Best Software for 2025 is now live!
Save to My Lists
Paid
Claimed

Risk Ledger Features

What are the features of Risk Ledger?

Functionality

  • Customized Vendor Pages
  • Questionnaire Templates
  • User Access Control

Risk assessment

  • Monitoring And Alerts

Risk Assessment

  • Content
  • Contracts
  • Scoring

Risk Control

  • Reviews
  • Policies
  • Workflows

Monitoring

  • Notifications
  • Oversight

Reporting

  • Templates
  • Centralized Data
  • 360 View

Filter for Features

Functionality

Data Subject Access Requests

Data Subject Access Request (DSAR) functionality helps companies comply with user access and deletion requests. This feature was mentioned in 17 Risk Ledger reviews.
77%
(Based on 17 reviews)

Identity Verification

Identity verification functionality validates a person's identity prior to a company complying with a data subject access request. This feature was mentioned in 15 Risk Ledger reviews.
74%
(Based on 15 reviews)

Privacy Impact Assessments

Privacy Impact Assessment (PIA) features help companies evalute, assess, track and report on the privacy implications of their data. This feature was mentioned in 18 Risk Ledger reviews.
81%
(Based on 18 reviews)

Data Mapping - survey-based

Data mapping functionality, which helps companies understand how data flows throughout their organization, is achieved through manual surveys sent to company employees. 16 reviewers of Risk Ledger have provided feedback on this feature.
75%
(Based on 16 reviews)

Data Discovery

As reported in 16 Risk Ledger reviews. Data discovery features collect and aggregate data from a variety of sources and prepares it in formats that both people and software can easily use it to then run analytics.
78%
(Based on 16 reviews)

Data Classification

Based on 16 Risk Ledger reviews. Data classification features tag the discovered data to make it easy to search, find, retrieve, and track.
79%
(Based on 16 reviews)

De-identification/pseudonymization

As reported in 16 Risk Ledger reviews. De-identification or pseudonymization features replace personally identifiable information with artificial identifiers, or pseudonyms to comply with privacy regulations.
77%
(Based on 16 reviews)

Data access governance

Data Access Governance functionality helps limit the number of people who have access to data unless they are permissioned to do so. 16 reviewers of Risk Ledger have provided feedback on this feature.
83%
(Based on 16 reviews)

Customized Vendor Pages

Allows vendors to own and update their vendor page with security and compliance documentation to share with customers 36 reviewers of Risk Ledger have provided feedback on this feature.
84%
(Based on 36 reviews)

Centralized Vendor Catalog

Allows companies to assess vendors profiles in a centralized catalog 35 reviewers of Risk Ledger have provided feedback on this feature.
84%
(Based on 35 reviews)

Questionnaire Templates

As reported in 36 Risk Ledger reviews. Offers standardized security and privacy framework questionnaire templates
87%
(Based on 36 reviews)

User Access Control

Offers role based access controls to allow only permissioned users to utilize various parts of the software. 38 reviewers of Risk Ledger have provided feedback on this feature.
85%
(Based on 38 reviews)

Risk assessment

Risk Scoring

Offers built-in or automated vendor risk scoring 35 reviewers of Risk Ledger have provided feedback on this feature.
86%
(Based on 35 reviews)

4th Party Assessments

Based on 32 Risk Ledger reviews. Offers tools to assess fourth parties -- your vendor's vendors
76%
(Based on 32 reviews)

Monitoring And Alerts

Monitors changes in risk and sends notifications, alerts, and reminders for specific actions including: upcoming assessments, profile access requests, etc This feature was mentioned in 38 Risk Ledger reviews.
88%
(Based on 38 reviews)

Risk Assessment

Content

Based on 57 Risk Ledger reviews. Standard templates and content for assessment purposes such as NIST (National Institute of Standards and Technology).
82%
(Based on 57 reviews)

Contracts

Ability to review supplier contracts and identify critical requirements or potential risks. 53 reviewers of Risk Ledger have provided feedback on this feature.
74%
(Based on 53 reviews)

Scoring

Users can assign scores to suppliers based on the estimated risk of doing business with them. 56 reviewers of Risk Ledger have provided feedback on this feature.
82%
(Based on 56 reviews)

Risk Control

Reviews

Based on 53 Risk Ledger reviews. Review vendor contracts and profiles to ensure compliance with regulation and internal policies.
80%
(Based on 53 reviews)

Policies

Based on 54 Risk Ledger reviews. Manage and enforce internal policies related to vendor risk management and controls.
83%
(Based on 54 reviews)

Workflows

Provide workflows to mitigate risk and escalate issues proactively. This feature was mentioned in 51 Risk Ledger reviews.
79%
(Based on 51 reviews)

Monitoring

Notifications

As reported in 57 Risk Ledger reviews. Send alerts and notifications when corrective actions are needed to address supplier risk.
83%
(Based on 57 reviews)

Oversight

Perform ongoing due diligence activities to auto calculate overall risk for each vendor. This feature was mentioned in 55 Risk Ledger reviews.
82%
(Based on 55 reviews)

Reporting

Templates

As reported in 53 Risk Ledger reviews. Include reporting templates for activities such as audits and vendor evaluation.
83%
(Based on 53 reviews)

Centralized Data

Based on 53 Risk Ledger reviews. Consolidate data from multiple systems that manage supplier information.
84%
(Based on 53 reviews)

360 View

Based on 53 Risk Ledger reviews. Provide a 360 view of suppliers which can be shared with internal or external users.
82%
(Based on 53 reviews)