What Integrates with AdaptiveGRC?

Find out what AdaptiveGRC integrations exist in 2025. Learn what software and services currently integrate with AdaptiveGRC, and sort them by reviews, cost, features, and more. Below is a list of products that AdaptiveGRC currently integrates with:

  • 1
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 2
    ServiceNow Reviews

    ServiceNow

    ServiceNow

    $100 per month
    1 Rating
    Embrace digital workflows and watch your team flourish. By leveraging advanced solutions, your organization can enhance productivity and foster greater employee engagement. ServiceNow revolutionizes the way work is done, transforming outdated manual processes into efficient digital workflows, ensuring that both employees and customers receive prompt and seamless support. With ServiceNow, you gain access to digital workflows that not only enhance user experiences but also boost overall productivity for both staff and the organization as a whole. Our platform streamlines work complexities through a unified cloud system, known as the Now Platform: an intelligent and user-friendly solution tailored for modern work environments. You can select from our pre-designed workflows or craft custom applications tailored to your needs. Built on the Now Platform, our diverse product portfolio addresses critical IT, Employee, and Customer Workflows, providing the enterprise solutions necessary for a thorough digital transformation. Elevate the experiences you offer and unleash the productivity you seek, now enhanced with native mobile functionalities for daily tasks across your organization. This transition to digital workflows is not just beneficial; it is essential for staying competitive in today's fast-paced business landscape.
  • 3
    Ping Identity Reviews

    Ping Identity

    Ping Identity

    $5 per user per month
    Ping Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow.
  • 4
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory serves as a centralized repository for information regarding various objects within a network, facilitating easy access and management for both administrators and users. It employs a structured data storage approach, which underpins a logical and hierarchical arrangement of directory information. This repository, referred to as the directory, holds details about various Active Directory entities, which commonly include shared resources like servers, volumes, printers, as well as user and computer accounts on the network. For a deeper understanding of the Active Directory data repository, one can refer to the section on Directory data store. Security measures are seamlessly integrated with Active Directory, encompassing logon authentication and the control of access to directory objects. Through a single network logon, administrators are empowered to oversee directory information and organizational structures across the entire network, while authorized users can readily access resources from any location within the network. Additionally, policy-based administration simplifies the management process, making it more efficient even for the most intricate network configurations. This framework not only enhances security but also streamlines resource management, making network operations more effective.
  • 5
    Workday Extend Reviews
    Create innovative applications utilizing Workday technology with Workday Extend, which empowers you to leverage the same environment that Workday employs for app development. This allows you to customize solutions that align with your distinct business practices while benefiting from the Power of One, ensuring you access the latest innovations from Workday alongside a familiar user interface, administration, and reporting tools. You can maintain consistent security measures while enjoying real-time insights into your people and financial data. Tailor workflows to your specific needs by designing business processes that enhance efficiency and improve productivity with a seamless experience across all applications. Streamline your technology infrastructure by constructing user-friendly apps that employ the Workday UI, thereby optimizing your operational requirements. Furthermore, guarantee a cohesive experience for users on both desktop and mobile platforms by focusing on intuitive design principles.
  • 6
    OneTrust Third-Party Management Reviews
    OneTrust's Third-Party Management solution revolutionizes the management of your third-party lifecycle through data-driven automation, moving away from a questionnaire-first methodology to a risk-oriented framework by integrating data that enhances the security and efficiency of your third-party ecosystem. This innovative approach automates previously manual processes and customizes assessments to meet the specific requirements of each third-party relationship, thereby significantly boosting the efficiency of evaluations. Users typically see an impressive average reduction of over 70% in both time and costs related to conducting third-party risk assessments, which helps streamline the onboarding process. The platform utilizes top-tier data sources to perpetually monitor the risk profiles of third parties and automatically addresses emerging risks as they arise. By synchronizing workstreams and uniting teams around shared workflows, data objects, inventories, and objectives, it fosters greater consistency and efficiency. Furthermore, the solution enhances internal capabilities by automating essential processes and facilitating centralized oversight of third-party inventories, ensuring a more robust and responsive risk management framework. Ultimately, this level of integration not only strengthens risk management but also supports strategic decision-making across the organization.
  • 7
    Prevalent Reviews
    Prevalent Third-Party Risk Management Platform enables customers automate the critical tasks of managing, assessing and monitoring third parties throughout their entire life cycle. This solution integrates the following capabilities to ensure that third parties are compliant and secure: * Automated onboarding/offboarding * Profiling, tiering, and inherent risk scoring * Standardized and custom vendor risk assessments, with built-in workflow and task management * Continuous vendor threat monitoring * A network of completed standardized assessments, and risk intelligence members. * Compliance and risk reporting * Management of remediation Expert professional services are available to optimize and mature third party risk management programs. Managed services can be outsourced to collect and analyze vendor assessments.
  • Previous
  • You're on page 1
  • Next