Home / Risk Management and Compliance / Governance, Risk, and Compliance (GRC)

Governance, Risk, and Compliance (GRC)

Master governance, risk, and compliance for robust business protection and strategic advantage.

Try these 273 AI Governance, Risk, and Compliance (GRC) Tools

IS4IT Kritis
Free

IS4IT Kritis View IS4IT Kritis

IS4IT Kritis specializes in the strategic planning, seamless introduction, and expert implementation of bespoke information security concepts for your organization. We integrate business processes with robust Governance, Risk Management, and Compliance (GRC) frameworks, offering a holistic approach that ensures both security and regulatory adherence. Our commitment extends beyond initial consultation, providing dedicated project implementation and ensuring the sustained, successful operation of your security measures.

Customized information security concept development
Strategic planning and implementation services
Integration of business processes with GRC
ISACA
Free

ISACA View ISACA

For over five decades, ISACA has been a leading global professional association and learning organization dedicated to advancing expertise in technology. With a vast network of 145,000 members across 188 countries and 220+ chapters, ISACA empowers professionals in information security, governance, risk, assurance, and privacy through invaluable resources, a robust community, and continuous learning opportunities to foster career progression and organizational transformation.

Global professional association with 145,000+ members
Expertise in information security, governance, risk, assurance, and privacy
Extensive network of 220+ chapters worldwide
ISARR
Free

ISARR View ISARR

ISARR is an integrated Risk, Resilience, and Security Management platform designed for adaptability and cost-effectiveness. Our suite of interconnected web-based tools empowers organizations to proactively protect their people, assets, and reputation, seamlessly transitioning from routine operations to crisis management. With a global Supplier Directory of over 8,000 cybersecurity providers, ISARR ensures you have the resources needed to maintain robust security and resilience.

Integrated Risk, Resilience & Security Management
Adaptable and Cost-Effective Solution
Web-Based Management Information Tools
ISMS.online
Free

ISMS.online View ISMS.online

ISMS.online is a flexible and versatile cloud software service designed to streamline information security management for organizations of all sizes and expertise levels. Whether you are new to cybersecurity, actively improving your security posture, or a seasoned expert, our intuitive platform empowers you to effectively manage risks and achieve compliance with ease. Our user-friendly functionality ensures rapid adoption and immediate impact on your organization's security.

Intuitive cloud-based platform
Flexible and versatile functionality
Suitable for all expertise levels
IT Governance
Free

IT Governance View IT Governance

IT Governance is your comprehensive partner for navigating the complexities of IT governance, risk management, and compliance (GRC). We empower organizations to establish robust governance frameworks, proactively manage risks, and ensure adherence to regulatory requirements. Our expert guidance and solutions enable you to build trust, enhance security, and achieve strategic objectives with confidence.

Expert GRC Consulting Services
Information Security Management Guidance
Data Protection and Privacy Solutions
IT GRC Forum
Free

IT GRC Forum View IT GRC Forum

The IT GRC Forum is the premier online destination for the Governance, Risk Management, and Compliance (GRC) community, fostering collaboration and knowledge sharing through an open-source platform. Access a rich repository of educational events, market intelligence, webcasts, white papers, and research, all curated from user-generated content and expert insights. Connect and network with fellow executives and peers in a centralized hub designed for insightful discussion and professional growth.

Online networking and community platform for IT GRC professionals
Access to educational events and market intelligence
Extensive categorized media archive including webcasts, white papers, and research
J2 Software
Free

J2 Software View J2 Software

J2 Software is a premier African Information Security and ICT business specializing in comprehensive governance, risk, and compliance (GRC) solutions. We empower organizations to safeguard their critical information assets amidst evolving regulatory landscapes and increasing demands for robust governance and visibility. Our integrated approach combines leading-edge solutions with world-class support, delivered through strategic partnerships and our dedicated Cyber Security Centre.

Information Security Solutions
Governance, Risk, and Compliance (GRC)
Managed Security Services (MSSP)
JupiterOne
Free

JupiterOne View JupiterOne

JupiterOne is a revolutionary platform designed to transform how organizations manage and secure their software-defined assets. It empowers security teams of all sizes to achieve unparalleled visibility, cut through noise, consolidate tool sprawl, enhance data accuracy, and automate compliance without adding to operational overhead. By aligning security and compliance with business objectives, JupiterOne enables organizations to leverage these functions as growth accelerators rather than impediments.

Unified Asset Visibility and Context
Automated Compliance Monitoring and Reporting
Noise Reduction and Alert Prioritization
KDM Analytics
Free

KDM Analytics View KDM Analytics

KDM Analytics provides an unparalleled automated solution for NIST RMF assessments specifically tailored for Operational Technology (OT) environments. Our software quantifies cyber-attack exposure and drives prioritized risk management actions, ensuring optimal allocation of budgets and resources. By uniquely integrating both top-down risk analysis and bottom-up vulnerability assessments, KDM Analytics delivers evidence-based, actionable insights for securing mission-critical cyber systems across defense, automotive, avionics, and other demanding sectors.

Automated NIST RMF Assessment for OT Systems
Quantifiable Cyber-Attack Exposure Analysis
Prioritized Risk Management Activity Guidance
Knostic
Free

Knostic View Knostic

Knostic is an early-stage startup specializing in a comprehensive risk management and governance platform purpose-built for enterprise large language models (LLMs). Our solution empowers organizations to proactively identify, assess, and mitigate risks associated with LLM adoption, ensuring robust compliance and responsible AI deployment. Operating in stealth mode, Knostic is dedicated to providing the critical tools needed for secure and effective LLM integration within large enterprises.

LLM Risk Assessment Frameworks
AI Governance Policy Enforcement
Compliance Monitoring for AI Usage
Knovos
Free

Knovos View Knovos

Since 2002, Knovos has been at the forefront of developing advanced information management solutions that automate, integrate, and innovate across critical business functions. Our comprehensive platform empowers organizations to strengthen decision-making, uncover actionable insights, and ensure robust compliance through our integrated solutions for Risk & Compliance, Information Discovery, Collaboration, and Project Management. Knovos is trusted by leading global corporations, law firms, consultancies, service providers, and government agencies to mitigate legal risks, achieve regulatory adherence, reduce IT costs, and facilitate intelligent strategic choices via our AI-powered eDiscovery and Information Governance capabilities.

AI-powered eDiscovery and litigation support
Comprehensive Information Governance platform
Automated risk assessment and compliance monitoring
Kolide
Free

Kolide View Kolide

Kolide is a user-first security platform designed to empower employees to proactively resolve device security issues, ensuring compliance without hindering productivity. By educating users on necessary fixes, Kolide reduces IT support tickets and promotes a security-aware culture, allowing only secure devices to access company applications. Acquired by 1Password in 2024, Kolide transforms device compliance from an enforcement-only policy into a collaborative security initiative that benefits both employees and the organization.

Device security posture monitoring
Automated and user-guided remediation workflows
Seamless integration with identity providers
Koop
Free

Koop View Koop

Koop is a comprehensive trust management platform designed to streamline critical compliance, security, and insurance processes for high-growth, regulated industries. By centralizing risk assessment and mitigation, Koop empowers organizations in sectors like AI, Autonomous Vehicles, and Biotech to confidently navigate complex requirements and build verifiable trust with stakeholders. Seamlessly integrate with your existing workflows to ensure robust governance and operational resilience.

Centralized Trust Management Platform
Streamlined Regulatory Compliance Navigation
Integrated Security Review Processes
KOVRR
Free

KOVRR View KOVRR

Kovrr transforms opaque cyber risk into clear, quantifiable financial exposure, empowering leaders to align cybersecurity investments with business objectives. Our advanced Monte Carlo simulation methodology, leveraging extensive resilience, threat, and insurance data, models financial impact across diverse cyber event scenarios. This enables data-driven prioritization of risk management efforts, ensuring strategic allocation of resources for optimal protection.

Financial Quantification of Cyber Risk
Actionable Risk Management Insights
Advanced Monte Carlo Simulation
Kymatio
Free

Kymatio View Kymatio

Kymatio pioneers the application of Artificial Intelligence for adaptive staff strengthening, cultural transformation, and predictive internal risk analysis. By integrating technical and human factors, Kymatio proactively manages internal threats in the pre-incident phase, strengthening your workforce, identifying critical risk areas, and providing actionable recommendations for mitigation to minimize potential internal threats.

AI-driven predictive internal risk analysis
Adaptive staff strengthening programs
Cultural change management
KYND
Free

KYND View KYND

KYND provides innovative cyber risk technology designed to simplify the assessment, understanding, and management of business cyber risks for organizations of all sizes and industries globally. Our platform translates complex cyber threats into actionable insights, offering tailored solutions for direct risk management, insurance underwriting, and managed service provider advisory. With KYND, businesses gain unparalleled clarity and control over their cybersecurity posture.

Automated Cyber Risk Assessment
Customizable Risk Management Solutions
Industry-Agnostic Technology
Leadcomm
Free

Leadcomm View Leadcomm

Leadcomm is a premier Brazilian provider specializing in the distribution and integration of advanced IT systems and robust security solutions tailored for enterprise-level organizations. We empower large companies to safeguard confidential and sensitive data throughout its entire lifecycle, ensuring full manageability and strict adherence to their security policies. Our strategic partnerships with industry leaders like XYPRO for HPE Non-Stop Security and ZenGRC for GRC SaaS further enhance our commitment to delivering comprehensive risk management and compliance excellence.

Enterprise-grade IT systems distribution and integration
Comprehensive data security solutions
End-to-end data lifecycle protection
Liquid C2
Free

Liquid C2 View Liquid C2

Liquid C2 empowers organizations across Africa with comprehensive cloud solutions and advanced cybersecurity services designed for seamless operations and accelerated growth. Leveraging our Secure360 Framework, we offer integrated governance, risk management, compliance, and threat detection to ensure robust protection across your entire digital infrastructure. Partner with Africa's fastest-growing Cloud Service Provider to enhance innovation, agility, and go-to-market capabilities.

Streamlined Workplace Operations
Secure Cloud Storage Solutions
Rapid Data Recovery Capabilities
LocateRisk
Free

LocateRisk View LocateRisk

LocateRisk empowers organizations with efficient, transparent, and comparable IT security through automated, KPI-based risk analyses. It delivers tailored reports on your IT security posture, translating complex technical data into clear, actionable insights for executive decision-making. Strengthen your cyber defenses and foster informed management strategies with LocateRisk's intuitive approach.

Automated KPI-based IT risk assessments
Transparent and comparable security analyses
Company-specific IT security status reports
LogicGate
Free

LogicGate View LogicGate

LogicGate Risk Cloud™ is an agile Governance, Risk, and Compliance (GRC) platform designed to empower enterprises with robust GRC capabilities through an intuitive, no-code interface. Its powerful data mapping and workflow automation features provide unparalleled control and visibility across all GRC processes, enabling efficient operationalization without extensive IT or consultant reliance. With pre-built templates and a user-friendly app builder, LogicGate allows process owners to swiftly customize solutions, ensuring your GRC program remains adaptive and effective.

No-Code App Builder for custom GRC solutions
Powerful data mapping for enhanced visibility
Pre-built templates for rapid deployment
LogicManager
Free

LogicManager View LogicManager

LogicManager provides an integrated suite of IT governance, risk, and compliance (GRC) software solutions and expert advisory services designed to proactively manage tomorrow's surprises today. Our platform empowers organizations to identify critical IT risks, ensure adherence to regulatory requirements, and objectively prioritize resources for maximum impact, safeguarding against escalating security threats and ensuring robust operational resilience.

Comprehensive IT Risk Management
IT Governance Frameworks
Regulatory Compliance Management
Lupasafe
Free

Lupasafe View Lupasafe

Lupasafe is a unified cybersecurity platform designed to empower MSPs and small businesses with advanced risk management and regulatory compliance. Elevate your security posture by proactively reducing human-related vulnerabilities through sophisticated phishing simulations and tailored awareness training, while continuously safeguarding your technological infrastructure with comprehensive vulnerability scanning and email security validation. Gain unparalleled visibility and actionable insights with executive-level reporting, including cloud audits, endpoint assessments, and detailed compliance tracking for standards like NIS2 and Cyber Essentials, ensuring robust protection and adherence to evolving regulations.

Phishing Simulation & Awareness Training
Continuous Vulnerability Scanning (Network, Endpoint, Mobile, Email)
Email Security Validation (DMARC, DKIM, SPF)
Malta Information Technology Agency (MITA)
Free

Malta Information Technology Agency (MITA) View Malta Information Technology Agency (MITA)

The Malta Information Technology Agency (MITA) drives Malta's government Information and Communications Technology (ICT) policy, programs, and initiatives. Its Governance, Risk and Compliance Department (GRCD) is dedicated to developing and implementing an Enterprise Information Security Strategy, focusing on business continuity, risk management, and data guardianship. MITA establishes and disseminates government ICT policies, ensuring robust information security governance and striving to collect evidence of compliance.

Enterprise Information Security Strategy Development
Information Security Governance
Business Continuity Planning
Maro
Free

Maro View Maro

Maro redefines cybersecurity by addressing the inherent human element of risk. Our pioneering Cognitive Security platform makes human vulnerabilities visible and manageable, moving beyond traditional models that overlook cognitive strain and susceptibility to manipulation. Maro empowers organizations to proactively understand and mitigate risks associated with human decision-making in the face of sophisticated threats.

Cognitive Security Agents for real-time human risk assessment
Visibility into human decision-making under pressure
Actionable insights to mitigate cognitive vulnerabilities