Best Compliance Software - Page 50

Compare the Top Compliance Software as of November 2025 - Page 50

  • 1
    BAM+

    BAM+

    Abrigo

    Your financial institution and risk profile are unique, and you deserve a powerful anti-money laundering software that matches that. BAM+ adjusts to your specific needs to better detect, manage, and resolve suspicious financial activity. Don’t settle for out of the box. Think bigger. Risk profiles are like fingerprints in that no two are the same. BAM+ is configurable to your institution’s unique customers, risk profile, tolerance levels, location, and needs. You'll benefit from better detection and faster resolution of the truly suspicious activity in your institution. All the financial crime-fighting power you need in one platform. Our anti-money laundering software allows you to streamline, manage, and report on everything in your program from one location. With BAM+, you get end-to-end case management, scenario analysis, fraud, OFAC and watchlist screening, front-line reporting of questionable activity,
  • 2
    Kokomo24/7®

    Kokomo24/7®

    Kokomo Solutions

    IMS solution that enables workplaces, schools, and communities to track and manage safety incidents powered by predictive analytics. We provide highly effective, easy-to-use, and trusted solutions that bridge the gap between emergent management challenges in health and safety and technology. Be better prepared to prevent, respond to, and recover from any maintenance or emergency issues that arise through one centralized dashboard. Improve your incident reporting by providing employees with the ability to either publicly or anonymously report incidents 24/7. Send customizable alerts via email, SMS, and mobile push notifications for both emergency and non-emergency events to keep everyone informed and connected (comes with an optional panic button feature). Create customizable forms for anyone for any purpose.
  • 3
    CartaHR

    CartaHR

    Access

    CartaHR is your command central for fast, secure, compliant access to all your employee documents in the cloud, integrated with your HRIS or HCM. Spend more time on the strategic initiatives that will put you and your team at the table with company leaders. Shift your focus away from manual employee document management systems, finding files, and records management. Turn it instead to employee engagement and retention initiatives, diversity and inclusion programs, and professional development. Securely share files with employees, managers, and third-party auditors with ease and confidence using our configurable HR document management software. Control access to any document or document type. Manage who has access to what and when. And maintain a detailed audit trail of all actions taken on each document.
  • 4
    ComplianceHR

    ComplianceHR

    ComplianceHR

    ComplianceHR offers the only on-demand suite of intelligent compliance applications focused on helping companies address the ever-changing federal and state employment law requirements on minimum wage, overtime, independent contracting, FMLA/leave and more. Your company’s employee handbook is an invaluable tool that helps shape company culture, communicates operational policies, and minimizes the risk of employment-related legal liability. A well-written and legally compliant handbook is essential to keeping the HR process running smoothly, and most employers would agree that keeping up with federal, state, and local employment laws can seem overwhelming. PolicySmart is an intuitive handbook compliance tool that provides employers with national and state-specific templates, a unique compliance timeline, and so much more.
  • 5
    iComply

    iComply

    iComply

    Institutional-grade KYC and AML compliance software to reduce cost and mitigate risk throughout the customer lifecycle. Create drag-and-drop widgets for easy deployment into any website or mobile app. Make sure the user behind the screen is the legal entity with whom you are contracted. Reduce cost, false positives, and manual processes with artificial intelligence. Easily configure and deploy secure, encrypted compliance widgets into your website or mobile application. Create unique KYC journeys, configure workflows, and customize styling to your brand. Copy and paste your compliance widget into any secure website or mobile application. Start onboarding clients immediately; provide staff secure remote access. Add widgets and update workflows at any time, such as e-signatures or REST API.
  • 6
    IndEx

    IndEx

    Terrington Data Management

    Built on Terrington's Transform data management software platform, IndEx is a proven, secure software package that enables you to proactively manage your hazardous area testing and inspection processes by performing mobile inspections on-site using ATEX certified PDAs and Android tablet devices. Designed to help you manage electrical and non-electrical inspections in potentially hazardous areas, IndEx can give you immediate access to data, early warning signs of equipment failure and immediate cost and time savings. IndEx is supplied with a full set of industry standard templates for all explosion protection types for rapid installation and ease of use, all of which are fully configurable to meet individual requirements. Visual, close and detailed inspection templates have been designed in line with the very latest IEC 60079-17 Explosive Atmospheres - Electrical Installations Inspection and Maintenance Standards (published late 2013).
    Starting Price: $9500 one-time payment
  • 7
    BCMsoft

    BCMsoft

    KMIR Consultants

    Your entreprise faces potential threats like natural disasters, cybercriminality, etc Whatever the event, don’t put your business at risk. Make sure that your Business Continuity Plan is ready and efficient with. Synchronized with company directories and applications. Web-base Business Continuity application. Mature & complete Saas or Site license main independent modules. Risk Management Business Continuity Internal Control. Build and maintain your BCP. Follows the 4 steps PDCA wheel. Easy integration of existing BCP. Compliant with ISO 22301 BCP standard. Relies on security and crisis standards like MEHARI, EBIOS, COSO, Basel, SOX, etc. Risk Management module. Identify major company risks Assess risks in line with Basel III recommendations. Manage inherent and residual risks. Mitigate risks and manage action plan. Monitor KRI. Business Continuity Module. Assess the major company processes. Assess the major company assets. Design the BIA Design test scenario.
  • 8
    Interfacing Digital Business Platform
    Interfacing’s Digital Business Platform uses flow management technology that illustrates tasks and works in a flow diagram, focusing on the people performing the tasks and their individual roles. Digital Business Platform can help companies build, improve, and share processes from a central repository. Business rules can then be applied at any stage of the workflow to automate tasks or minimize manual intervention. The ability to track and provide status reports throughout each phase of a process allows for accurate performance and coordination across manual and systemized tasks. Having our Digital Business Platform along with our EPC system will definitely strengthen collaboration between IT development and operations, streamline test, automate workflows, and offer big bottom-line benefits. Interfacing’s digital business platform – Rapid Application Development (RAD) Tools, with its Low-Code Development methodology will optimize usage of your technical resources.
  • 9
    HAYAG

    HAYAG

    HAYAG

    HAYAG customizes compliance solutions as per your unique organization needs. No matter what your need is, HAYAG’s compliance solutions present the tools you require to meet your challenge. With HAYAG, you can turn compliance along with internal standards and regulatory requirements from discomfort to comfort. Accomplish strategic advantage by dealing with laws and industry-specific governance. Get the freedom to concentrate on the vital and economic aspects of your business. Rest assured that our compliance management systems are dynamic and could adapt based on modifications and updates made to the regulatory framework. Establish a culture of compliance and make meeting external and internal regulatory requirements another positive aspect of your customer engagement strategy. No matter if you are striving to respond to data protection such as GDPR, or answering industry-focused expectations, HAYAG can be your reliable compliance partner.
  • 10
    Locate Global

    Locate Global

    Locate Global

    Global Incident Management Solution. How it works. Simplify safety and increase resilience. Simplify safety & increase resilience. Do business safely, anywhere in the world with technology you can rely on. Locate team members and track journeys to manage risk, quickly communicate critical information, and empower employees to send an SOS simply. Monitor: Real-time global visibility. Monitor. Real-time global visibility. Manage all incidents and users easily from our central cloud-based dashboard. Pinpoint accuracy and concise information helps you make critical decisions fast, no matter when or where the event occurs. Respond: Act on critical events instantly. Respond. Act on critical events instantly. Look after your people with a smart response to any incident, anytime, anywhere. Helps to meet duty of care and maintain business continuity with tools to initiate the right response and communicate to the right people.
  • 11
    Risk HR

    Risk HR

    Logical Commander Software

    How Does It Work In Real Time? RISK HR & EmoRisk systems interact under a smart platform, fast, simple and with real-time results. ​ Allowing our clients to save time and at the same time improve effectiveness, internal risk management and process information in different areas of the organization in an effective way, helping management make immediate decisions. Our SaaS solutions, through advanced algorithms, AI, big data processing and machine learning, are capable of detecting and measuring various psychophysiological reactions that are indicative of changes in the perception of the evaluated part, alerting the administrative system to risk tendencies or reliable risks within the organization. Additionally, our software adapts to the needs and size of your business, allowing its use on a large scale. Based on the assessments conducted, organizations can identify, locate, and monitor the nature of the inherent risk, manage it, and take their mitigation measures
  • 12
    AWS Security Hub
    Centrally view and manage security alerts and automate security checks. AWS Security Hub gives you a comprehensive view of your security alerts and security posture across your AWS accounts. There are a range of powerful security tools at your disposal, from firewalls and endpoint protection to vulnerability and compliance scanners. But oftentimes this leaves your team switching back-and-forth between these tools to deal with hundreds, and sometimes thousands, of security alerts every day. With Security Hub, you now have a single place that aggregates, organizes, and prioritizes your security alerts, or findings, from multiple AWS services, such as Amazon GuardDuty, Amazon Inspector, Amazon Macie, AWS Identity and Access Management (IAM) Access Analyzer, and AWS Firewall Manager, as well as from AWS Partner solutions. AWS Security Hub continuously monitors your environment using automated security checks based on the AWS best practices and industry standards.
  • 13
    Soterion

    Soterion

    Soterion

    A powerful, size-sensible GRC application for companies that require on-premise solutions. Ideal for smaller companies that have internal GRC resources. Reasons to believe. A complete On-Premise GRC solution that's a pleasure to use. Powerful, Size-Sensible Features. All the GRC features your business actually needs without complex, unnecessary functionality. Risk-rule-set@2x Intuitive and Easy to Use. We've completely re-imagined the GRC user experience from the ground up, making Soterion a pleasure to use. Our business-friendly reporting tools allow focused reports by business area. audit-surprise@2x. Insights as You Need Them. Avoid external audit surprises by viewing easy-to-understand access risk reports as and when you need to. Pay-as-you-go@2x Cost-Effective GRC Alternative. Get excellent value on all the on-premise GRC functionality your business actually needs, without paying a premium for enterprise features typically only required by the largest global companies
  • 14
    Blockpass

    Blockpass

    Blockpass

    KYC Connect Comprehensive KYC-as-a-Service for Regulated Industries. Seamless and affordable onboarding of your customers using the Blockpass secure eKYC system. Blockpass users create a reusable identity before signing up for your service, meaning that documentation delivery and verification is streamlined. Why Choose KYC Connect™? Start Immediately. Free Testing. Pay-as-You-Go. No Setup Cost. A comprehensive set of features make KYC Connect™ indispensable for seamless customer onboarding. A full service solution. KYC Connect™ is Blockpass’ all-in-one flagship product - a full service, comprehensive solution for all onboarding needs. Identity verification checks. This basic identity check verifies the authenticity of the customer’s identity document and validates their name and date of birth. AML & PEP screening. Comply with AML regulation. KYC Connect™ includes advanced AML screening, ongoing monitoring, PEP and Adverse Media screening. Lowest cost compliance
  • 15
    Data Theorem

    Data Theorem

    Data Theorem

    Inventory your apps, APIs, and shadow assets across your global, multi-cloud environment. Establish custom policies for different types of asset groups, automate attack tools, and assess vulnerabilities. Fix security issues before going into production, making sure application and cloud data is compliant. Auto-remediation of vulnerabilities with rollback options to stop leaky data. Good security finds problems fast, but great security makes problems disappear. Data Theorem strives to make great products that automate the most challenging areas of modern application security. The core of Data Theorem is its Analyzer Engine. Utilize the Data Theorem analyzer engine & proprietary attack tools to hack and exploit application weaknesses continuously. Data Theorem has built the top open source SDK called TrustKit, used by thousands of developers. Our technology ecosystem continues to grow so that customers can continue to secure their entire Appsec stack with ease.
  • 16
    PlexTrac

    PlexTrac

    PlexTrac

    PlexTrac is the #1 AI-powered platform for pentest reporting and threat exposure management, helping cybersecurity teams efficiently address the most critical threats and vulnerabilities. By consolidating data, automating reporting, prioritizing risks, and streamlining remediation workflows, PlexTrac reduces organization’s overall threat exposure. We designed the PlexTrac platform to address the workflow pain points security practitioners face. PlexTrac helps them track signal through the noise and break down communication silos. Combining “plexus” and “track,” our name really says it all. PlexTrac exists to network and coordinate all people and parts of a security program and to better track progress toward maturity.
  • 17
    AuditKind

    AuditKind

    Linac Technology

    AuditKind Protecting our world & making it a safer place to be. World-class health & safety and environment software. Powerful Environmental, Health & Safety Solutions. We’re in the business of providing peace of mind and our powerful environmental, health & safety solutions help health & safety teams to do just that. AuditKind's dynamic, build as you go auditing module ensures the very highest standards for health, safety and environmental compliance are met. Our software targets and significantly reduces risk, helping to track and control viral contamination outbreaks, creating a zero tolerance safety-first culture. Key Features​. Any Device, Anywhere, 24/7. Access from any device. The mobile experience is fast, intuitive and powerful. Pre-built templates speed up the process of modifying and building new checklists. Conditional logic hides and shows questions and fields based on previous responses. We work with you to ensure your solution is exactly customized to your needs.
  • 18
    JExperts Channel Platform
    Value Management Office. In many organizations, the project office has sought to play a greater role in generating the organization's results and has been expanding its responsibility, assuming a transformational role. With this, the concept of VMO - Value Management Office - appears, in which the project office becomes an active agent in the implementation of the strategy. With that in mind, JExperts developed a management platform that connects strategy, investments, governance and routine in a single solution, natively integrated: the Channel Platform. Channel: Strategy and execution. The Channel Platform enables the integrated adoption of management models for strategy, projects, performance and risks, with traceability between all contexts, promoting the strengthening of governance processes and supporting in practice the unfolding of the strategy in the company's daily routines. An integrated management model allows for more efficient controls.
  • 19
    eLamp

    eLamp

    eLamp

    We Are The skills at the heart of your operations! Track your critical skills and intelligently staff your teams. eLamp, a transversal and multi-actor solution. Business departments, HRD or CIO: The particularity of eLamp is to offer a business-oriented solution, which through skills, improves both HR processes and operational performance. A solution. Each BU, subsidiary, or business vertical has its own issues. We address each of them, around a unique solution. Certification & Compliance. Save time in maintaining certification and regulatory skills! Certifying and regulatory skills are complex objects to handle. Our Skill Master interface allows you to fully configure all of these rules: List of specific skills per employee. Different obsolescence durations. Different loss & discount rules. Cascading loss of competence. Specific training to be assigned. Specific evaluation actions to be carried out. Generation of official forms and documents.
  • 20
    ClearForce

    ClearForce

    ClearForce

    ClearForce, Secure Your Organization, Promote a Trusted Environment. 24/7 Employee Risk Management. Risk Management Means Spotting & Mitigating Employee Stress. Pre-Hire Background Checks Aren’t Enough. Why ClearForce? The ClearForce Resolve™ platform protects organizations and employees through the continuous evaluation of risky behavior. It delivers real-time, event-based alerts of external employee misconduct and high-risk behavior that may present a level of risk to the organization, its employees, or its customers. In addition, ClearForce Resolve™ is the only cross-departmental platform that enables HR, Security and Legal to work together in a single, centralized environment—investigative work is streamlined and efficient. All external and internal behavioral alerts, incident reports and complaints are centrally captured, archived, and adjudicated within the Resolve system. Resources previously needed to aggregate, research, and match data points can now be redirected.
    Starting Price: $15000 per user, per year
  • 21
    iManSys

    iManSys

    domeba distribution

    With our software solution iManSys you meet your business obligations and comply with the applicable legal regulations. For a safe, simple and effective working environment! 7 software worlds for occupational safety. With our software solution iManSys you fulfill your business obligations, increase your legal security and fulfill all compliance requirements. As a full-service provider in the areas of health protection, occupational safety and quality management, we advise and support you in the design and implementation of a compliance management system in your company. With our software solution iManSys you fulfill your business obligations, increase your legal security and fulfill all compliance requirements. In our extensive online library you will find various whitepapers on occupational health and safety, the issues of our domeba magazine with the success stories of our users as well as information material on our HSQE software solution iManSys.
  • 22
    Stacklet

    Stacklet

    Stacklet

    Stacklet builds on the Cloud Custodian project to offer an out-of-the-box solution with powerful management capabilities and advanced features to help businesses realize value. Stacklet is built by the original developer and maintainer of Cloud Custodian. Cloud Custodian is used by thousands of well-known global brands today. The project’s community has hundreds of active contributors including Amazon, Microsoft and Capital One and is growing rapidly. Stacklet provides a best-of-breed solution for cloud governance addressing needs around Security, Cost Optimization and Regulatory Compliance. Tooling to manage Cloud Custodian at scale across thousands of cloud accounts, policies and regions. Access to best practice policy sets which solve business problems out-of-the-box. Data and visualizations to understand policy health, resource auditing, trends and anomalies. Real-time inventory, historical revisions and change management of cloud assets.
  • 23
    Adlar Internal Audit Management System
    A cloud based risk assessment & internal audit system with remote access and customization workflow and management reports. Internal Audit Management Solution is a cloud based system with built-in capabilities to analyse data pertaining to Risk, Audit, Finding and Action Plans and provides built-in customizable reports in graphics format as well as data tables. These graphs and data tables facilitate the identification of pain points and areas to improve as well as areas where controls are performing effectively and where management focus is needed. Our Risk Assessment & Internal Audit Management Solution comes with built-in algorithms engineered to generate data according to timeline, department, and function. All the data points are organized clearly so that senior managers can receive a quick glimpse of all the processes, risks, and audit points necessary to make informed decisions to their findings and action plans.
  • 24
    Fyllo

    Fyllo

    Fyllo

    Data, media, retail and regulatory solutions that enable organizations to streamline compliance and scale with speed. The Fyllo Compliance Cloud is a suite of software and services built to overcome the complexities of highly regulated industries. We deliver data, media, retail and regulatory solutions that enable organizations to streamline compliance, increase efficiencies, and scale with speed. Mainstream brands also seek out Fyllo’s Data Marketplace to target previously inaccessible cannabis and CBD consumers. The Fyllo Compliance Cloud is a suite of data, media, retail and regulatory solutions that enable organizations to streamline compliance and scale with speed. Spark innovation with access to better audience data and regulatory intelligence. Arm your teams with market-leading solutions powered by AI and machine learning. Go bigger and grow faster with trust and confidence in compliance.
  • 25
    Empowered LMS

    Empowered LMS

    Enthralltech

    Your workforce’s knowledge, expertise and competence are at the heart of your organization’s productivity. Let us help you to maximize it. We would like to partner with you and deliver customized learning solutions that produce extraordinary results for your business. We get it. Deciding whether you need learning solutions for your organization can be difficult. And even if you’ve already elected to opt for such a solution, you’re probably wondering how much of it you’d actually need. Let us put your mind at ease. Here are a few pointers that’ll help you assess your learning requirements. We provide consultation services to devise optimal learning strategies for our clients that penetrate the roots of their issues. We design and develop future-ready, technology-based learning solutions for multiple training including concept training, compliance training, soft-skill development, application training and a lot more.
  • 26
    AU10TIX

    AU10TIX

    AU10TIX

    AU10TIX, an identity management company headquartered in Israel, is on a mission to obliterate fraud and further a more secure and inclusive world. The company provides critical, modular solutions to verify and link physical and digital identities so businesses and their customers can confidently connect. Over the past decade, AU10TIX has become the preferred partner of major global brands for customer onboarding and customer verification automation. AU10TIX takes verification and authentication to a whole new level of scalability. The power of deep learning lies within the input – the more you feed it, the smarter it becomes. This enables you to scale consumer onboarding and exponentially scale your business. With over 5% of the world identities already scanned and verified, fortune 500 companies are powered by AU10TIX, wiping out fraud while confidently focusing on growth. Our identity has changed over the years. Our principles & pioneering vision haven’t.
  • 27
    Quantifind Graphyte
    Quantifind’s data analytics platform has been used for over a decade by governments and Fortune 50 companies to gain insights from a comprehensive array of public sources. Its success is rooted in its fusion of science with design; machine learning innovations with intuitive, feature-rich web applications and APIs. Today, Graphyte is used to combat financial crime risk. Its accuracy and features enable our customers to improve the efficiency of their AML investigations by 40% or more. Corporate data, law enforcement, regulatory, registrations, leaks, PEPs, sanctions, enforcement actions, barred and banned lists, and social media. Quantifind technology is leveraged throughout the investigation workflow to gain efficiencies in every step of the process. A powerful web application with a consumer-grade UX lets investigators find what they’re looking for fast.
  • 28
    Klara

    Klara

    Klara Technologies

    Secure messaging, remote monitoring and video visits, all on one platform. Klara’s powerful patient communication platform unifies all patient workflows in one place. Automate key patient touchpoints and streamline workflows for all visit types to create a 5-star-worthy patient experience. Connect with your patients remotely using secure messaging and video visits that work together as one seamless experience. No login, email, or app download required for patients. Allow patients – new and old – to chat your staff straight from your website. Increase appointment bookings and capture patient demand 24/7. Digitize your forms so patients can complete them using their own devices. Requests are delivered by text to ensure patients actually see the message and sign the forms quickly. Messages are automatically routed to shared inboxes, where multiple team members can respond to questions or pick up tasks that are relevant to their specific team.
  • 29
    Cortex Cloud

    Cortex Cloud

    Palo Alto Networks

    Cortex Cloud from Palo Alto Networks is a cutting-edge platform designed to provide real-time cloud security across the entire software delivery lifecycle. By combining Cloud Detection and Response (CDR) with advanced Cloud Native Application Protection Platform (CNAPP), Cortex Cloud offers unified visibility and proactive security for code, cloud, and SOC environments. It enables teams to prevent and respond to threats quickly with AI-driven risk prioritization, runtime protection, and automated remediation. With seamless integration across multicloud environments, Cortex Cloud ensures scalable and efficient protection for modern cloud-native applications.
  • 30
    Secureframe

    Secureframe

    Secureframe

    Secureframe helps organizations get SOC 2 and ISO 27001 compliant the smart way. We help you stay secure at every stage of growth. Get SOC 2 ready in weeks, not months. Preparing for a SOC 2 can be confusing and full of surprises. We believe achieving best-in-class security should be transparent at every step. With our clear pricing and process, know exactly what you’re getting from the start. You don’t have time to fetch your vendor data or manually onboard employees. We’ve streamlined every step for you, automating hundreds of manual tasks. Your employees can easily onboard themselves through our seamless workflows, saving you both time. Maintain your SOC 2 with ease. Our alerts and reports notify you when there’s a critical vulnerability, so you can fix it quickly. Get detailed guidance for correcting each issue, so you know you’ve done it right. Get support from our team of security and compliance experts. We strive to respond to questions in 1 business day or less.