Protecht Features
What are the features of Protecht?
Audit Management
- Validation Rules
- Templates & Forms
- Audit Trail
Regulatory Change Management
- Content Library
- Updates
- Action Plans
- Impact Analysis
Risk Management
- Risk Identification
- Risk Classification
- Risk Methodology
Platform
- Flexibility
Services
- Implementation
- Training & Learning
- Customer Support
- Professional Services
Top Rated Protecht Alternatives
Protecht Categories on G2
Filter for Features
Audit Management
Audit Types | Based on 13 Protecht reviews. Define different types of audits such as regular, ad-hoc, or industry-specific. | 82% (Based on 13 reviews) | |
Validation Rules | Based on 18 Protecht reviews. Provide rules that can be used to validate audits based on predefined criteria. | 82% (Based on 18 reviews) | |
Templates & Forms | Provide out of the box audit templates and forms for various processes and industries. This feature was mentioned in 19 Protecht reviews. | 81% (Based on 19 reviews) | |
Checklists | Auditors can use checklists for multiple processes, both online and offline. This feature was mentioned in 15 Protecht reviews. | 80% (Based on 15 reviews) | |
Audit Trail | Based on 17 Protecht reviews. Displays all the changes made during audits, including details such as username, timestamp, or type of change. | 86% (Based on 17 reviews) |
Regulatory Change Management
Content Library | As reported in 18 Protecht reviews. Create and maintain a library of regulatory content for compliance purposes. | 89% (Based on 18 reviews) | |
Updates | Based on 19 Protecht reviews. Ability to maintain regulatory content and documents up to date. | 85% (Based on 19 reviews) | |
Action Plans | Define and implement corrective and preventive action plans for regulatory change. This feature was mentioned in 19 Protecht reviews. | 88% (Based on 19 reviews) | |
Tests | As reported in 13 Protecht reviews. Include models and tools to perform internal tests that simulate regulatory controls. | 78% (Based on 13 reviews) | |
Impact Analysis | Estimate the impact of regulatory changes on the operations of the company. This feature was mentioned in 17 Protecht reviews. | 81% (Based on 17 reviews) |
Risk Management
Risk Identification | As reported in 19 Protecht reviews. Identify various risk factors such as the inadequate use of technology, human factor, or external risks. | 89% (Based on 19 reviews) | |
Risk Classification | Based on 20 Protecht reviews. Ability to classify risks based on risk type, severity, and custom criteria. | 88% (Based on 20 reviews) | |
Risk Methodology | Based on 20 Protecht reviews. Support for various methodologies and frameworks for risk management. | 93% (Based on 20 reviews) | |
Goals Monitoring | As reported in 14 Protecht reviews. Monitor risk management performance against goals and objectives. | 82% (Based on 14 reviews) |
Third Party & Supplier Risk Management
Supplier Scoring | Users can assign scores to suppliers based on the estimated risk of doing business with them. This feature was mentioned in 10 Protecht reviews. | 82% (Based on 10 reviews) | |
Contract Review | Based on 13 Protecht reviews. Review vendor contracts and profiles to ensure compliance with regulation and internal policies. | 85% (Based on 13 reviews) | |
Vendor Performance | Track vendor performance using supplier data such as a history of transactions and contracts. This feature was mentioned in 10 Protecht reviews. | 87% (Based on 10 reviews) | |
Supplier KPIs | Track vendor risk KPIs such as the time it takes vendors to respond to security incidents. This feature was mentioned in 10 Protecht reviews. | 85% (Based on 10 reviews) |
Business Continuity Management
Recovery Plans | Ability to create and compare recovery plans using standard out of the box templates. | Not enough data | |
Procedure Templates | Includes a library of procedures and standard plan templates. 11 reviewers of Protecht have provided feedback on this feature. | 83% (Based on 11 reviews) | |
Crisis Management | Procedures to implement crisis management plans and actions. 10 reviewers of Protecht have provided feedback on this feature. | 78% (Based on 10 reviews) |
Platform
Integration | Delivers APIs and standard integrations with other software systems. This feature was mentioned in 16 Protecht reviews. | 81% (Based on 16 reviews) | |
Security & Privacy | As reported in 15 Protecht reviews. Complies with security and privacy regulations and standards. | 88% (Based on 15 reviews) | |
Mobile Access | Allows users to access the software using mobile devices. This feature was mentioned in 12 Protecht reviews. | 83% (Based on 12 reviews) | |
Flexibility | As reported in 19 Protecht reviews. Facilitates software configuration without the need for technical experise. | 90% (Based on 19 reviews) |
Services
Implementation | As reported in 21 Protecht reviews. Assists customes through all the phases of the implementation process. | 85% (Based on 21 reviews) | |
Training & Learning | Based on 19 Protecht reviews. Provides software users with training courses and learning content. | 89% (Based on 19 reviews) | |
Customer Support | As reported in 19 Protecht reviews. Delivers customer and technical support, directly or trough partners. | 95% (Based on 19 reviews) | |
Professional Services | The vendor provides consulting services such as business process reengineering. 17 reviewers of Protecht have provided feedback on this feature. | 87% (Based on 17 reviews) |
Planning
Program Management | Allows users to create programs to deal with potential threats. | Not enough data | |
Resource Modelling | Dependency mapping of resources includes what-if scenarios. | Not enough data | |
Recovery Plans | Ability to create and compare recovery plans using standard out of the box templates. | Not enough data | |
Templates | Includes a library of procedures and standard plan templates. | Not enough data |
Execution
Crisis Management | Procedures to implement crisis management plans and actions. | Not enough data | |
Emergency Notifications | Notifications can be sent to anyone, not only the users of the solution. | Not enough data | |
Workflows | Workflows to assign tasks to users based on their role and the severity of the issue. | Not enough data |
Analytics
Business Impact Analysis | Identify the impact of threats on various departments or business entities. | Not enough data | |
Plan Reporting | Analyse plan characteristics such as completion time or performance. | Not enough data | |
Recovery KPIs | Provide information on recovery KPIs such as recovery time progress and recovery time actual. | Not enough data |
Integration
Integrated Risk Management | Integrates with Integrated Risk Management software. | Not enough data |
Risk Assessment
Content | Standard templates and content for assessment purposes such as NIST (National Institute of Standards and Technology). | Not enough data | |
Contracts | Ability to review supplier contracts and identify critical requirements or potential risks. | Not enough data | |
Scoring | Users can assign scores to suppliers based on the estimated risk of doing business with them. | Not enough data |
Risk Control
Reviews | Review vendor contracts and profiles to ensure compliance with regulation and internal policies. | Not enough data | |
Policies | Manage and enforce internal policies related to vendor risk management and controls. | Not enough data | |
Workflows | Provide workflows to mitigate risk and escalate issues proactively. | Not enough data |
Monitoring
Vendor Performance | Track vendor performance using supplier data such as a history of transactions and contracts. | Not enough data | |
Notifications | Send alerts and notifications when corrective actions are needed to address supplier risk. | Not enough data | |
Oversight | Perform ongoing due diligence activities to auto calculate overall risk for each vendor. | Not enough data |
Reporting
KPIs | Track vendor risk KPIs such as the time it takes vendors to respond to security incidents. | Not enough data | |
Templates | Include reporting templates for activities such as audits and vendor evaluation. | Not enough data | |
Centralized Data | Consolidate data from multiple systems that manage supplier information. | Not enough data | |
360 View | Provide a 360 view of suppliers which can be shared with internal or external users. | Not enough data |
Workflows - Audit Management
Audit Trail | Displays all the changes made during audits, including details such as username, timestamp, or type of change in a centralized repository. | Not enough data | |
Recommendations | Coordinate and track recommended remediation actions. | Not enough data | |
Collaboration Tools | Facilitates collaboration between teams and stakeholders through shared workspaces. | Not enough data | |
Integrations | Integrates with risk management platforms, GRC tools, and other systems. | Not enough data | |
Planning & Scheduling | Facilitates the creation of audit plans, schedules, and reminders. | Not enough data |
Documentation - Audit Management
Templates & Forms | Provide out of the box audit templates and forms for various processes and industries. | Not enough data | |
Checklists | Provides checklists | Not enough data |
Reporting & Analytics - Audit Management
Dashboard | Dashboard provides real time or near real time updates and notifications in a centralized location. | Not enough data | |
Audit Performance | Provide information on the performance of the audit activities and processes. | Not enough data | |
Industry Compliance | Ensures audits are compliant with industry-specific regulations and standards. | Not enough data |