Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Certa Features

What are the features of Certa?

Risk Assessment

  • Content

Risk Control

  • Reviews
  • Workflows

Monitoring

  • Notifications

Top Rated Certa Alternatives

Filter for Features

Planning

Processes

Manage workflows and business processes for procurement.

Not enough data

Contracts

Provide standard procurement contracts that can be customized.

Not enough data

Content

Maintain a repository of content such as catalogs and other documents.

Not enough data

Requisition

Define requisition rules for various types of procurement.

Not enough data

Execution

Sourcing

Identify and assess suppliers for different products and services.

Not enough data

Purchasing

Create and manage purchase orders for products and services.

Not enough data

Invoicing

Include features for procurement invoicing and e-invoicing.

Not enough data

Analytics

Visibility

Improve visibility into procurement activities across the company.

Not enough data

Performance

Monitor the performance of procurement operations.

Not enough data

Spend

Analyze procurement spending and identify future trends.

Not enough data

Risk Analysis

Risk Scoring

Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.

Not enough data

Reporting

Creates reports outlining log activity and relevant metrics.

Not enough data

Risk-Prioritization

Allows for vulnerability ranking by customized risk and threat priorities.

Not enough data

Vulnerability Assesment

Vulnerability Scanning

Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.

Not enough data

Vulnerability Intelligence

Stores information related to common vulnerabilities and how to resolve them once incidents occur.

Not enough data

Contextual Data

Identify risk data attributes such as description, category, owner, or hierarchy.

Not enough data

Dashboards

Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data.

Not enough data

Automation

Automated Remediation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data

Workflow Automation

Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.

Not enough data

Security Testing

Allows users to perfrom hands-on live simulations and penetration tests.

Not enough data

Test Automation

Runs pre-scripted vulnerability scans and security tests without requiring manual work.

Not enough data

Audit Management

Audit Types

Define different types of audits such as regular, ad-hoc, or industry-specific.

Not enough data

Validation Rules

Provide rules that can be used to validate audits based on predefined criteria.

Not enough data

Templates & Forms

Provide out of the box audit templates and forms for various processes and industries.

Not enough data

Checklists

Auditors can use checklists for multiple processes, both online and offline.

Not enough data

Audit Trail

Displays all the changes made during audits, including details such as username, timestamp, or type of change.

Not enough data

Regulatory Change Management

Content Library

Create and maintain a library of regulatory content for compliance purposes.

Not enough data

Updates

Ability to maintain regulatory content and documents up to date.

Not enough data

Learning

Include educational content to update employees and managers on regulatory changes.

Not enough data

Action Plans

Define and implement corrective and preventive action plans for regulatory change.

Not enough data

Tests

Include models and tools to perform internal tests that simulate regulatory controls.

Not enough data

Impact Analysis

Estimate the impact of regulatory changes on the operations of the company.

Not enough data

Risk Management

Risk Identification

Identify various risk factors such as the inadequate use of technology, human factor, or external risks.

Not enough data

Risk Classification

Ability to classify risks based on risk type, severity, and custom criteria.

Not enough data

Risk Methodology

Support for various methodologies and frameworks for risk management.

Not enough data

Goals Monitoring

Monitor risk management performance against goals and objectives.

Not enough data

Third Party & Supplier Risk Management

Supplier Scoring

Users can assign scores to suppliers based on the estimated risk of doing business with them.

Not enough data

Contract Review

Review vendor contracts and profiles to ensure compliance with regulation and internal policies.

Not enough data

Vendor Performance

Track vendor performance using supplier data such as a history of transactions and contracts.

Not enough data

Supplier KPIs

Track vendor risk KPIs such as the time it takes vendors to respond to security incidents.

Not enough data

Business Continuity Management

Recovery Plans

Ability to create and compare recovery plans using standard out of the box templates.

Not enough data

Procedure Templates

Includes a library of procedures and standard plan templates.

Not enough data

Crisis Management

Procedures to implement crisis management plans and actions.

Not enough data

Ethics and Compliance Learning

Standard Courses

Include out of the box courses for ethics and compliance.

Not enough data

Corporate Compliance

Courses that cover corporate compliance issues such as conflicts of interest.

Not enough data

Safety Training

Standard courses for employees who are exposed to potential dangers such as hazardous materials.

Not enough data

Regulatory Certifications

Track mandatory certifications imposed by governmental institutions.

Not enough data

Platform

Integration

Delivers APIs and standard integrations with other software systems.

Not enough data

Security & Privacy

Complies with security and privacy regulations and standards.

Not enough data

Mobile Access

Allows users to access the software using mobile devices.

Not enough data

Flexibility

Facilitates software configuration without the need for technical experise.

Not enough data

Services

Implementation

Assists customes through all the phases of the implementation process.

Not enough data

Training & Learning

Provides software users with training courses and learning content.

Not enough data

Customer Support

Delivers customer and technical support, directly or trough partners.

Not enough data

Professional Services

The vendor provides consulting services such as business process reengineering.

Not enough data

Risk Assessment

Content

Standard templates and content for assessment purposes such as NIST (National Institute of Standards and Technology). 10 reviewers of Certa have provided feedback on this feature.
93%
(Based on 10 reviews)

Contracts

Ability to review supplier contracts and identify critical requirements or potential risks.

Not enough data

Scoring

Users can assign scores to suppliers based on the estimated risk of doing business with them.

Not enough data

Risk Control

Reviews

As reported in 10 Certa reviews. Review vendor contracts and profiles to ensure compliance with regulation and internal policies.
93%
(Based on 10 reviews)

Policies

Manage and enforce internal policies related to vendor risk management and controls.

Not enough data

Workflows

Based on 10 Certa reviews. Provide workflows to mitigate risk and escalate issues proactively.
97%
(Based on 10 reviews)

Monitoring

Vendor Performance

Track vendor performance using supplier data such as a history of transactions and contracts.

Not enough data

Notifications

Based on 10 Certa reviews. Send alerts and notifications when corrective actions are needed to address supplier risk.
93%
(Based on 10 reviews)

Oversight

Perform ongoing due diligence activities to auto calculate overall risk for each vendor.

Not enough data

Reporting

KPIs

Track vendor risk KPIs such as the time it takes vendors to respond to security incidents.

Not enough data

Templates

Include reporting templates for activities such as audits and vendor evaluation.

Not enough data

Centralized Data

Consolidate data from multiple systems that manage supplier information.

Not enough data

360 View

Provide a 360 view of suppliers which can be shared with internal or external users.

Not enough data