Risk Ledger Features
What are the features of Risk Ledger?
Functionality
- Customized Vendor Pages
- Questionnaire Templates
- User Access Control
Risk assessment
- Monitoring And Alerts
Risk Assessment
- Content
- Contracts
- Scoring
Risk Control
- Reviews
- Policies
- Workflows
Monitoring
- Notifications
- Oversight
Reporting
- Templates
- Centralized Data
- 360 View
Top Rated Risk Ledger Alternatives
Risk Ledger Categories on G2
Filter for Features
Functionality
Data Subject Access Requests | Data Subject Access Request (DSAR) functionality helps companies comply with user access and deletion requests. This feature was mentioned in 17 Risk Ledger reviews. | 77% (Based on 17 reviews) | |
Identity Verification | Identity verification functionality validates a person's identity prior to a company complying with a data subject access request. This feature was mentioned in 15 Risk Ledger reviews. | 74% (Based on 15 reviews) | |
Privacy Impact Assessments | Privacy Impact Assessment (PIA) features help companies evalute, assess, track and report on the privacy implications of their data. This feature was mentioned in 18 Risk Ledger reviews. | 81% (Based on 18 reviews) | |
Data Mapping - survey-based | Data mapping functionality, which helps companies understand how data flows throughout their organization, is achieved through manual surveys sent to company employees. 16 reviewers of Risk Ledger have provided feedback on this feature. | 75% (Based on 16 reviews) | |
Data Discovery | As reported in 16 Risk Ledger reviews. Data discovery features collect and aggregate data from a variety of sources and prepares it in formats that both people and software can easily use it to then run analytics. | 78% (Based on 16 reviews) | |
Data Classification | Based on 16 Risk Ledger reviews. Data classification features tag the discovered data to make it easy to search, find, retrieve, and track. | 79% (Based on 16 reviews) | |
De-identification/pseudonymization | As reported in 16 Risk Ledger reviews. De-identification or pseudonymization features replace personally identifiable information with artificial identifiers, or pseudonyms to comply with privacy regulations. | 77% (Based on 16 reviews) | |
Data access governance | Data Access Governance functionality helps limit the number of people who have access to data unless they are permissioned to do so. 16 reviewers of Risk Ledger have provided feedback on this feature. | 83% (Based on 16 reviews) | |
Customized Vendor Pages | Allows vendors to own and update their vendor page with security and compliance documentation to share with customers 36 reviewers of Risk Ledger have provided feedback on this feature. | 84% (Based on 36 reviews) | |
Centralized Vendor Catalog | Allows companies to assess vendors profiles in a centralized catalog 35 reviewers of Risk Ledger have provided feedback on this feature. | 84% (Based on 35 reviews) | |
Questionnaire Templates | As reported in 36 Risk Ledger reviews. Offers standardized security and privacy framework questionnaire templates | 87% (Based on 36 reviews) | |
User Access Control | Offers role based access controls to allow only permissioned users to utilize various parts of the software. 38 reviewers of Risk Ledger have provided feedback on this feature. | 85% (Based on 38 reviews) |
Risk assessment
Risk Scoring | Offers built-in or automated vendor risk scoring 35 reviewers of Risk Ledger have provided feedback on this feature. | 86% (Based on 35 reviews) | |
4th Party Assessments | Based on 32 Risk Ledger reviews. Offers tools to assess fourth parties -- your vendor's vendors | 76% (Based on 32 reviews) | |
Monitoring And Alerts | Monitors changes in risk and sends notifications, alerts, and reminders for specific actions including: upcoming assessments, profile access requests, etc This feature was mentioned in 38 Risk Ledger reviews. | 88% (Based on 38 reviews) |
Risk Assessment
Content | Based on 57 Risk Ledger reviews. Standard templates and content for assessment purposes such as NIST (National Institute of Standards and Technology). | 82% (Based on 57 reviews) | |
Contracts | Ability to review supplier contracts and identify critical requirements or potential risks. 53 reviewers of Risk Ledger have provided feedback on this feature. | 74% (Based on 53 reviews) | |
Scoring | Users can assign scores to suppliers based on the estimated risk of doing business with them. 56 reviewers of Risk Ledger have provided feedback on this feature. | 82% (Based on 56 reviews) |
Risk Control
Reviews | Based on 53 Risk Ledger reviews. Review vendor contracts and profiles to ensure compliance with regulation and internal policies. | 80% (Based on 53 reviews) | |
Policies | Based on 54 Risk Ledger reviews. Manage and enforce internal policies related to vendor risk management and controls. | 83% (Based on 54 reviews) | |
Workflows | Provide workflows to mitigate risk and escalate issues proactively. This feature was mentioned in 51 Risk Ledger reviews. | 79% (Based on 51 reviews) |
Monitoring
Notifications | As reported in 57 Risk Ledger reviews. Send alerts and notifications when corrective actions are needed to address supplier risk. | 83% (Based on 57 reviews) | |
Oversight | Perform ongoing due diligence activities to auto calculate overall risk for each vendor. This feature was mentioned in 55 Risk Ledger reviews. | 82% (Based on 55 reviews) |
Reporting
Templates | As reported in 53 Risk Ledger reviews. Include reporting templates for activities such as audits and vendor evaluation. | 83% (Based on 53 reviews) | |
Centralized Data | Based on 53 Risk Ledger reviews. Consolidate data from multiple systems that manage supplier information. | 84% (Based on 53 reviews) | |
360 View | Based on 53 Risk Ledger reviews. Provide a 360 view of suppliers which can be shared with internal or external users. | 82% (Based on 53 reviews) |