Certa Features
What are the features of Certa?
Risk Assessment
- Content
Risk Control
- Reviews
- Workflows
Monitoring
- Notifications
Top Rated Certa Alternatives
Filter for Features
Planning
Processes | Manage workflows and business processes for procurement. | Not enough data | |
Contracts | Provide standard procurement contracts that can be customized. | Not enough data | |
Content | Maintain a repository of content such as catalogs and other documents. | Not enough data | |
Requisition | Define requisition rules for various types of procurement. | Not enough data |
Execution
Sourcing | Identify and assess suppliers for different products and services. | Not enough data | |
Purchasing | Create and manage purchase orders for products and services. | Not enough data | |
Invoicing | Include features for procurement invoicing and e-invoicing. | Not enough data |
Analytics
Visibility | Improve visibility into procurement activities across the company. | Not enough data | |
Performance | Monitor the performance of procurement operations. | Not enough data | |
Spend | Analyze procurement spending and identify future trends. | Not enough data |
Risk Analysis
Risk Scoring | Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches. | Not enough data | |
Reporting | Creates reports outlining log activity and relevant metrics. | Not enough data | |
Risk-Prioritization | Allows for vulnerability ranking by customized risk and threat priorities. | Not enough data |
Vulnerability Assesment
Vulnerability Scanning | Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised. | Not enough data | |
Vulnerability Intelligence | Stores information related to common vulnerabilities and how to resolve them once incidents occur. | Not enough data | |
Contextual Data | Identify risk data attributes such as description, category, owner, or hierarchy. | Not enough data | |
Dashboards | Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data. | Not enough data |
Automation
Automated Remediation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | Not enough data | |
Workflow Automation | Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. | Not enough data | |
Security Testing | Allows users to perfrom hands-on live simulations and penetration tests. | Not enough data | |
Test Automation | Runs pre-scripted vulnerability scans and security tests without requiring manual work. | Not enough data |
Audit Management
Audit Types | Define different types of audits such as regular, ad-hoc, or industry-specific. | Not enough data | |
Validation Rules | Provide rules that can be used to validate audits based on predefined criteria. | Not enough data | |
Templates & Forms | Provide out of the box audit templates and forms for various processes and industries. | Not enough data | |
Checklists | Auditors can use checklists for multiple processes, both online and offline. | Not enough data | |
Audit Trail | Displays all the changes made during audits, including details such as username, timestamp, or type of change. | Not enough data |
Regulatory Change Management
Content Library | Create and maintain a library of regulatory content for compliance purposes. | Not enough data | |
Updates | Ability to maintain regulatory content and documents up to date. | Not enough data | |
Learning | Include educational content to update employees and managers on regulatory changes. | Not enough data | |
Action Plans | Define and implement corrective and preventive action plans for regulatory change. | Not enough data | |
Tests | Include models and tools to perform internal tests that simulate regulatory controls. | Not enough data | |
Impact Analysis | Estimate the impact of regulatory changes on the operations of the company. | Not enough data |
Risk Management
Risk Identification | Identify various risk factors such as the inadequate use of technology, human factor, or external risks. | Not enough data | |
Risk Classification | Ability to classify risks based on risk type, severity, and custom criteria. | Not enough data | |
Risk Methodology | Support for various methodologies and frameworks for risk management. | Not enough data | |
Goals Monitoring | Monitor risk management performance against goals and objectives. | Not enough data |
Third Party & Supplier Risk Management
Supplier Scoring | Users can assign scores to suppliers based on the estimated risk of doing business with them. | Not enough data | |
Contract Review | Review vendor contracts and profiles to ensure compliance with regulation and internal policies. | Not enough data | |
Vendor Performance | Track vendor performance using supplier data such as a history of transactions and contracts. | Not enough data | |
Supplier KPIs | Track vendor risk KPIs such as the time it takes vendors to respond to security incidents. | Not enough data |
Business Continuity Management
Recovery Plans | Ability to create and compare recovery plans using standard out of the box templates. | Not enough data | |
Procedure Templates | Includes a library of procedures and standard plan templates. | Not enough data | |
Crisis Management | Procedures to implement crisis management plans and actions. | Not enough data |
Ethics and Compliance Learning
Standard Courses | Include out of the box courses for ethics and compliance. | Not enough data | |
Corporate Compliance | Courses that cover corporate compliance issues such as conflicts of interest. | Not enough data | |
Safety Training | Standard courses for employees who are exposed to potential dangers such as hazardous materials. | Not enough data | |
Regulatory Certifications | Track mandatory certifications imposed by governmental institutions. | Not enough data |
Platform
Integration | Delivers APIs and standard integrations with other software systems. | Not enough data | |
Security & Privacy | Complies with security and privacy regulations and standards. | Not enough data | |
Mobile Access | Allows users to access the software using mobile devices. | Not enough data | |
Flexibility | Facilitates software configuration without the need for technical experise. | Not enough data |
Services
Implementation | Assists customes through all the phases of the implementation process. | Not enough data | |
Training & Learning | Provides software users with training courses and learning content. | Not enough data | |
Customer Support | Delivers customer and technical support, directly or trough partners. | Not enough data | |
Professional Services | The vendor provides consulting services such as business process reengineering. | Not enough data |
Risk Assessment
Content | Standard templates and content for assessment purposes such as NIST (National Institute of Standards and Technology). 10 reviewers of Certa have provided feedback on this feature. | 93% (Based on 10 reviews) | |
Contracts | Ability to review supplier contracts and identify critical requirements or potential risks. | Not enough data | |
Scoring | Users can assign scores to suppliers based on the estimated risk of doing business with them. | Not enough data |
Risk Control
Reviews | As reported in 10 Certa reviews. Review vendor contracts and profiles to ensure compliance with regulation and internal policies. | 93% (Based on 10 reviews) | |
Policies | Manage and enforce internal policies related to vendor risk management and controls. | Not enough data | |
Workflows | Based on 10 Certa reviews. Provide workflows to mitigate risk and escalate issues proactively. | 97% (Based on 10 reviews) |
Monitoring
Vendor Performance | Track vendor performance using supplier data such as a history of transactions and contracts. | Not enough data | |
Notifications | Based on 10 Certa reviews. Send alerts and notifications when corrective actions are needed to address supplier risk. | 93% (Based on 10 reviews) | |
Oversight | Perform ongoing due diligence activities to auto calculate overall risk for each vendor. | Not enough data |
Reporting
KPIs | Track vendor risk KPIs such as the time it takes vendors to respond to security incidents. | Not enough data | |
Templates | Include reporting templates for activities such as audits and vendor evaluation. | Not enough data | |
Centralized Data | Consolidate data from multiple systems that manage supplier information. | Not enough data | |
360 View | Provide a 360 view of suppliers which can be shared with internal or external users. | Not enough data |