Risk Ledger Features
What are the features of Risk Ledger?
Functionality
- Customized Vendor Pages
- Centralized Vendor Catalog
- Questionnaire Templates
- User Access Control
Risk assessment
- Risk Scoring
- Monitoring And Alerts
Risk Assessment
- Scoring
Risk Control
- Reviews
- Policies
- Workflows
Monitoring
- Notifications
- Oversight
Reporting
- Templates
- Centralized Data
- 360 View
Risk Ledger Categories on G2
Filter for Features
Functionality
Data Subject Access Requests | Data Subject Access Request (DSAR) functionality helps companies comply with user access and deletion requests. This feature was mentioned in 23 Risk Ledger reviews. | 77% (Based on 23 reviews) | |
Identity Verification | Identity verification functionality validates a person's identity prior to a company complying with a data subject access request. This feature was mentioned in 21 Risk Ledger reviews. | 79% (Based on 21 reviews) | |
Privacy Impact Assessments | Privacy Impact Assessment (PIA) features help companies evalute, assess, track and report on the privacy implications of their data. This feature was mentioned in 24 Risk Ledger reviews. | 81% (Based on 24 reviews) | |
Data Mapping - survey-based | Data mapping functionality, which helps companies understand how data flows throughout their organization, is achieved through manual surveys sent to company employees. 22 reviewers of Risk Ledger have provided feedback on this feature. | 64% (Based on 22 reviews) | |
Data Discovery | As reported in 22 Risk Ledger reviews. Data discovery features collect and aggregate data from a variety of sources and prepares it in formats that both people and software can easily use it to then run analytics. | 66% (Based on 22 reviews) | |
Data Classification | Data classification features tag the discovered data to make it easy to search, find, retrieve, and track. This feature was mentioned in 22 Risk Ledger reviews. | 70% (Based on 22 reviews) | |
De-identification/pseudonymization | De-identification or pseudonymization features replace personally identifiable information with artificial identifiers, or pseudonyms to comply with privacy regulations. This feature was mentioned in 22 Risk Ledger reviews. | 70% (Based on 22 reviews) | |
Data access governance | As reported in 22 Risk Ledger reviews. Data Access Governance functionality helps limit the number of people who have access to data unless they are permissioned to do so. | 80% (Based on 22 reviews) | |
Customized Vendor Pages | Allows vendors to own and update their vendor page with security and compliance documentation to share with customers This feature was mentioned in 43 Risk Ledger reviews. | 84% (Based on 43 reviews) | |
Centralized Vendor Catalog | Based on 42 Risk Ledger reviews. Allows companies to assess vendors profiles in a centralized catalog | 82% (Based on 42 reviews) | |
Questionnaire Templates | Based on 43 Risk Ledger reviews. Offers standardized security and privacy framework questionnaire templates | 85% (Based on 43 reviews) | |
User Access Control | Based on 45 Risk Ledger reviews. Offers role based access controls to allow only permissioned users to utilize various parts of the software. | 86% (Based on 45 reviews) |
Risk assessment
Risk Scoring | As reported in 42 Risk Ledger reviews. Offers built-in or automated vendor risk scoring | 87% (Based on 42 reviews) | |
4th Party Assessments | As reported in 39 Risk Ledger reviews. Offers tools to assess fourth parties -- your vendor's vendors | 72% (Based on 39 reviews) | |
Monitoring And Alerts | Monitors changes in risk and sends notifications, alerts, and reminders for specific actions including: upcoming assessments, profile access requests, etc 45 reviewers of Risk Ledger have provided feedback on this feature. | 86% (Based on 45 reviews) | |
AI Monitoring | Uses AI to alert administrators to changes in risk scoring through continuous monitoring. | Not enough data |
Risk Assessment
Scoring | Users can assign scores to suppliers based on the estimated risk of doing business with them. This feature was mentioned in 67 Risk Ledger reviews. | 82% (Based on 67 reviews) | |
AI | Utilize artificial intelligence to analyze third party risks. 10 reviewers of Risk Ledger have provided feedback on this feature. | 38% (Based on 10 reviews) |
Risk Control
Reviews | Based on 64 Risk Ledger reviews. Review vendor contracts and profiles to ensure compliance with regulation and internal policies. | 79% (Based on 64 reviews) | |
Policies | As reported in 65 Risk Ledger reviews. Manage and enforce internal policies related to vendor risk management and controls. | 82% (Based on 65 reviews) | |
Workflows | Based on 62 Risk Ledger reviews. Provide workflows to mitigate risk and escalate issues proactively. | 79% (Based on 62 reviews) |
Monitoring
Notifications | Based on 68 Risk Ledger reviews. Send alerts and notifications when corrective actions are needed to address supplier risk. | 84% (Based on 68 reviews) | |
Oversight | Based on 66 Risk Ledger reviews. Perform ongoing due diligence activities to auto calculate overall risk for each vendor. | 82% (Based on 66 reviews) |
Reporting
Templates | As reported in 64 Risk Ledger reviews. Include reporting templates for activities such as audits and vendor evaluation. | 83% (Based on 64 reviews) | |
Centralized Data | Consolidate data from multiple systems that manage supplier information. This feature was mentioned in 64 Risk Ledger reviews. | 84% (Based on 64 reviews) | |
360 View | Provide a 360 view of suppliers which can be shared with internal or external users. 64 reviewers of Risk Ledger have provided feedback on this feature. | 82% (Based on 64 reviews) |
Generative AI - Vendor Security and Privacy Assessment
Text Summarization | Utilizes AI to summarize security questionnaires. | Not enough data | |
Text Generation | Automate text responses to common security assessment questions. | Not enough data |