Average Ratings 0 Ratings
Average Ratings 1 Rating
Description
In NetRisk, the likelihood of a risk occurring can be independent among the activities it is associated with, and it may even vary across those activities. This distinction allows for a more accurate representation of risk responses, particularly for activities that are planned years apart or located at different project sites. The automated risk sensitivity analysis feature in NetRisk continuously re-evaluates the entire simulation by systematically excluding the risk that poses the greatest threat. This process generates a tornado chart that details the precise number of days each risk influences the project's completion timeline. Unlike CPM risk analysis, which assumes early starts for all activities, NetRisk realistically accounts for the use of float, leading to a more accurate assessment of completion probabilities. By permitting activities that are not on the critical path to begin later, NetRisk can effectively model scenarios for resource optimization, pacing of progress, or other strategic considerations, ultimately resulting in a more dependable project model. This level of analysis enables project managers to make more informed decisions about risk management and resource allocation.
Description
RiskWatch compliance management solutions and risk assessment use a survey-based process. A series of questions about an asset are asked and a score calculated based on the responses. You can combine the survey score with additional metrics to value the asset, rate its likelihood, and assess its impact. Based on survey results, assign tasks and manage remediation. Identify the risk factors for each asset you evaluate. Receive notifications for non-compliance to your custom requirements and any relevant standards/regulations.
API Access
Has API
API Access
Has API
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$99/month/user
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
PMA Technologies
Founded
2011
Country
United States
Website
pmatechnologies.com/netrisk/
Vendor Details
Company Name
RiskWatch
Founded
1993
Country
United States
Website
www.riskwatch.com
Product Features
Product Features
Compliance
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
Data Privacy Management
Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Enterprise Content Management (ECM)
Archiving & Retention
Collaboration Tools
Content Lifecycle Management
Digital Asset Management
Document Management
Electronic Signature
Information Governance
Mobile Access
Search
Version Control
Workflow Management
GDPR Compliance
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Integrated Risk Management
Audit Management
Compliance Management
Dashboard
Disaster Recovery
IT Risk Management
Incident Management
Operational Risk Management
Risk Assessment
Safety Management
Vendor Management
PCI Compliance
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management
Physical Security
Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues
Risk Management
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment