Whistic Features
What are the features of Whistic?
Functionality
- Customized Vendor Pages
- Centralized Vendor Catalog
- Questionnaire Templates
- User Access Control
Risk assessment
- Risk Scoring
- 4th Party Assessments
- Monitoring And Alerts
Top Rated Whistic Alternatives
Whistic Categories on G2
Filter for Features
Functionality
Customized Vendor Pages | Allows vendors to own and update their vendor page with security and compliance documentation to share with customers 24 reviewers of Whistic have provided feedback on this feature. | 88% (Based on 24 reviews) | |
Centralized Vendor Catalog | Allows companies to assess vendors profiles in a centralized catalog 25 reviewers of Whistic have provided feedback on this feature. | 89% (Based on 25 reviews) | |
Questionnaire Templates | Offers standardized security and privacy framework questionnaire templates 25 reviewers of Whistic have provided feedback on this feature. | 89% (Based on 25 reviews) | |
User Access Control | As reported in 26 Whistic reviews. Offers role based access controls to allow only permissioned users to utilize various parts of the software. | 83% (Based on 26 reviews) |
Risk assessment
Risk Scoring | Offers built-in or automated vendor risk scoring 23 reviewers of Whistic have provided feedback on this feature. | 88% (Based on 23 reviews) | |
4th Party Assessments | Offers tools to assess fourth parties -- your vendor's vendors 18 reviewers of Whistic have provided feedback on this feature. | 80% (Based on 18 reviews) | |
Monitoring And Alerts | Monitors changes in risk and sends notifications, alerts, and reminders for specific actions including: upcoming assessments, profile access requests, etc This feature was mentioned in 21 Whistic reviews. | 81% (Based on 21 reviews) |
Risk Assessment
Content | Standard templates and content for assessment purposes such as NIST (National Institute of Standards and Technology). | Not enough data | |
Contracts | Ability to review supplier contracts and identify critical requirements or potential risks. | Not enough data | |
Scoring | Users can assign scores to suppliers based on the estimated risk of doing business with them. | Not enough data |
Risk Control
Reviews | Review vendor contracts and profiles to ensure compliance with regulation and internal policies. | Not enough data | |
Policies | Manage and enforce internal policies related to vendor risk management and controls. | Not enough data | |
Workflows | Provide workflows to mitigate risk and escalate issues proactively. | Not enough data |
Monitoring
Notifications | Send alerts and notifications when corrective actions are needed to address supplier risk. | Not enough data | |
Oversight | Perform ongoing due diligence activities to auto calculate overall risk for each vendor. | Not enough data |
Reporting
KPIs | Track vendor risk KPIs such as the time it takes vendors to respond to security incidents. | Not enough data | |
Templates | Include reporting templates for activities such as audits and vendor evaluation. | Not enough data | |
Centralized Data | Consolidate data from multiple systems that manage supplier information. | Not enough data | |
360 View | Provide a 360 view of suppliers which can be shared with internal or external users. | Not enough data |
Generative AI
AI Text Generation | Allows users to generate text based on a text prompt. | Not enough data |