Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
This is a cyber information risk management solution that conforms to the ISO 27001:2013 standards. It effectively reduces the time dedicated to risk management processes while delivering audit-ready results on an annual basis. Being a web-based platform, it allows users to perform information security risk assessments with remarkable speed and efficiency. The tool is compatible with a variety of devices, including desktops, laptops, iPads, and mobile phones, ensuring accessibility from any location at any time. Organizations must understand the risks they encounter in managing their information assets, which encompass applications, services, processes, and locations, as well as the significance and associated risks of these assets. The arc tool empowers organizations to achieve these insights and more through its targeted modules for Asset Management, Business Impact Assessment, Risk Assessment, and User Administration. By utilizing this tool, users can generate consistent, repeatable, and dependable risk assessments that ultimately save both time and financial resources, enhancing the overall effectiveness of their risk management strategy. Furthermore, it fosters a culture of proactive risk management within the organization, leading to improved decision-making and safeguarding of vital information assets.
Description
Consolidate all your governance, risk, and compliance (GRC) as well as management system workflows onto a single platform. Our risk assessment processes encompass the entire evaluation cycle, beginning with planning, identifying risks, assessing those risks, and formulating a mitigation strategy that includes assigning responsibilities and tracking actions. Utilizing UXRisk for your risk management needs means that you will adhere to various widely accepted standards, including ISO 31000, COSO, ISO 14001, ISO 27001, OSHA, and PMI Project Risk Management, among others. We also accommodate a diverse array of qualitative risk assessment techniques, such as HAZID, HAZOP, bow-tie analysis, and more. Additionally, our audit workflow enables you to meticulously plan, execute, and follow up on audits, supervision, and verifications directly within our application, while also allowing for the delegation of responsibilities and tracking of actions. When engaging in audits related to processes, products, or management systems within UXRisk, you can be confident that you remain compliant with most recognized industry standards, ensuring a streamlined and efficient approach to risk and compliance management. This integrative capability not only enhances productivity but also elevates the overall effectiveness of your organizational risk management efforts.
API Access
Has API
API Access
Has API
Integrations
MeridianLink Opening
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$2 per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Aloka
Founded
2002
Country
United Kingdom
Website
www.arcrisk.com
Vendor Details
Company Name
Proactima
Founded
2004
Country
Norway
Website
uxrisk.com
Product Features
Risk Management
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment
Product Features
Risk Management
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment