Best Compliance Software in the UK - Page 8

Compare the Top Compliance Software in the UK as of November 2025 - Page 8

  • 1
    WorkRamp

    WorkRamp

    WorkRamp

    WorkRamp is a modern training platform that enables companies to effectively onboard, train, and track their employees. Through self-guided activities, personalized testing, and interactive certification exercises, WorkRamp allows companies to build custom training that meets the needs of each team and department. WorkRamp is ideal for companies of with 50-500 employees who seek to reimagine employee training. Click on the free trial link above to join the ranks of Square, Intercom and Paypal. Bridge the gap between strategy and execution with WorkRamp. WorkRamp is an enterprise training and enablement software that helps companies perform at their highest levels. With WorkRamp, employees can become more productive through structured activities, shadowing, and interactive certification exercises. It offers deep integrations with existing tools like Zendesk, HRIS, Slack, and SFDC.
    Starting Price: $20.00/month
  • 2
    objectiF RPM

    objectiF RPM

    microTOOL

    Enterprise software for enhanced business agility. objectiF RPM offers features for project, portfolio, requirements, test, risk and workflow management. Visualize requirements, goals and processes with UML/SysML diagrams, manage backlogs on different levels of granularity (from business use case to user story), define workflows and patterns for recurring set-ups, plan taskmanagement with Kanban boards, run queries across multiple projects and collaborate efficiently with distributed teams on one single source of information. The software is highly customizable, integrable and extensible and can be specifically tailored to your individual corporate needs. It offers templates for agile and hybrid project management, digitization programs and projects following the Scaled Agile Framework®, SAFe.
    Starting Price: 129 €/month/concurrent user
  • 3
    CloudSploit

    CloudSploit

    CloudSploit

    Cloud security best practices as a service. CloudSploit is the leading open source security configuration monitoring tool for cloud infrastructure. Cloud security experts from around the world collaborate to create a repository of tests for cloud infrastructure such as AWS, Azure, GitHub, and Oracle Cloud.
    Starting Price: $7.17/month
  • 4
    Board Papers

    Board Papers

    Pervasent

    Installed in a SharePoint site collection, the Board Papers board portal lets you quickly set up meetings and create agendas to organize your documents. Agendas and documents are then published to an intuitive book-like app on participants' iPads, laptops, and mobile devices for on and offline access. In the app, board members and meeting attendees mark up documents with pen and highlighter tools, add and share notes, and electronically sign pages. Votes are cast with a single click. Participants come to meetings prepared, and that means shorter, more effective meetings. Board Papers is used by large and small organizations in over 30 countries to deliver electronic board books and meeting packs for all types of meetings. Key benefits of Board Papers: - All of your documents are stored in your Microsoft 365 tenancy, making security and permissions seamless. - Affordable for any sized organization. - Simple book-like app, all tools are just a tap or click away. Directors
  • 5
    GRC Envelop

    GRC Envelop

    Arambankudyil Consultancy

    Envelop is a risk management, audit workflow, and document management system. You can easily create and manage risks, and audits, attach work papers and create reports. Web application. Risk Management, Audits (process, objective, risk, control, test, finding and action) framework. Built-in report generator. Simple user interface and web-based! Flexible for internal control, SOX compliance, ISO 27001, PCI DSS, Internal Financial Controls, and many more. Workpapers can be attached at all levels, to an audit, process, objective, risk, control or test. Worried about reliability or budget? Use the free and open-source community version. MIT license is provided. We can host the community version for you! Envelop is a risk and audit management tool.
  • 6
    Creatrix Campus
    Creatrix Campus is a purpose-built higher education software suite that drives digital transformation by impacting across higher ed campuses. The software offers unmatched efficiency by automating end-to-end student and faculty lifecycle management, teaching, and learning, and institutional excellence with modules including; Student CRM, Admissions and Enrollment, Student Information System (SIS), Learning Management System (LMS), Course Evaluation, Faculty Management System (FMS), Outcome-Based Education (OBE), Competency-Based Education (CBE), Assessments, Scheduling, Accreditation, Strategic Planning Analytics, and a lot of other advanced software solutions. The integrated software is flexible, scalable, and works the way you want. It’s configurable over customization, adapting to the peculiar needs with the world’s best higher education workflows, powerful dashboards, data mappings, import & rules engines, setup wizards, form, menu, report builders, and push notifications. Wit
  • 7
    Analytica

    Analytica

    Lumina Decision Systems

    BI tools provide beautiful dashboards and reports that allow users to explore patterns in historical data. And past data can lead to insights. But it can never be prescriptive. Knowledge about what could happen, especially in unprecedented situations, and how to make it happen can only be achieved with Model-Driven decision-making. Analytica is a unique visual software environment for building, exploring, and sharing quantitative decision models that generate prescriptive results. Transcend cumbersome spreadsheets. Analytica’s scalability, power, flexibility, and clarity will be a revelation. Build transparent models using Analytica in a fraction of the time needed for procedural languages like R or Python. Get insights not just numbers. Use agile modeling to create models for effective business decision-making. Estimate risk and uncertainty using efficient probabilistic simulation. Smart sensitivity analysis shows what matters and why.
  • 8
    TimeTrex

    TimeTrex

    TimeTrex

    Rules can be automatically applied to specific employees or situations to automate all calculations, including overtime, premiums and multiple pay rates! Managers can remotely monitor and get up to the second reports regarding employee time and attendance, from anywhere at anytime. Eliminate waiting until the end of the pay period to review attendance records. Setup an unlimited number of accruals to automatically track employee vacations, sick days or banked time. Employees can also see their own accrual balances, eliminating time-consuming requests to human resources to lookup that information. Management has fine-grained control and tracking over where employees are able to punch in/out from, including down to the device and GEO fence level. Allocate time to jobs / tasks and track employee expenses while in the field. Handle employee skills / qualifications and process payroll with just a few clicks.
    Starting Price: $2.90 per month
  • 9
    Avantra

    Avantra

    Avantra

    With nearly 20 years experience helping Enterprises and Managed Service Providers (MSPs) globally to better manage their SAP and cloud landscapes, we know what it takes to deliver better service, productivity, innovation and compliance to businesses who rely on SAP. Founded in Switzerland with global presence in UK, USA, Germany and Australia we are well placed to support the largest SAP customers and Managed Service Providers.
  • 10
    Skybox Security

    Skybox Security

    Skybox Security

    The Skybox approach to risk-based vulnerability management starts with fresh vulnerability data from your entire network — physical IT, multi–cloud and operational technology (OT). Skybox uses a wide range of sources, including asset and patch management systems and network devices, to assess vulnerabilities without a scan. We also collect, centralize and merge data from multiple scanners to give you the most accurate vulnerability assessments on demand. Centralize and enhance vulnerability management processes from discovery to prioritization and remediation. Harness the power vulnerability and asset data, as well as network topology and security controls. Use network modeling and attack simulation to find exposed vulnerabilities. Augment vulnerability data with intelligence on the current threat landscape. Know your best remediation option, including patching, IPS signatures and network–based changes.
  • 11
    Qualys VMDR
    The industry's most advanced, scalable and extensible solution for vulnerability management. Fully cloud-based, Qualys VMDR provides global visibility into where your IT assets are vulnerable and how to protect them. With VMDR 2.0, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure its true risk, and track risk reduction over time. Discover, assess, prioritize, and patch critical vulnerabilities and reduce cybersecurity risk in real time and across your global hybrid IT, OT, and IoT landscape. Quantify risk across vulnerabilities, assets, and groups of assets to help your organization proactively mitigate risk exposure and track risk reduction over time with Qualys TruRisk™
  • 12
    K2View

    K2View

    K2View

    At K2View, we believe that every enterprise should be able to leverage its data to become as disruptive and agile as the best companies in its industry. We make this possible through our patented Data Product Platform, which creates and manages a complete and compliant dataset for every business entity – on demand, and in real time. The dataset is always in sync with its underlying sources, adapts to changes in the source structures, and is instantly accessible to any authorized data consumer. Data Product Platform fuels many operational use cases, including customer 360, data masking and tokenization, test data management, data migration, legacy application modernization, data pipelining and more – to deliver business outcomes in less than half the time, and at half the cost, of any other alternative. The platform inherently supports modern data architectures – data mesh, data fabric, and data hub – and deploys in cloud, on-premise, or hybrid environments.
  • 13
    Digital Defense
    Providing best-in-class cyber security doesn’t mean blindly chasing the latest trends. It does mean a commitment to core technology and meaningful innovation. See how our vulnerability and threat management solutions provide organizations like yours with the security foundation needed to protect vital assets. Eliminating network vulnerabilities doesn’t have to be complicated, even though that’s what some companies would have you believe. You can build a powerful, effective cybersecurity program that is affordable and easy to use. All you need is a strong security foundation. At Digital Defense, we know that effectively dealing with cyber threats is a fact of life for every business. After more than 20 years of developing patented technologies, we’ve built a reputation for pioneering threat and vulnerability management software that’s accessible, manageable, and solid at its core.
  • 14
    Dropsuite

    Dropsuite

    Dropsuite

    Dropsuite is a cloud software platform enabling businesses and organizations globally to easily backup, recover and protect their important business information. Dropsuite’s commitment to advanced, secure, and scalable cloud technologies keeps us in the forefront of the industry and makes us the choice of leading IT Administrators and Service Providers globally. Dropsuite's cloud-based email archiving solution helps any organization efficiently store, safeguard, manage, and discover data from most email systems such as Microsoft Exchange Online, Hosted Exchange, G Suite Gmail, and IMAP or POP protocols.
  • 15
    EZ-GO Platform

    EZ-GO Platform

    EZ Factory

    EZ Factory is a SAAS Company with a software solution called “the EZ-GO platform”. This is a mobile solution, with a focus on continuous improvement within production environments. The simple and visual software platform is used in factories to digitize checklists, work instructions, first-line maintenance tasks, and audits to improve safety, quality, training and efficiency on the shop floor. Front-line factory workers finally know what to do, why, where, when, and how to do it. Improve safety, quality and efficiency by digitizing paper forms, lists and other documents on the shop floor. The EZ-GO platform is a mobile solution, with a focus on continuous improvement within production environments. The simple and visual app is used in factories to digitize checklists, first line maintenance tasks and audits. Furthermore, the solution offers the possibility to setup work instructions and motivates operators to propose improvements.
  • 16
    Z2Data

    Z2Data

    Z2Data

    Get instant access to 1 Billion+ components' data ranging from lifecycle status, lifecycle forecast, regulatory compliance, market availability, cross references and more. Easily upload your Bill of Materials and Approved Vendor Lists to run detailed reports and risk analyses. Exporting data to a variety of formats is simple and you can even automatically integrate with leading PLM tools. Monitor your supply chain instantly by mapping your components to suppliers' manufacturing sites such as FABs, factories and assemblies. Compare location site risk and conduct disaster mitigation planning easily with Z2Data's Risk Scores for supply chain. What-if analysis for supplier sites enable you to prepare for disaster recovery and comply with business continuity goals. Manage supplier selection risk by accessing data on over 20,000+ suppliers.
  • 17
    Jit

    Jit

    Jit

    DevOps ain’t easy! We are hearing more and more about the breakdown and friction where Dev meets Ops, so let’s not even talk about all the other shift-left domains that add another layer of complexity in the middle like DevSecOps. Where this comes with the need to implement and integrate dozens of security tools in their SDLC. But what if it doesn’t have to be difficult? Jit's DevSecOps Orchestration Platform allows high-velocity Engineering teams to own product security while increasing dev velocity. With a unified and friendly developer experience, we envision a world where every cloud application is born with Minimal Viable Security (MVS) embedded and iteratively improves by adding Continuous Security into CI/CD/CS.
  • 18
    OneTrust Privacy Automation
    Go beyond compliance and build trust through transparency, choice, and control. People demand greater control of their data, unlocking an opportunity for organizations to use these moments to build trust and deliver more valuable experiences. We provide privacy and data governance automation to help organizations better understand their data across the business, meet regulatory requirements, and operationalize risk mitigation to provide transparency and choice to individuals. Achieve data privacy compliance faster and build trust in your organization. Our platform helps break down silos across processes, workflows, and teams to operationalize regulatory compliance and enable trusted data use. Build proactive privacy programs rooted in global best practices, not reactive to individual regulations. Gain visibility into unknown risks to drive mitigation and risk-based decision making. Respect individual choice and embed privacy and security by default into the data lifecycle.
  • 19
    Prembly

    Prembly

    Prembly

    Prembly is the go-to simplified KYC/KYB solution company, enabling digital businesses acquire and onboard customers with ease through tools that can be accessed for instant Data verification, Document Verification, and Biometric Authentication.
    Starting Price: $0.5/API Calls
  • 20
    Redact

    Redact

    Redact.dev

    Redact empowers individuals and businesses to privately and securely automate the removal of their user generated content from nearly every major platform. Strengthen your privacy and security with smart deletion, keyword scanning and complete content wipes. Download Redact today and take control of your digital footprint. Redact is a Privacy first company.
    Starting Price: $34.99
  • 21
    heyData

    heyData

    heyData

    Implementing data protection guidelines in your company has never been so easy as with heyData's premium software-as-a-service solution. More than 1,000 companies already rely on heyData’s all-encompassing data protection solution. Streamline compliance-related workflows to free up valuable time for day-to-day operations. Use the heyData platform to assign training to your employees and enter into agreements with them, such as confidentiality agreements or home office policies. These documents can be signed digitally via the platform. Your employees can use the heyData platform to familiarize themselves independently with various compliance topics, such as the General Data Protection Regulation (GDPR). A certificate of completion provides the necessary proof of the training. You can store your data protection-relevant documents in the heyData document vault, securely stored on German servers. This includes automatically generated audit reports and data protection notifications.
    Starting Price: €89 per month
  • 22
    SAP Litmos LMS
    SAP Litmos is a SAAS/Cloud platform for e-learning, also known as a learning management system or LMS. SAP Litmos cloud-based LMS is intended to get learners engaged with great user experiences anytime, anywhere, on any device. SAP Litmos LMS allows you to create courses and learning paths utilizing video, audio, text, surveys, and more in SCROM, Tin Can, or AICC. An LMS gives training professionals everything they need to manage their entire training program from one secure, centralized environment. A cloud-based solution that unifies virtual, classroom, mobile, and social learning, SAP Litmos LMS empowers training departments, sales and service leaders, safety and compliance managers, and HR teams to collaborate, author, globally distribute, and track web-based training courses, as well as schedule and track instructor-led courses. It automates formerly burdensome tasks so that teams can focus their energy on aligning training with the company’s strategic agenda.
  • 23
    AuditBoard

    AuditBoard

    AuditBoard

    AuditBoard transforms how audit, risk, and compliance professionals manage today’s dynamic risk landscape with a modern, connected platform that engages the front lines, surfaces the risks that matter, and drives better strategic decision-making. More than 25% of the Fortune 500 leverage AuditBoard to move their businesses forward with greater clarity and agility. AuditBoard is top-rated in audit management and GRC software on G2, and was recently ranked as one of the 100 fastest-growing technology companies in North America by Deloitte. To learn more, visit: auditboard.com.
  • 24
    TurnKey Lender

    TurnKey Lender

    TurnKey Lender

    TurnKey Lender is a one-stop lending infrastructure used by creditors in 50+ countries to automate all elements of their operations. The platform enables lenders to profitably grow their business while cutting operational costs and risks. It's a powerful AI-driven SaaS that automates over 90% of all lending processes and gives both B2C and B2B lenders a competitive edge. TurnKey Lender Platform has several pre-configured solutions packages including Commercial, Consumer, Pay Later, Auto, Mortgage, Leasing, Factoring. Built in constant collaboration with lenders worldwide, TurnKey Lender is the ultimate solution that answers real-life digital lending challenges in a sophisticated manner.
  • 25
    Ideagen Internal Audit
    Ideagen Internal Audit (formerly known as Pentana Audit) gives you total oversight and control of internal audit activity. Over 10,000 auditors use it every day to limit their company’s exposure to risk, and to provide assurance with confidence. They work to a higher and more consistent standard in a modern SaaS platform that’s built for purpose. Ideagen Internal Audit is a built for purpose SaaS platform that brings your whole audit universe into focus. It empowers internal auditors to get more done, to a higher standard, by cutting the time spent managing systems and chasing updates. With integrated enterprise risk data, audit teams can focus their plans and resources on the issues that really matter. Every audit is completed to the same standard and methodology, so that reporting becomes more accurate.
  • 26
    Polarion REQUIREMENTS
    Effectively gather, author, approve and manage requirements for complex systems across entire project lifecycles. Facilitate synchronicity and easy access via 100% browser-based access to all Polarion data. Enable real-time communication between analysts, engineers, QA members and DevOps teams etc. via threaded discussions, wikis, notifications, alerts & more. Pass any audit, compliance, or regulatory inspection with traceability that is easily implemented and guaranteed via automatic change control of every requirement. Manage work items and documents via workflows that enforce how and when they move from state to state based on definable rules, with full audit trails, electronic signature and security. An exclusive innovation, Polarion LiveDocs, enables you to collaborate concurrently and securely on specification documents with having every single paragraph uniquely identifiable and traceable.
  • 27
    SailPoint

    SailPoint

    SailPoint Technologies

    You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world.
  • 28
    Check Point CloudGuard

    Check Point CloudGuard

    Check Point Software Technologies

    The Check Point CloudGuard platform provides you cloud native security, with advanced threat prevention for all your assets and workloads – in your public, private, hybrid or multi-cloud environment – providing you unified security to automate security everywhere. Prevention First Email Security: Stop zero-day attacks. Remain ahead of attackers with unparalleled global threat intel. Leverage the power of layered email security. Native Solution, at the Speed of Your Business: Fast, straightforward deployment of invisible inline API based prevention. Unified Solution for Cloud Email & Office Suites: Granular insights and clear reporting with a single dashboard and license fee across mailboxes and enterprise apps. Check Point CloudGuard provides cloud native security for all your assets and workloads, across multi-clouds, allowing you to automate security everywhere, with unified threat prevention and posture management.
  • 29
    Silverfort

    Silverfort

    Silverfort

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative agentless and proxyless technology, Silverfort seamlessly integrates with all existing IAM solutions (e.g., AD, RADIUS, Azure AD, Okta, Ping, AWS IAM), extending coverage to assets that could not previously have been protected, such as legacy applications, IT infrastructure, file systems, command-line tools, and machine-to-machine access. Our platform continuously monitors all access of users and service accounts across both cloud and on-premise environments, analyzes risk in real time, and enforces adaptive authentication and access policies.
  • 30
    Varonis Data Security Platform
    The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities.