Introducing G2.ai, the future of software buying.Try now

Risk Ledger Features

What are the features of Risk Ledger?

Functionality

  • Customized Vendor Pages
  • Centralized Vendor Catalog
  • Questionnaire Templates
  • User Access Control

Risk assessment

  • Risk Scoring
  • Monitoring And Alerts

Risk Assessment

  • Scoring

Risk Control

  • Reviews
  • Policies
  • Workflows

Monitoring

  • Notifications
  • Oversight

Reporting

  • Templates
  • Centralized Data
  • 360 View

Top Rated Risk Ledger Alternatives

Vanta
(1,818)
4.6 out of 5
UpGuard
(458)
4.5 out of 5
Drata
(1,059)
4.8 out of 5

Filter for Features

Functionality

Data Subject Access Requests

Data Subject Access Request (DSAR) functionality helps companies comply with user access and deletion requests. This feature was mentioned in 23 Risk Ledger reviews.
77%
(Based on 23 reviews)

Identity Verification

Identity verification functionality validates a person's identity prior to a company complying with a data subject access request. This feature was mentioned in 21 Risk Ledger reviews.
79%
(Based on 21 reviews)

Privacy Impact Assessments

Privacy Impact Assessment (PIA) features help companies evalute, assess, track and report on the privacy implications of their data. This feature was mentioned in 24 Risk Ledger reviews.
81%
(Based on 24 reviews)

Data Mapping - survey-based

Data mapping functionality, which helps companies understand how data flows throughout their organization, is achieved through manual surveys sent to company employees. 22 reviewers of Risk Ledger have provided feedback on this feature.
64%
(Based on 22 reviews)

Data Discovery

As reported in 22 Risk Ledger reviews. Data discovery features collect and aggregate data from a variety of sources and prepares it in formats that both people and software can easily use it to then run analytics.
66%
(Based on 22 reviews)

Data Classification

Data classification features tag the discovered data to make it easy to search, find, retrieve, and track. This feature was mentioned in 22 Risk Ledger reviews.
70%
(Based on 22 reviews)

De-identification/pseudonymization

De-identification or pseudonymization features replace personally identifiable information with artificial identifiers, or pseudonyms to comply with privacy regulations. This feature was mentioned in 22 Risk Ledger reviews.
70%
(Based on 22 reviews)

Data access governance

As reported in 22 Risk Ledger reviews. Data Access Governance functionality helps limit the number of people who have access to data unless they are permissioned to do so.
80%
(Based on 22 reviews)

Customized Vendor Pages

Allows vendors to own and update their vendor page with security and compliance documentation to share with customers This feature was mentioned in 43 Risk Ledger reviews.
84%
(Based on 43 reviews)

Centralized Vendor Catalog

Based on 42 Risk Ledger reviews. Allows companies to assess vendors profiles in a centralized catalog
82%
(Based on 42 reviews)

Questionnaire Templates

Based on 43 Risk Ledger reviews. Offers standardized security and privacy framework questionnaire templates
85%
(Based on 43 reviews)

User Access Control

Based on 45 Risk Ledger reviews. Offers role based access controls to allow only permissioned users to utilize various parts of the software.
86%
(Based on 45 reviews)

Risk assessment

Risk Scoring

As reported in 42 Risk Ledger reviews. Offers built-in or automated vendor risk scoring
87%
(Based on 42 reviews)

4th Party Assessments

As reported in 39 Risk Ledger reviews. Offers tools to assess fourth parties -- your vendor's vendors
72%
(Based on 39 reviews)

Monitoring And Alerts

Monitors changes in risk and sends notifications, alerts, and reminders for specific actions including: upcoming assessments, profile access requests, etc 45 reviewers of Risk Ledger have provided feedback on this feature.
86%
(Based on 45 reviews)

AI Monitoring

Uses AI to alert administrators to changes in risk scoring through continuous monitoring.

Not enough data

Risk Assessment

Scoring

Users can assign scores to suppliers based on the estimated risk of doing business with them. This feature was mentioned in 67 Risk Ledger reviews.
82%
(Based on 67 reviews)

AI

Utilize artificial intelligence to analyze third party risks. 10 reviewers of Risk Ledger have provided feedback on this feature.
38%
(Based on 10 reviews)

Risk Control

Reviews

Based on 64 Risk Ledger reviews. Review vendor contracts and profiles to ensure compliance with regulation and internal policies.
79%
(Based on 64 reviews)

Policies

As reported in 65 Risk Ledger reviews. Manage and enforce internal policies related to vendor risk management and controls.
82%
(Based on 65 reviews)

Workflows

Based on 62 Risk Ledger reviews. Provide workflows to mitigate risk and escalate issues proactively.
79%
(Based on 62 reviews)

Monitoring

Notifications

Based on 68 Risk Ledger reviews. Send alerts and notifications when corrective actions are needed to address supplier risk.
84%
(Based on 68 reviews)

Oversight

Based on 66 Risk Ledger reviews. Perform ongoing due diligence activities to auto calculate overall risk for each vendor.
82%
(Based on 66 reviews)

Reporting

Templates

As reported in 64 Risk Ledger reviews. Include reporting templates for activities such as audits and vendor evaluation.
83%
(Based on 64 reviews)

Centralized Data

Consolidate data from multiple systems that manage supplier information. This feature was mentioned in 64 Risk Ledger reviews.
84%
(Based on 64 reviews)

360 View

Provide a 360 view of suppliers which can be shared with internal or external users. 64 reviewers of Risk Ledger have provided feedback on this feature.
82%
(Based on 64 reviews)

Generative AI - Vendor Security and Privacy Assessment

Text Summarization

Utilizes AI to summarize security questionnaires.

Not enough data

Text Generation

Automate text responses to common security assessment questions.

Not enough data