Save to My Lists

Derive Reviews & Product Details

Derive Overview

What is Derive?

For Cybersecurity Managers (e.g., CISOs, IT Directors, and Risk Managers) who are tasked with assessing a company’s cyber risk exposure and required to allocate limited resources to adequately mitigate risk, Derive is a a SaaS subscription-based platform that quantifies the potential financial impact of cyber threats using proprietary data on cyber loss magnitudes, frequencies, control costs, and control effectiveness delivering a high resolution characterization of what risks they face and how they could address them. Unlike competitors Derive translates abstract cybersecurity concerns into concrete, actionable insights with financial clarity.

Derive Details
Discussions
Derive Community
Languages Supported
English
Show LessShow More
Product Description

A risk assessment and management web app that optimizes use of industry data, internal data, and expert inputs.


Seller Details
Seller
Derive
Year Founded
2021
HQ Location
Richmond, US
LinkedIn® Page
linkedin.com
2 employees on LinkedIn®

AN
Overview Provided by:
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
1 person requested security information

Derive Media

Answer a few questions to help the Derive community
Have you used Derive before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of Derive for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Sprinto Logo
Sprinto
4.8
(1,272)
Sprinto productizes and automates all compliance requirements that would otherwise require manual effort, documentation, and paperwork, end to end. It integrates with your business systems like GSuite, AWS, Github, Google Cloud, etc., and ensures that these systems are in the state required by SOC2/ISO27001. Sprinto also comes builtin with features like policies, security training, org charts, device monitoring, etc., to help you meet SOC 2/ISO27001 requirements without having to purchase new software for these. All in all, Sprinto takes care of all the compliance roadblocks and speaks the audit language on your behalf, while you focus on increasing revenue.
2
AuditBoard Logo
AuditBoard
4.6
(1,255)
AuditBoard’s modern connected risk platform is designed to elevate your teams, engage the front lines of your business, and help you leverage risk as a strategic driver. At the heart of our connected risk architecture is a unified data core that centralizes your organization's risks, controls, policies, frameworks, issues, and more. The core is surrounded by a set of powerful platform capabilities, including collaboration, automation, a robust workflow engine, business intelligence, and a highly extensible integration layer. Together, AuditBoard’s unified core and purposefully designed platform capabilities set a strong, dynamic foundation for our award-winning applications — RiskOversight, CrossComply, SOXHUB, OpsAudit, ESG, and TPRM.
3
Scrut Automation Logo
Scrut Automation
4.9
(1,106)
Automatically test your cloud configurations against 150+ CIS benchmarks across multiple cloud accounts on AWS, Azure, GCP and more, to maintain a strong infosec posture.
4
CloudBees Logo
CloudBees
4.4
(621)
Enabling the world’s biggest and brightest companies to transition from incoherent, disconnected DevOps to self-service, fast, secure workflows connecting software delivery to business outcomes.
5
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(474)
6
UpGuard Logo
UpGuard
4.5
(401)
UpGuard is a cybersecurity platform that helps global organizations prevent data breaches, monitor third-party vendors, and improve their security posture. Using proprietary security ratings, world-class data leak detection capabilities, and powerful remediation workflows, we proactively identify security exposures for companies of all sizes.
7
Arctic Wolf Logo
Arctic Wolf
4.6
(252)
Arctic Wolf provides Cyber-SOC as a service, designed to make every link in the security chain stronger.
8
Cisco Vulnerability Management (formerly Kenna.VM) Logo
Cisco Vulnerability Management (formerly Kenna.VM)
4.3
(217)
Cisco Vulnerability Management (formerly Kenna.VM), the original SaaS risk-based vulnerability management platform, prioritizes vulnerabilities that pose a real risk, enabling Security and IT teams to focus their limited resources and remediate more efficiently. Cisco’s data science-driven prioritization evaluates both enterprise data and a wealth of data on real-world exploit activity and translates that context into actionable intelligence to guide remediation.
9
Pirani Logo
Pirani
4.6
(201)
The Pirani software is the perfect solution for businesses of all sizes trying to mitigate operational risks and ensure compliance with regulatory standards. With its easy-to-use interface and comprehensive risk management capabilities, Pirani helps businesses identify, measure, control, and monitor risks centrally. What's more, Pirani offers a Free plan with no required credit card so you can try it out completely risk-free. Subscription plans are also available for business.
10
Qualys VMDR Logo
Qualys VMDR
4.4
(166)
Discover, assess, prioritize, and patch critical vulnerabilities in real time and across your global hybrid-IT landscape — all from a single solution.
Show More