Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Paid
Claimed
Optimized for quick response

Protecht Features

What are the features of Protecht?

Audit Management

  • Validation Rules
  • Templates & Forms
  • Audit Trail

Regulatory Change Management

  • Content Library
  • Updates
  • Action Plans
  • Impact Analysis

Risk Management

  • Risk Identification
  • Risk Classification
  • Risk Methodology

Platform

  • Flexibility

Services

  • Implementation
  • Training & Learning
  • Customer Support
  • Professional Services

Filter for Features

Audit Management

Audit Types

Based on 13 Protecht reviews. Define different types of audits such as regular, ad-hoc, or industry-specific.
82%
(Based on 13 reviews)

Validation Rules

Based on 18 Protecht reviews. Provide rules that can be used to validate audits based on predefined criteria.
82%
(Based on 18 reviews)

Templates & Forms

Provide out of the box audit templates and forms for various processes and industries. This feature was mentioned in 19 Protecht reviews.
81%
(Based on 19 reviews)

Checklists

Auditors can use checklists for multiple processes, both online and offline. This feature was mentioned in 15 Protecht reviews.
80%
(Based on 15 reviews)

Audit Trail

Based on 17 Protecht reviews. Displays all the changes made during audits, including details such as username, timestamp, or type of change.
86%
(Based on 17 reviews)

Regulatory Change Management

Content Library

As reported in 18 Protecht reviews. Create and maintain a library of regulatory content for compliance purposes.
89%
(Based on 18 reviews)

Updates

Based on 19 Protecht reviews. Ability to maintain regulatory content and documents up to date.
85%
(Based on 19 reviews)

Action Plans

Define and implement corrective and preventive action plans for regulatory change. This feature was mentioned in 19 Protecht reviews.
88%
(Based on 19 reviews)

Tests

As reported in 13 Protecht reviews. Include models and tools to perform internal tests that simulate regulatory controls.
78%
(Based on 13 reviews)

Impact Analysis

Estimate the impact of regulatory changes on the operations of the company. This feature was mentioned in 17 Protecht reviews.
81%
(Based on 17 reviews)

Risk Management

Risk Identification

As reported in 19 Protecht reviews. Identify various risk factors such as the inadequate use of technology, human factor, or external risks.
89%
(Based on 19 reviews)

Risk Classification

Based on 20 Protecht reviews. Ability to classify risks based on risk type, severity, and custom criteria.
88%
(Based on 20 reviews)

Risk Methodology

Based on 20 Protecht reviews. Support for various methodologies and frameworks for risk management.
93%
(Based on 20 reviews)

Goals Monitoring

As reported in 14 Protecht reviews. Monitor risk management performance against goals and objectives.
82%
(Based on 14 reviews)

Third Party & Supplier Risk Management

Supplier Scoring

Users can assign scores to suppliers based on the estimated risk of doing business with them. This feature was mentioned in 10 Protecht reviews.
82%
(Based on 10 reviews)

Contract Review

Based on 13 Protecht reviews. Review vendor contracts and profiles to ensure compliance with regulation and internal policies.
85%
(Based on 13 reviews)

Vendor Performance

Track vendor performance using supplier data such as a history of transactions and contracts. This feature was mentioned in 10 Protecht reviews.
87%
(Based on 10 reviews)

Supplier KPIs

Track vendor risk KPIs such as the time it takes vendors to respond to security incidents. This feature was mentioned in 10 Protecht reviews.
85%
(Based on 10 reviews)

Business Continuity Management

Recovery Plans

Ability to create and compare recovery plans using standard out of the box templates.

Not enough data

Procedure Templates

Includes a library of procedures and standard plan templates. 11 reviewers of Protecht have provided feedback on this feature.
83%
(Based on 11 reviews)

Crisis Management

Procedures to implement crisis management plans and actions. 10 reviewers of Protecht have provided feedback on this feature.
78%
(Based on 10 reviews)

Platform

Integration

Delivers APIs and standard integrations with other software systems. This feature was mentioned in 16 Protecht reviews.
81%
(Based on 16 reviews)

Security & Privacy

As reported in 15 Protecht reviews. Complies with security and privacy regulations and standards.
88%
(Based on 15 reviews)

Mobile Access

Allows users to access the software using mobile devices. This feature was mentioned in 12 Protecht reviews.
83%
(Based on 12 reviews)

Flexibility

As reported in 19 Protecht reviews. Facilitates software configuration without the need for technical experise.
90%
(Based on 19 reviews)

Services

Implementation

As reported in 21 Protecht reviews. Assists customes through all the phases of the implementation process.
85%
(Based on 21 reviews)

Training & Learning

Based on 19 Protecht reviews. Provides software users with training courses and learning content.
89%
(Based on 19 reviews)

Customer Support

As reported in 19 Protecht reviews. Delivers customer and technical support, directly or trough partners.
95%
(Based on 19 reviews)

Professional Services

The vendor provides consulting services such as business process reengineering. 17 reviewers of Protecht have provided feedback on this feature.
87%
(Based on 17 reviews)

Planning

Program Management

Allows users to create programs to deal with potential threats.

Not enough data

Resource Modelling

Dependency mapping of resources includes what-if scenarios.

Not enough data

Recovery Plans

Ability to create and compare recovery plans using standard out of the box templates.

Not enough data

Templates

Includes a library of procedures and standard plan templates.

Not enough data

Execution

Crisis Management

Procedures to implement crisis management plans and actions.

Not enough data

Emergency Notifications

Notifications can be sent to anyone, not only the users of the solution.

Not enough data

Workflows

Workflows to assign tasks to users based on their role and the severity of the issue.

Not enough data

Analytics

Business Impact Analysis

Identify the impact of threats on various departments or business entities.

Not enough data

Plan Reporting

Analyse plan characteristics such as completion time or performance.

Not enough data

Recovery KPIs

Provide information on recovery KPIs such as recovery time progress and recovery time actual.

Not enough data

Integration

Integrated Risk Management

Integrates with Integrated Risk Management software.

Not enough data

Risk Assessment

Content

Standard templates and content for assessment purposes such as NIST (National Institute of Standards and Technology).

Not enough data

Contracts

Ability to review supplier contracts and identify critical requirements or potential risks.

Not enough data

Scoring

Users can assign scores to suppliers based on the estimated risk of doing business with them.

Not enough data

Risk Control

Reviews

Review vendor contracts and profiles to ensure compliance with regulation and internal policies.

Not enough data

Policies

Manage and enforce internal policies related to vendor risk management and controls.

Not enough data

Workflows

Provide workflows to mitigate risk and escalate issues proactively.

Not enough data

Monitoring

Vendor Performance

Track vendor performance using supplier data such as a history of transactions and contracts.

Not enough data

Notifications

Send alerts and notifications when corrective actions are needed to address supplier risk.

Not enough data

Oversight

Perform ongoing due diligence activities to auto calculate overall risk for each vendor.

Not enough data

Reporting

KPIs

Track vendor risk KPIs such as the time it takes vendors to respond to security incidents.

Not enough data

Templates

Include reporting templates for activities such as audits and vendor evaluation.

Not enough data

Centralized Data

Consolidate data from multiple systems that manage supplier information.

Not enough data

360 View

Provide a 360 view of suppliers which can be shared with internal or external users.

Not enough data

Workflows - Audit Management

Audit Trail

Displays all the changes made during audits, including details such as username, timestamp, or type of change in a centralized repository.

Not enough data

Recommendations

Coordinate and track recommended remediation actions.

Not enough data

Collaboration Tools

Facilitates collaboration between teams and stakeholders through shared workspaces.

Not enough data

Integrations

Integrates with risk management platforms, GRC tools, and other systems.

Not enough data

Planning & Scheduling

Facilitates the creation of audit plans, schedules, and reminders.

Not enough data

Documentation - Audit Management

Templates & Forms

Provide out of the box audit templates and forms for various processes and industries.

Not enough data

Checklists

Provides checklists

Not enough data

Reporting & Analytics - Audit Management

Dashboard

Dashboard provides real time or near real time updates and notifications in a centralized location.

Not enough data

Audit Performance

Provide information on the performance of the audit activities and processes.

Not enough data

Industry Compliance

Ensures audits are compliant with industry-specific regulations and standards.

Not enough data