Best Compliance Software - Page 49

Compare the Top Compliance Software as of November 2025 - Page 49

  • 1
    NurseReferralPro

    NurseReferralPro

    NurseReferralPro

    NurseReferralPro™ was designed to bring public health case management to the cloud in a way that’s surprisingly easy and cost-effective. Best of all, NurseReferralPro™ results in better client care while helping ensure you are compliant. We serve public health agencies and non-profits worldwide. We solve non-compliant client documentation causing organizations to fail audits which could result in fines and loss of revenue for your organization. NurseReferralPro was built with the highest level of security and privacy available today because we know client privacy is critical. We are constantly testing and evaluating new levels of enhanced security. We host your data on Microsoft's Azure Cloud services, so you can be sure your data is secure and scalable. Our Business Associates Agreement (BAA) with Microsoft ensures full HIPAA compliance.
  • 2
    Fleetworthy

    Fleetworthy

    Fleetworthy Solutions

    From Licensing and Permitting to Fuel Tax and Mileage Reporting, your vehicles and equipment need to be on the road and running strong. Asset management, such that your fleet vehicles are properly licensed and permitted to IFTA / IRP guidelines, is a perpetual concern for commercial operators large and small. The forms required to be road-legal are substantial, not to mention the varying layers of state and federal regulations, expiration dates, use taxes, and other granular details. Not only that, but they need to be inspected periodically and ensured they are safe and maintained regularly. Everything we do revolves around taking your vehicles and equipment past the point of minimum compliance and safety standards. Your fleet has multiple data sources for GPS, maintenance issues, fuel use, e-DVIR’s, and more.
  • 3
    DocTract

    DocTract

    DocTract

    DocTract revolutionizes how organizations leverage key documents through a dedicated cloud solution with advanced collaboration capabilities . Policy Management, Procedure Management and Contract Management transform into true value added processes that directly enable organizations to collaborate, deploy and secure key documents . DocTract understands the special requirements needed to process Policies, Procedures, SOPs and Contracts. Built-in capabilities assist throughout the process from collaborating on revisions to approval levels and electronic signatures.
  • 4
    EVERFI

    EVERFI

    EVERFI

    EVERFI partners with organizations, institutions, and educators to revolutionize the way education is developed and delivered—using today’s technology to connect learning to the real world and equip communities with the skills they need for success in the 21st century. From STEM readiness to career preparedness to corporate compliance, EVERFI’s compelling, interactive and impact-driven digital content turns passive learners into capable leaders. Learn how our critical skills curriculum is changing the face of education, and find the EVERFI offering right for your education needs. We’d love to show you how our platform is opening new doors of opportunity for organizations, industries, and individual learners. So go ahead, give us a shout. Using cutting-edge technology, EVERFI is connecting learning to the real world by delivering research-backed education with a measurable impact.
  • 5
    EntityKeeper

    EntityKeeper

    EntityKeeper

    EntityKeeper simplifies the way you manage entities, org charts, and filing and compliance requirements across your organization. Our platform enables you to easily access real-time information, customize data fields, manage critical deadlines with notifications (like filing/tax dates), and create in-depth org charts. Additionally, our Corporate Services eliminates the need to manually govern entity filings, such as forming an entity, annual reporting, corporate documents for closing and more.
  • 6
    Mineral

    Mineral

    Mineral

    Our mission is to take the guesswork out of HR and compliance so you can manage workplace challenges with confidence. From expert guidance and resources to proactive alerts, we’re your one-stop ticket to a healthier organization. We don’t think you should spend your valuable time Googling how to stay compliant. That’s why we offer a comprehensive HR and compliance solution for businesses, powered by an innovative mix of technology, data, and human expertise. If it seems like HR and compliance laws are always changing, that’s because they are. At Mineral, we believe that no business should be caught off guard when laws or regulations change.
  • 7
    Privva Vendor Risk Management
    Automate your vendor security assessments. Build proprietary assessments to meet your firm policies. Manage and review your vendors from a single cloud-based platform. Assign assessments to vendors, manage access, and simplify workflow. Track status without managing multiple spreadsheets. Compare vendor responses against other vendors and industry benchmarks. Quickly score vendors and evaluate overall risk. Track progress and manage communication, including remediation, throughout the process. Now let’s start using the platform to evaluate risk profiles before parties gain access to your sensitive data. Instituting Privva as part of your standard operating procedure during the evaluation, contracting, and implementation tool holds all parties more accountable.
  • 8
    Sonrai Security

    Sonrai Security

    Sonraí Security

    Identity and Data Protection for AWS, Azure, Google Cloud, and Kubernetes. Sonrai’s public cloud security platform provides a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and 3rd party data stores. Uncover all identity and data relationships between administrators, roles, compute instances, serverless functions, and containers across multi-cloud accounts and 3rd-party data stores. Inside the platform, our critical resource monitor continuously monitors your critical data sitting inside object stores (e.g. AWS S3, Azure Blob) and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are monitored across multiple cloud providers and 3rd party data stores. Resolutions are coordinated with relevant DevSecOps teams.
  • 9
    Sparq

    Sparq

    Alida

    Sparq is a customer insights platform that uncovers actionable earned data. This relationship-based approach progressively profiles the customer at every interaction producing richer customer insights. Customer attributes like motivation, preference, and beliefs are translated into actionable data points. Deeper insights deliver value and improve customer acquisition, retention, and customer satisfaction. Progressive profiling delivers customer insights that can’t be obtained anywhere else. Sparq offers customers the best source of continuously updated insights about customer preferences, priorities, and buying behaviors, obtained with consent. Each Vision Critical customer is assigned a Customer Success Manager who provides guidance on best practices for recruitment and engagement developed over almost 20 years in the customer insights business.
  • 10
    youCompli

    youCompli

    youCompli

    youCompli is a comprehensive software solution, designed for the needs of healthcare compliance professionals. We monitor regulations, translate them into clear business terms, and empower compliance to manage and track the whole process, from end to end.
  • 11
    Mjlsi

    Mjlsi

    Hawsabah

    Mjlsi is a system that creates and manages meetings of boards of directors in all stages by preparing for the meeting, discussing the topics, documents, presentation, participation, decision making, assigning tasks and preparing the minutes of the meeting. The system provides all the necessary tools to organize meetings and prepare the agendas to be discussed before, during and after the meeting. It also helps to organize and manage the structure and governance of the board. The system allows invitations to be sent to the meeting and guest members and to confirm who is invited. The system provides the ability to organize and manage meeting times, ensure sequence of topics, vote and review files easily. After the meeting, the system shall be able to prepare the minutes of the meeting including its subjects and the results of the voting.
  • 12
    SAP Customer Consent
    SAP Enterprise Consent and Preference Management. Build customer relationships based on transparency and control using customer consent and preference management tools. Win customers’ trust with robust consent and preference management tools from SAP. Deliver the transparency and control over personal data that’s demanded by today’s customers. Address requirements of regional data protection laws such as GDPR, CCPA, and LGPD. With SAP Enterprise Consent and Preference Management solutions, you can manage customer consent, preference settings, and data from a central platform. Present clear consent requests for requirements such as terms of service, e-privacy policies, cookies, and consent marketing communication preferences. Collect, store, and track consent and preferences in a central repository within the right region, enabling access to a complete history or audit log.
  • 13
    Baycloud

    Baycloud

    Baycloud Systems

    Effective consent and privacy protection. Automatic website scanning and privacy preserving analytics. The consent panel is displayed when a user visits for the first time, or whenever they click on the CookieQ privacy button. At any time they can interact with it to agree or disagree with cookies or other storage, or personal data processing by any of the third-parties recorded there. Parties that are not recognised or the user has not given consent for will be blocked from appearing in the user's browser. We maintain a database of known cookies names and third-party domains so we can deliver accurate first-party cookie & third-party information to users. Baycloud supports a rich API which client JavaScript can use to interact with the Consent Platform. As well as the standard TCF 1.1 and 2.0 functions there is also the ability to request user consent or assign it in response to your own UI elements.
  • 14
    Aspida Mail
    Aspida Mail was developed with simplicity in mind. We know it's important for you to be able to continue with business as usual. Aspida Mail's setup is seamless and works with any IMAP enabled device. Aspida is HIPAA compliant encrypted email.
  • 15
    HIPAA Vault

    HIPAA Vault

    HIPAA Vault

    Our HIPAA Compliant Hosting & Cloud Solutions are the perfect solution for healthcare professionals and businesses in need of HIPAA Compliant secure cloud and website hosting services. HIPAA Vault’s Managed Services include less-than-15 minute response times for critical alerts, and 90% first call resolution. Our dedicated IT professionals handle everything from general support questions and maintenance, to more complex issues such as advanced firewall configurations and system monitoring. This can result in reduced operating costs, while giving you the latest in security updates and compliance. If you need a Windows environment and want peace of mind, you should go with our HIPAA Compliant Windows Hosting plan. Find the right HIPAA email messaging solution to match your business needs. Secure, convenient, and flexible.
  • 16
    LeapYear

    LeapYear

    LeapYear Technologies

    Differential privacy is a mathematically proven standard of data privacy that ensures all data can be used for analytics and machine learning without the risk of compromising information about individual records. LeapYear’s differentially private system protects some of the world’s most sensitive datasets, including social media data, medical information, and financial transactions. The system ensures analysts, data scientists, and researchers can derive value from all of the data, including data of highly sensitive fields, while protecting all facts about individuals, entities, and transactions. Traditional approaches, such as aggregation, anonymization, or masking degrade data value and can be easily exploited to reconstruct sensitive information. LeapYear’s implementation of differential privacy provides mathematically proven assurances that information about individual records cannot be reconstructed, while also enabling all of the data to be leveraged for reporting
  • 17
    Bearer

    Bearer

    Bearer

    Automate GDPR compliance by implementing Privacy by Design into your product development processes. Bearer helps you proactively find and fix data security risks and vulnerabilities across your application environment so you can prevent data breaches before they happen. Bearer helps security and development teams implement and monitor their data security policy at scale so they can prevent data breaches. Scan your applications and your infrastructure continuously to map sensitive data flows. Identify, prioritize and assess security risks and vulnerabilities that can lead to a data breach. Monitor your data security policy and empower your developers to fix issues on their own. Bearer’s detection engine supports 120+ data types, including personal, health and financial data, and adapts to your data taxonomy.
  • 18
    Dataminr

    Dataminr

    Dataminr

    Dataminr’s AI platform detects high-impact events and potential risks as they unfold, sending real-time alerts to your global teams. Know critical information first, respond with confidence, and manage crises more effectively across your enterprise. Dataminr Pulse gives you the earliest indications of high-impact events—plus rich visual context and tools that help you collaborate and act faster—so you can better protect your people, your brand and your physical and digital assets. Dataminr Pulse streamlines your team’s collaboration, response protocols and critical information flows—enabling real-time command and control as physical and cyber risks emerge and high-impact events unfold.
  • 19
    EddyCore
    Modern Credentialing and Enrollment Software EddyCore is a self-service, cloud-based software for credentialing, privileging, and enrollment. We provide best-in-class software and services that assist both healthcare organizations and providers, saving valuable time and resources. Integrated with EddyOne to allow for seamless collection of provider data. Industry-leading implementation speed with services to simplify your transition. Delegate verification and enrollment tasks while tracking action items in real-time. No modules. No feature limitations. Get the full power of Eddy right out of the box. Create unlimited non-provider accounts with no additional fees. Run numerous primary source verifications with the click of a button. EddyCore was designed by credentialing and enrollment experts to make life easier for anyone responsible for managing provider credentialing and enrollment.
  • 20
    Encamp

    Encamp

    Encamp

    Encamp’s end-to-end compliance platform makes it unbelievably easy to manage and automate all of your EHS documents, deadlines, permits, and tasks. With Encamp, you can achieve a 360-degree view of your EHS program so you can see exactly what you need to do every day to stay in compliance, with more consistency and confidence. From keeping up with Tier II reporting and EPCRA deadlines, to coordinating different teams across multiple facilities, Encamp helps EHS professionals deliver consistent processes and first-rate compliance programs, across all 50 states. Create site-specific compliance profiles and consolidate your data across every site in your organization. Stay on track with tasks tied directly to your compliance deadlines and obligations. Quickly access up-to-date state and federal forms for reporting, without searching through government websites. Automatically view compliance applicability across every facility in your organization.
  • 21
    Cyberwatch

    Cyberwatch

    Cyberwatch

    Manage all your vulnerabilities, from their detection to their correction. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch continuously searches for vulnerabilities published by the authorities (CERT-FR, NVD...) and present on your IT assets. Cyberwatch evaluates your vulnerabilities based on their CVSS score, the existence of an exploit, and the business context of the affected machine. Cyberwatch lets you make the right decisions using dashboards and simple actions (comment, exclude...). Cyberwatch natively embeds a Patch Management module, compatible with your infrastructure (WSUS / RedHat Satellite...). Define your compliance rules and control your information system. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch allows you to define your objectives thanks to an encyclopedia of rules with pre-sets.
  • 22
    MetaMap

    MetaMap

    MetaMap

    Regional data infrastructures, powering global identity verification. MetaMap is the first all-in-one identity verification platform built on regional data sources, consolidated on a global scale. Get to know your users in-depth, from local government checks to Global AML watchlists. A suite of identity verification tools to know your users in-depth. Verify your users without hurting your conversions rates. Quickly verify your users with our default SDK or build your own verification flow via our API. Our customers welcome up to 95% of users who successfully complete our verification flows at the first attempt. Automatically access our regional identity infrastructures, and get clean data from dozens of local databases consolidated in comprehensive user' profiles, no matter where you operate. Use MetaMap dashboard to reduce the time spent on manual verification through smart automation and workflows. You need advice? Our international Customer Success Team is here to help.
  • 23
    HawkScanner

    HawkScanner

    HawkScanner

    We're a financial technology company that allows Merchant Service Providers to quickly and confidently verify that their merchants aren't selling illegal products or ingredients. HawkScanner can store your ingredients and constantly check them against an FDA database through an easy-to-use search and notification system.
  • 24
    Azure Policy

    Azure Policy

    Microsoft

    Reduce the time needed to audit your environments by having all your compliance data in a single place. Set guardrails throughout your resources to help ensure cloud compliance, avoid misconfigurations, and practice consistent resource governance. Reduce the number of external approval processes by implementing policies at the core of the Azure platform for increased developer productivity. Control and optimize your cloud spend to get more value from your investment.
  • 25
    Medcurity

    Medcurity

    Medcurity

    Conduct your Security Risk Analysis in an intuitive tool with explanations, definitions, and examples throughout. Fulfill SRA requirements for MACRA/MIPS and Promoting Interoperability programs, while building an important gap analysis for your organization. The Security Risk Analysis produces an audit-ready final report. Medcurity also provides you with recommended, risk-stratified remediation actions. You can assign these to team members and track from our executive dashboard. Need updated policies? Medcurity provides Customizable Policies and Procedures for your HIPAA Security program. Build right-sized policies with our guided templates or upload your own as needed, and then share them with your entire team. Keep policies current and receive prompts prior to review dates, all from Medcurity’s platform. Track Business Associates in a process that truly makes sense.
  • 26
    Digital Agent
    Veriday Inc. is committed to helping our clients create engaging digital experiences for their users through the effective use of emerging technology. Digital transformation is critical for every kind of business. To make this a reality, we work alongside you through each phase of the journey. Through our collaboration and research, we identify opportunities in emerging technologies and processes like Digital Experience Platforms, Micro Services & Kubernetes, Machine Learning (AI), Design Thinking, Internet of Things (IoT), and Cloud Platforms to help improve your business efficiency and maximize your investment. Rethink how you enable a seamless experience for employees without any limitations. Put employees first with our digital workspace solutions that delivers secure and enhanced experiences while reducing costs and operational overhead.
  • 27
    Know Your Customer

    Know Your Customer

    Know Your Customer

    Know Your Customer’s award-winning solutions enable traditional as well as newly established organizations to deliver a fully digital yet completely secure onboarding experience for both corporate and individual customers, centralizing the KYC/AML process through a uniquely easy-to-use platform. Through Know Your Customer’s intuitive compliance platform and vast range of customer-facing tools (APIs, iOS/Android App, Web Portal), compliance teams can efficiently perform all necessary KYC and AML checks on both corporate and individual customers, reducing compliance teams’ manual work by up to 85%.
  • 28
    LSEG World-Check

    LSEG World-Check

    LSEG Data & Analytics

    Why choose LSEG World-Check? Help meet your regulatory obligations, make informed decisions, and prevent your business being used to launder the proceeds of financial crime or associated with corrupt practices. The LSEG World-Check database delivers accurate and reliable information to help you make informed decisions. It has hundreds of specialist researchers and analysts across the globe, adhering to the most stringent research guidelines as they collate information from reliable and reputable sources - such as watch lists, government records, and media searches. Simplify your customer and third-party screening process through state-of-the-art technology combined with human expertise. The World-Check data is fully structured, aggregated, and de-duplicated. It can be easily absorbed into various workflow screening platforms in-house, cloud-based, or third-party solutions through a delivery method that suits your requirements.
  • 29
    Bisnode

    Bisnode

    Dun & Bradstreet

    Manage customer touchpoints effectively, measure feedback in real-time, enhance customer experience and gain valuable insights based on smart data and analytics. Our market-leading Risk- and Credit management solutions are tailored to your needs, regardless of whether you are a large multi-market business or a small single-market startup. Remodel your customer relationships throughout the value chain, reduce waste and enhance performance with our Analytics Services – bespoke solutions satisfying your precise needs. Regardless of whether your business needs data about individual consumers, households, companies or industries, we have it easily accessible via API’s and web services.
  • 30
    Workscope

    Workscope

    Workscope

    What is Workscope? Workscope tackles spreadsheet sprawl by uniting discovery, streamlined governance, and workflow insights ➡️ delivering a cost-effective way to reduce data fragmentation and maximize ROI for process optimization. Who Uses Workscope? Financial Services Companies, Corporate Finance Departments, Change Management, Energy, Utility, Manufacturing, Engineering & Pharmaceutical Companies Where can Workscope be deployed? Cloud-based and On-premise