Ledger reviews.
Provide workflows to mitigate risk and escalate issues proactively.
Monitoring (2)
Notifications
72 reviewers of Risk Ledger have provided feedback on this feature.
Send alerts and notifications when corrective actions are needed to address supplier risk.
Oversight
Based on 70 Risk Ledger reviews.
Perform ongoing due diligence activities to auto calculate overall risk for each vendor.
Reporting (3)
Templates
Based on 68 Risk Ledger reviews.
Include reporting templates for activities such as audits and vendor evaluation.
Centralized Data
Based on 69 Risk Ledger reviews.
Consolidate data from multiple systems that manage supplier information.
360 View
Based on 69 Risk Ledger reviews.
Provide a 360 view of suppliers which can be shared with internal or external users.
Generative AI - Vendor Security and Privacy Assessment (2)
Text Summarization
Utilizes AI to summarize security questionnaires.
Text Generation
Automate text responses to common security assessment questions.
Agentic AI - Third Party & Supplier Risk Management (2)
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.