---
description: Page 2 - Discover the best PCI Compliance Software for your organisation. Compare top PCI Compliance Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 2 - Best PCI Compliance Software - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [PCI Compliance Software](https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software) > [Page 2](https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software?page=2)

# PCI Compliance Software

Canonical: https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software

Page: 2 / 4\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software?page=3)

-----

## Products

1. [ZenGRC](https://www.softwareadvice.co.uk/software/35334/zengrc) — 4.4/5 (27 reviews) — ZenGRC is a cloud-based and on-premise governance, risk and compliance (GRC) management solution. It serves businesse...
2. [Rectangle Health](https://www.softwareadvice.co.uk/software/65853/rectanglehealth) — 4.7/5 (26 reviews) — A leader in innovative healthcare technology for over 30 years, Rectangle Health is a trusted partner to more than 40...
3. [Apptega](https://www.softwareadvice.co.uk/software/146566/apptega) — 4.6/5 (25 reviews) — Apptega is a cloud-based compliance management solution that helps businesses design cybersecurity frameworks/program...
4. [Puppet Enterprise](https://www.softwareadvice.co.uk/software/355737/puppet-enterprise) — 4.4/5 (24 reviews) — Puppet Enterprise is an IT management solution that helps businesses handle IT infrastructure configuration and regul...
5. [C1Risk](https://www.softwareadvice.co.uk/software/183697/cyberone) — 4.9/5 (23 reviews) — Founded in 2015, C1Risk is a privately held, woman, minority-owned technology company headquartered in Silicon Valley...
6. [Lobster Data World](https://www.softwareadvice.co.uk/software/459058/Lobsterdata) — 4.8/5 (22 reviews) — Lobster is a 360° digital ecosystem that streamlines data integration, orchestration, and connectivity across enterpr...
7. [Netwrix Access Analyzer](https://www.softwareadvice.co.uk/software/157459/stealthaudit-platform) — 4.5/5 (15 reviews) — Netwrix StealthAUDIT provides a single extensible platform that helps users manage and secure their critical data, co...
8. [USM Anywhere](https://www.softwareadvice.co.uk/software/124618/alienvalut-usm) — 4.4/5 (14 reviews) — USM Anywhere is a cloud-based security platform which helps midsize to large enterprises with risk detection, vulnera...
9. [Alert Logic MDR](https://www.softwareadvice.co.uk/software/180949/alert-logic) — 4.5/5 (14 reviews) — Alert Logic Log Manager is a cloud-based log management solution. The solution provides security as a service for var...
10. [Compliance Manager GRC](https://www.softwareadvice.co.uk/software/426862/compliance-manager-grc) — 3.8/5 (13 reviews) — Compliance Manager GRC enables businesses to reduce risks and meet regulatory security requirements without adding st...
11. [6clicks](https://www.softwareadvice.co.uk/software/365050/6clicks) — 4.8/5 (13 reviews) — 6clicks is transforming cyber risk and compliance management with its AI-powered platform. It offers a unique Hub \&am...
12. [Diplomat Managed File Transfer](https://www.softwareadvice.co.uk/software/268650/diplomat-managed-file-transfer) — 4.7/5 (11 reviews) — Diplomat MFT by Coviant Software is a powerful, secure managed file transfer solution that automates and protects sen...
13. [Rivial Data Security](https://www.softwareadvice.co.uk/software/422737/rivial-data-security) — 4.8/5 (11 reviews) — Rivial Data Security enables organizations to accurately measure their risk, automate compliance, and mature their cy...
14. [Security Event Manager](https://www.softwareadvice.co.uk/software/183301/security-event-manager) — 4.7/5 (9 reviews) — Security \&amp; Event Manager by SolarWinds is a log management solution that caters to businesses across various indu...
15. [Strike Graph](https://www.softwareadvice.co.uk/software/241560/strike-graph) — 4.7/5 (9 reviews) — Strike Graph is a compliance SAAS solution simplifying security certifications such as SOC 2 Type I/II or ISO 27001. ...
16. [Mend](https://www.softwareadvice.co.uk/software/161968/whitesource) — 4.4/5 (8 reviews) — WhiteSource is the leading solution for agile open source security and license compliance management. It integrates w...
17. [ISMS.online](https://www.softwareadvice.co.uk/software/435180/isms-online) — 4.5/5 (8 reviews) — ISMS.online is a cloud-based compliance platform that supports various compliance frameworks including ISO 27001, ISO...
18. [Wallarm WAF](https://www.softwareadvice.co.uk/software/322470/wallarm-waf) — 4.7/5 (6 reviews) — Wallarm WAF is a network security and PCI compliance tool that enables programmers to build web-based apps securely. ...
19. [GPayments](https://www.softwareadvice.co.uk/software/256153/gpayments) — 4.3/5 (6 reviews) — GPayments is an enterprise-grade payment fraud prevention platform for banks, acquirers, and large merchants. With ov...
20. [Drata](https://www.softwareadvice.co.uk/software/359648/drata) — 4.8/5 (5 reviews) — Designed for businesses in healthcare, insurance, technology and other industries, Drata is a cloud-based compliance ...
21. [ITAC SecureFile](https://www.softwareadvice.co.uk/software/420697/itac-securefile) — 4.8/5 (5 reviews) — ITAC SecureFile is an enterprise solution designed to facilitate secure information exchange processes. It automates ...
22. [Enigma Vault](https://www.softwareadvice.co.uk/software/339963/enigma-vault) — 4.8/5 (4 reviews) — Enigma Vault offers cloud-based data security solutions that protect what's most important. Practically every industr...
23. [PII Tools](https://www.softwareadvice.co.uk/software/324686/pii-tools) — 4.8/5 (4 reviews) — PII Tools is a data discovery and remediation solution that helps organizations manage sensitive information across t...
24. [Aware](https://www.softwareadvice.co.uk/software/331022/awarehq) — 3.5/5 (4 reviews) — The Aware platform enables organizations to proactively discover, classify, secure, and manage data It solves for gov...
25. [GDPR Register](https://www.softwareadvice.co.uk/software/419018/gdpr-register) — 5.0/5 (3 reviews) — Designed for businesses of all sizes, GDPR Register offers scalable GDPR compliance tools for group companies looking...

-----

Page: 2 / 4\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software?page=3)

## Related Categories

- [HIPAA Compliance Software](https://www.softwareadvice.co.uk/directory/4599/hipaa-compliance/software)
- [Network Security Software](https://www.softwareadvice.co.uk/directory/4170/network-security/software)
- [Cloud Integration Software](https://www.softwareadvice.co.uk/directory/4676/cloud-management/software)
- [Policy Management Software](https://www.softwareadvice.co.uk/directory/4567/policy-management/software)
- [GDPR Compliance Software](https://www.softwareadvice.co.uk/directory/3848/gdpr/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software)
- [All Categories](https://www.softwareadvice.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.co.uk/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@id":"https://www.softwareadvice.co.uk/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"PCI Compliance Software","description":"Page 2 - Discover the best PCI Compliance Software for your organisation. Compare top PCI Compliance Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software?page=2","about":{"@id":"https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software?page=2#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software?page=2#breadcrumblist"},"@id":"https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software?page=2#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"},"inLanguage":"en-GB","mainEntity":{"@id":"https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software?page=2#itemlist"},"publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"}},{"@id":"https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software?page=2#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"PCI Compliance Software","position":2,"item":"https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software","@type":"ListItem"},{"name":"Page 2","position":3,"item":"https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software?page=2","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 2 - Best PCI Compliance Software - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.co.uk/directory/4304/pci-compliance/software?page=2#itemlist","@type":"ItemList","itemListElement":[{"name":"ZenGRC","position":1,"description":"ZenGRC is a cloud-based and on-premise governance, risk and compliance (GRC) management solution. It serves businesses of all sizes in any industry, including technology, retail, consumer goods, health care and finance. Primary features include audit management, compliance management, contract and policy management, risk assessment and reporting.\n\n\nZenGRC helps users in internal auditing, compliance and information security teams. With it, these teams can manage and implement audit and compliance processes. It automates audit evidence collection, routine compliance and helps with the creation of new compliance programs. Other features include team collaboration, role-based access, project management, import and export and dashboards.\n\n\nZenGRC offers content and regular upgrades for COBIT 5, COSO, FedRAMP, HIPAA, PCI-DSS and SOX compliance programs. It provides integration with JIRA, Google Drive, OneLogin, Okta, Microsoft Active Directory and PingOne, and it provides users with a single sign-on option. It is available in a subscription pricing option. Online and phone-based support is available, as is a knowledge base.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c2cc11bb-4c48-4e63-89b9-5a1dff49aaae.png","url":"https://www.softwareadvice.co.uk/software/35334/zengrc","@type":"ListItem"},{"name":"Rectangle Health","position":2,"description":"A leader in innovative healthcare technology for over 30 years, Rectangle Health is a trusted partner to more than 40,000 healthcare providers. The company’s comprehensive platform, Practice Management Bridge®, streamlines daily business operations including communications and engagement, payments and reimbursements, and office compliance. Customers of all sizes, in all sectors of healthcare, rely on Rectangle Health’s easy-to-use, scalable software to deliver a measurable increase in productivity and profitability, while improving patient experience. ​","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/15bdf780-13e3-4d7f-b376-64965b028295.jpeg","url":"https://www.softwareadvice.co.uk/software/65853/rectanglehealth","@type":"ListItem"},{"name":"Apptega","position":3,"description":"Apptega is a cloud-based compliance management solution that helps businesses design cybersecurity frameworks/programs and generate compliance reports. It enables users to build security frameworks in accordance with selected regulations such as HIPAA, PCI, NIST 800.53, NIST CSF, NYDFS and more. Professionals can access Apptega's in-built library to utilize checklists, policies and plan templates as per the required framework.\n\nIt comes with an administrative dashboard, which allows managers to view compliance scores for various operations such as risk assessments, ongoing activities or device management. Additionally, administrators can review budget summaries and assign tasks to multiple staff members. Key features of Apptega include collaboration, vendor management, task calendar and alerts/notifications.\n\nPricing is available on request and support is extended via email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cd1177a4-edd4-4f1d-895b-ce2495a7abf8.png","url":"https://www.softwareadvice.co.uk/software/146566/apptega","@type":"ListItem"},{"name":"Puppet Enterprise","position":4,"description":"Puppet Enterprise is an IT management solution that helps businesses handle IT infrastructure configuration and regulate compliance processes. It enables IT professionals to streamline security management operations in compliance with operational and regulatory requirements.\n\n\nFeatures of Puppet Enterprise include project management, access control, workflow automation, analytics, license management, performance tracking and more. The platform allows managers to exchange application testing data with external applications and generate custom reports. Additionally, it lets DevOps teams manage operations related to authoring, validation and delivery of the automation content\n\n\nPuppet Enterprise offers an API, which lets businesses integrate the system with several third-party platforms, such as Splunk, ServiceNow, Amazon Web Services, Slack, Jenkins, VMWare, Cisco, Red Hat and more. Pricing is available on request and support is extended via knowledge base, FAQs, forum and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b553601e-1d85-4b1e-934f-3c4bad25237a.png","url":"https://www.softwareadvice.co.uk/software/355737/puppet-enterprise","@type":"ListItem"},{"name":"C1Risk","position":5,"description":"Founded in 2015, C1Risk is a privately held, woman, minority-owned technology company headquartered in Silicon Valley. The 1Risk platform is a cloud-based SaaS, single, integrated, interconnected system designed to be the one source of truth for risk. \n\nConnecting Assets > Risks > Controls > Issues, C1Risk is a fully integrated, GRAPH OPEN API technology platform designed to support GRC teams of all sizes. \n\nLead with Risk and join the next generation of GRC leadership with C1Risk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1f320be3-8a0b-4fcf-a357-2416129ffe88.png","url":"https://www.softwareadvice.co.uk/software/183697/cyberone","@type":"ListItem"},{"name":"Lobster Data World","position":6,"description":"Lobster is a 360° digital ecosystem that streamlines data integration, orchestration, and connectivity across enterprises. \n\nTrusted by over 2,000 customers globally, Lobster empowers teams to unlock the power of their data with its Lobster Data World, comprising the Lobster Data Platform for real-time management, the Lobster Data Network for seamless collaboration, and Lobster Data Products for plug-and-play industry solves. \n\nWith operations across DACH, the UK, France, Scandinavia, and the Benelux, Lobster’s secure suite of scalable solutions delivers measurable value from day one.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a126cc4d-0361-4f5a-bd78-b994202d7c28.png","url":"https://www.softwareadvice.co.uk/software/459058/Lobsterdata","@type":"ListItem"},{"name":"Netwrix Access Analyzer","position":7,"description":"Netwrix StealthAUDIT provides a single extensible platform that helps users manage and secure their critical data, core systems and IT assets.\n\nWith 40+ built-in data collection modules covering both on-premises and cloud-based platforms, users can secure their sensitive data wherever it resides. The wizard-driven interface makes it easy to gather the necessary data, and the agentless architecture ensures a fast and lightweight collection process.\n\nProactively identifies conditions that put sensitive and regulated data at risk, including excessive user permissions, disabled accounts, and externally shared files. Users can minimize permissions to the least-privilege level by monitoring who is accessing which data and to what extent, and then revoking unneeded rights.\n\nIn addition, users can automatically remove excessive permissions, delete unneeded accounts, and disable rogue user accounts to shut down threats. To avoid business disruptions, users can also simulate a change first and then execute it in a single click.\n\nThe solution empowers data owners to regularly review permissions to their data and fix issues on the spot. It enables business users to request access from data owners, reducing the IT team’s workload. Respond accurately and promptly to DSARS to reduce costs and avoid penalties, thanks to complete visibility into the data they possess on any individual.\n\nNetwrix StealthAUDIT provides easy-to-digest reports that give auditors hard proof of the user's control over access to regulated data. They can also automate the deprovisioning of AD accounts upon employee termination, cleanup of stale file system data, Exchange mailbox delegation, service ticket creation in ServiceNow, and much more, reducing the IT team's workload and improving system hygiene.\n\nFinally, the platform helps maximize the value of technology investments and home-grown systems by sharing data between them and Netwrix StealthAUDIT through powerful REST APIs. With the flexible AnyData connector, users can scan any data source for sensitive data.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/57cf4e95-c803-4d60-8d86-a2dcb1120dfa.png","url":"https://www.softwareadvice.co.uk/software/157459/stealthaudit-platform","@type":"ListItem"},{"name":"USM Anywhere","position":8,"description":"USM Anywhere is a cloud-based security platform which helps midsize to large enterprises with risk detection, vulnerability assessment, security monitoring and threat response.\n\n\nThe security platform enables users to collect and detect information such as software services, number of users logged in and the operating system of assets. It comes with an active scanner, which lets users scan for known vulnerabilities, and an intrusion-detection system to conduct file integrity monitoring, gather operating system logs and perform rootkit checking. Further, its behavioral monitoring capability includes netflow information, bandwidth and traffic capture.\n\n\nAdditionally, USM users can participate in the open threat exchange (OTX) threat-sharing network and identify known malicious attackers. The solution integrates with third-party applications such as Jira, Office 365, Amazon Web Services, Palo Alto Networks and more.\n\n\nUSM Anywhere is available on a monthly subscription basis and comes with online and phone support.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/adf53927-f31f-47c4-be11-26cf1c8cdde6.png","url":"https://www.softwareadvice.co.uk/software/124618/alienvalut-usm","@type":"ListItem"},{"name":"Alert Logic MDR","position":9,"description":"Alert Logic Log Manager is a cloud-based log management solution. The solution provides security as a service for various environments including Amazon Web Services, Microsoft Azure, Google Cloud Platform and hybrid environment.\n\n\nAlert Logic Log Manager is an automated solution that collects, aggregates and searches log data from web applications, servers and network assets. Key features include threat detection, forensics data management, compliance management, log monitoring, log analysis, log reports, log reviews and security alerts.\n\n\nAlert Logic Log Manager automatically deploys collectors in the cloud and hybrid infrastructure. Along with it, the solution integrates log data from various sources such as applications, workloads and network assets. It tracks user activities and suspicious behaviors across all the environments. In case of any threats, system analysts analyze the threats and alert users with the help of daily and monthly reports.\n\n\nAlert Logic provides its services on a monthly subscription basis and provides support via phone, email, knowledge base, training and community forums.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d4e18fd4-916d-420e-b10d-affe08d1bfc5.png","url":"https://www.softwareadvice.co.uk/software/180949/alert-logic","@type":"ListItem"},{"name":"Compliance Manager GRC","position":10,"description":"Compliance Manager GRC enables businesses to reduce risks and meet regulatory security requirements without adding staff or stretching their already thin budget. It gives you greater confidence that the information security programs you’ve put into place are actually working and generate the documentation to prove it.\n\nCompliance Manager GRC is a comprehensive software solution that helps organizations meet their information security needs by providing comprehensive dashboards and reports on compliance, risk management and governance best practices.\n\nCompliance Manager GRC covers all aspects of information security including:\n\n- Information Security Program Management\n\n- Risk Management\n\n- Security Awareness Training\n\n- Incident Response Plan (IRP)\n\n- IT Asset Management (ITAM) \n\n- Change Control Processes & Documentation \n\n- Business Continuity Planning (BCP)","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2a57c90a-93d8-49c9-a95e-72ff3d079568.png","url":"https://www.softwareadvice.co.uk/software/426862/compliance-manager-grc","@type":"ListItem"},{"name":"6clicks","position":11,"description":"6clicks is transforming cyber risk and compliance management with its AI-powered platform. It offers a unique Hub & Spoke architecture ideal for distributed GRC programs and advisors, along with the first-ever AI engine, Hailey, built for cyber GRC. This intelligent approach, including a transparent licensing model with unlimited access to frameworks and functionality, empowers cyber leaders and professionals to build resilient and trusted cyber risk and compliance programs.\n\nUse 6clicks for:\n- Security compliance: Centralize and streamline multi-framework compliance from inception to audit.\nIT risk management: Intelligently manage your risk profile to make better decisions while keeping your company safe.\n\n- Vendor management: Confidently engage vendors in line with their criticality and rapidly identify and treat vendor non-compliance.\n- Incident management: Capture, respond and learn from incidents and breaches while ensuring minimal disruption to business operations.\n- Covering the most in-demand frameworks, such as ISO 27001, NIST CSF, UK Cyber Essentials, DORA, and more, \n\n6clicks enables organizations to transform their approach to cyber risk and compliance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a29effa3-97c2-411e-8c5a-1208e2516901.png","url":"https://www.softwareadvice.co.uk/software/365050/6clicks","@type":"ListItem"},{"name":"Diplomat Managed File Transfer","position":12,"description":"Diplomat MFT by Coviant Software is a powerful, secure managed file transfer solution that automates and protects sensitive data exchange. Built for businesses moving beyond outdated FTP tools and scripts, Diplomat MFT supports modern protocols like SFTP, FTPS, and HTTPS, with full encryption and logging.\n\nTrusted for 20+ years with zero breaches, it integrates seamlessly with cloud platforms like AWS S3, Azure Blob, and Google Cloud. No custom coding required. Built-in features include PGP encryption, MFA, IP access rules, and threat intelligence scanning, helping you meet strict standards like HIPAA, PCI/DSS, GDPR, and DORA.\n\nWhether you're replacing manual file transfer workflows or enhancing regulatory compliance, Diplomat MFT offers an easy-to-use, scalable solution that saves time and reduces risk.\n\nFacing compliance challenges or relying on risky FTP scripts? Try Diplomat MFT today.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9f9ac915-c1e8-45a9-be96-54b1e8059a97.jpeg","url":"https://www.softwareadvice.co.uk/software/268650/diplomat-managed-file-transfer","@type":"ListItem"},{"name":"Rivial Data Security","position":13,"description":"Rivial Data Security enables organizations to accurately measure their risk, automate compliance, and mature their cybersecurity program.\n\nOur six-module platform, which includes Governance, Risk, Compliance, Vulnerabilities, Vendor Security, and Incident Response, gives security leaders the tools needed to handle the many tasks required to manage and mature their security program. \n\nAuditors appreciate Rivial for its thorough evidence-collection process, ensuring swift and straightforward audits. Security practitioners value Rivial for its ability to streamline compliance. Board members favor Rivial for clear reporting and quantification of risk. \n\nSchedule a time with our security consultants to learn more about our cybersecurity management platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9d619cbf-e102-4e74-9e82-1caec5bdb65f.jpeg","url":"https://www.softwareadvice.co.uk/software/422737/rivial-data-security","@type":"ListItem"},{"name":"Security Event Manager","position":14,"description":"Security & Event Manager by SolarWinds is a log management solution that caters to businesses across various industries. Key features include compliance reporting, real-time event correlation, file-integrity monitoring, USB device monitoring and log forwarding.\n\nSecurity & Event Manager helps businesses detect suspicious activities in real-time, conduct security event investigations and forensics for threat mitigation and demonstrate compliance via audit reporting for HIPAA, PCI DCC and SOX. The solution also allows users to monitor and set alerts on registries, files and folder activities that help them to recognize malicious behavior.\n\nAdditionally, Security & Event Manager enables users to forward correlated and normalized logs or specific log data to external sources. The solution can either be deployed on-premise or hosted in the cloud.\n\nServices are offered for a one-time fee that includes support via phone and email.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/17acd0d7-a07b-4143-a93c-10dde4f6693c.png","url":"https://www.softwareadvice.co.uk/software/183301/security-event-manager","@type":"ListItem"},{"name":"Strike Graph","position":15,"description":"Strike Graph is a compliance SAAS solution simplifying security certifications such as SOC 2 Type I/II or ISO 27001.\n\nCybersecurity certifications dramatically improve revenue for B2B companies. Our platform empowers companies to rapidly deploy a risk-driven Security & Compliance program as Strike Graph automatically collects evidence for auditor review via API-driven integration to common business systems & infrastructure. Strike Graph helps companies pass Audits faster, create Trust, and close enterprise deals at a fraction of the time & cost of prior methods.\n\nStrike Graph includes a risk based approach to streamline setup and accelerate sales. Our risk assessment engine automates the selection of cybersecurity controls. We help right-size your compliance to cover the risks that apply to your business. A Strike Graph assessment can give your customers confidence in your platform well before your first audit.\n\nStrike Graph includes a library of over 230+ audit-tested controls that cover 100% of the SOC 2® standard. Our technology is used to dynamically adjust your cybersecurity program. Distribute cybersecurity controls to the right owners, and empower your team to manage and maintain the necessary security to achieve compliance.\n\nWith access to our extensive knowledge base and dedicated Audit Success Managers, we’ll design a compliance roadmap matching revenue targets with compliance practices. Utilize our library of policies, use our built-in system description engine to craft the right narrative, leverage our audit-handoff dashboard, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e84f5b0b-ab37-4d62-860c-8e83e8759a08.png","url":"https://www.softwareadvice.co.uk/software/241560/strike-graph","@type":"ListItem"},{"name":"Mend","position":16,"description":"WhiteSource is the leading solution for agile open source security and license compliance management. \n\n\nIt integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time. \n\n\nWhiteSource doesn’t only alert on issues, it also provides actionable, validated remediation paths to enable quick resolution and automated policy enforcement to speed up time-to-fix. It also helps you focus on what matters by prioritizing remediation based on whether your code is actually using a vulnerable method or not, and guaranteeing zero false positives.\n\n\nWhiteSource offers support for over 200 programming languages, and continuous tracking of multiple open source vulnerabilities databases including the NVD, security advisories, peer-reviewed vulnerability knowledge bases and open source projects issue trackers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8add25a5-2da9-4600-a375-633bf1fb727d.png","url":"https://www.softwareadvice.co.uk/software/161968/whitesource","@type":"ListItem"},{"name":"ISMS.online","position":17,"description":"ISMS.online is a cloud-based compliance platform that supports various compliance frameworks including ISO 27001, ISO 27701, NIS 2 and NIST. It provides solutions for managing information security, data privacy, business continuity and quality management. The platform offers a risk management solution that allows businesses to manage their risks in one place. It features integrations that enable users to connect ISMS.online with their existing tools and streamline compliance efforts. Additionally, its assured results method provides a path to certification success, helping organizations get certified faster. It is designed to be user-friendly and easy to implement, with pre-built tools and templates that save time and effort.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4c3b3640-77d7-4550-aad6-d0b1e323aeda.png","url":"https://www.softwareadvice.co.uk/software/435180/isms-online","@type":"ListItem"},{"name":"Wallarm WAF","position":18,"description":"Wallarm WAF is a network security and PCI compliance tool that enables programmers to build web-based apps securely. Key features include PCI assessment, threat intelligence, log & patch management, access control, intrusion detection, and incident management.\n\nThe software offers users system notifications tools that automatically send signals when threats arise, enabling prompt mitigation. Wallarm WAF allows users to achieve robust protection protocols against threats like business logic abuse, adverse bots, and account takeover. It also helps website administrators to gain real-time visibility of user activities from a centralized dashboard, promoting improved control.  \n\nIt helps detect and identify misconfiguration issues, vulnerable applications, and malware that may breach website firewalls. Wallarm WAF can support junior engineers in configuring simple rules and at the same time enable senior engineers to use more advanced syntax, increasing productivity and overall output.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/da0e1c1b-dd83-4eb8-b904-3172d23ec74c.png","url":"https://www.softwareadvice.co.uk/software/322470/wallarm-waf","@type":"ListItem"},{"name":"GPayments","position":19,"description":"GPayments is an enterprise-grade payment fraud prevention platform for banks, acquirers, and large merchants. With over 30 years of market-leading experience, our solutions are built on the global EMV® 3D Secure (3DS) standard to stop fraud, reduce chargebacks, and ensure full compliance with Strong Customer Authentication (SCA) mandates.\nOur modular, AI-assisted suite provides a complete, end-to-end solution for the entire payments ecosystem:\n\n•ActiveAccess (Access Control Server): The complete solution for Card Issuers (Banks). ActiveAccess meets all global 3DS compliance mandates. Its powerful, AI-driven risk engine provides frictionless authentication for low-risk cardholders, reducing \"step-ups\" while securely blocking fraud.\n\n•ActiveServer(3DS Server): The ideal solution for Merchants, Acquirers, and Payment Processors. ActiveMerchant integrates into your payment flow to provide liability shift, drastically cutting chargeback losses and increasing your payment authorisation rates.\n\n•TestLabs (3DS Testing Environment): De-risk your go-live. TestLabs is a comprehensive end-to-end testing platform—not a simulator. It uses live 3DS components (ACS, 3DS Server, Directory Server) to let you validate configurations, test custom scenarios, and ensure your integration is flawless before production.\n\n\nAvailable as an on-premise installation or a flexible cloud-hosted service, GPayments' solutions are fully certified (EMVCo, PCI) and trusted by leading financial institutions globally to secure their payment channels.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5ce0497c-b551-4df3-87e5-53d1c3b76c9d.png","url":"https://www.softwareadvice.co.uk/software/256153/gpayments","@type":"ListItem"},{"name":"Drata","position":20,"description":"Designed for businesses in healthcare, insurance, technology and other industries, Drata is a cloud-based compliance automation software that helps businesses regulate operational audit processes, mitigate business risks and more. The solution enables users to collect evidence, automate policy implementation and track asset statuses. It also helps members respond to requests, answer auditor questions and facilitate collaboration with compliance experts on a unified platform. Key features include third-party integration, risk assessment, trust center, policy management, audit planning, security reviews and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a0da2f42-4b5f-478a-b1c6-707bae57b6f9.png","url":"https://www.softwareadvice.co.uk/software/359648/drata","@type":"ListItem"},{"name":"ITAC SecureFile","position":21,"description":"ITAC SecureFile is an enterprise solution designed to facilitate secure information exchange processes. It automates and secures file transfers by utilizing transport and encryption standards without altering the applications that generate or receive the files. \n\nWith ITAC SecureFile, organizations can experience several benefits, such as decreased operational load related to monitoring and control of file exchange processes, streamlined incorporation of new file exchange processes, centralized administration of encryption keys and digital certificates, accelerated compliance with government regulations for information protection (including HIPAA and PSI), enhanced security and mitigation of risks associated with fraud and data leakage, and improved security over SFTP.\n\nThe software offers various functionalities, including encryption of files using symmetric and asymmetric encryption algorithms like PGP and JKS, secure file transfer through protocols like FTP, FTPS, SFTP, and HTTPS, automation of transfer workflows for efficient and timely file delivery, user profile management, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d862283a-e1fe-46a0-a3f3-ef6c418c7167.png","url":"https://www.softwareadvice.co.uk/software/420697/itac-securefile","@type":"ListItem"},{"name":"Enigma Vault","position":22,"description":"Enigma Vault offers cloud-based data security solutions that protect what's most important.\n\nPractically every industry has been plagued with data security issues: data breaches through application vulnerabilities, cloud bucket storage leaks, lost database and file share backups, administrative credential exposure, weak passwords, permissions mishaps, intentional insider threats, and more. The risk to your data will only increase over time with the advent of new threats and the accumulation of data. It all sounds doom and gloom, but it doesn't have to be this way.\n\nEnigma Vault is a SaaS-based secure card, data, and file storage and processing solution built from the ground up to solve many of your data security problems. Instead of you handling and storing sensitive data, we give you a token that can then be used for later retrieval and processing. Let's go over the three different vaults that comprise the suite.\n\nCard Vault encrypts, tokenizes, and processes card data. If you use Card Vault, you'll never have to handle card data again. This greatly reduces your PCI scope. Yet at the same time, you have full control over the stored cards and will integrate seamlessly with your existing payment provider.\n\nData Vault encrypts and tokenizes your plaintext data. Plaintext data could be anything from various personally identifiable information (PII), healthcare data, education data, financial data, human resources data, criminal justice / background check data...you name it that's normally stored in a database, and it can be stored in Data Vault.\n\nFile Vault works very similar to Data Vault except that it handles files such as PDFs, Excel documents, Word documents, etc. It encrypts files of any type. Think of File Vault as your application's secure file storage that's not vulnerable to bucket misconfigurations or accidental user permission issues.\n\nWhat Makes Enigma Vault Unique? \n• The only complete tokenization and encryption solution for cards, data, and files.\n• Easily and securely share data with other Enigma Vault customers.\n• Search encrypted data within Data Vault.\n• Robust disaster recovery strategy backing up data in real-time to another geographical region.\n• You're minutes away from having access to our solution; modern, super easy integration, and developer-friendly.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3e7edbd0-f797-4129-b7ea-7b7bb9fdb6fb.png","url":"https://www.softwareadvice.co.uk/software/339963/enigma-vault","@type":"ListItem"},{"name":"PII Tools","position":23,"description":"PII Tools is a data discovery and remediation solution that helps organizations manage sensitive information across their digital assets. This software quickly locates sensitive data at rest or in motion, both on-premises and in the cloud. It analyzes structured and unstructured data across networks and endpoints to find security risks.\n\nThe intelligent scanning engine can rapidly analyze documents, emails, databases, and cloud storage platforms to pinpoint the exact location of PCI, PII, and PHI. It generates detailed interactive reports to reveal policy gaps and highlight the individuals affected in any breach incident. PII Tools goes beyond scanning to enable surgical redaction and reporting for GDPR, HIPAA, PCI DSS, and other regulations. It also features an API for easy integration into existing workflows.\n\nWith PII Tools, auditors and other professionals can perform security assessments to quantify risk levels across client networks. The software automatically links matched personal data to generate a shareable record per individual. It installs in minutes on existing infrastructure and scales to meet enterprise needs. PII Tools combines speed, accuracy, and usability to help organizations discover, understand, and safeguard sensitive information.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cd4de37b-bd61-4145-8a9e-75d16dfacf95.jpeg","url":"https://www.softwareadvice.co.uk/software/324686/pii-tools","@type":"ListItem"},{"name":"Aware","position":24,"description":"The Aware platform enables organizations to proactively discover, classify, secure, and manage data It solves for governance, risk, compliance and insights from collaboration tools like Slack, Workplace, Teams, and Yammer. Aware secures and protects digital workplaces, enabling visibility into business-critical communications. It mitigates risk associated with sensitive information and enables enhanced compliance monitoring and adherence to Internal policies.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/341243f2-dbac-4d43-9acd-c9b896dac531.png","url":"https://www.softwareadvice.co.uk/software/331022/awarehq","@type":"ListItem"},{"name":"GDPR Register","position":25,"description":"Designed for businesses of all sizes, GDPR Register offers scalable GDPR compliance tools for group companies looking for centralized control over the compliance state of their entities. Special tools enhance sharing of knowledge and tasks within the organization.\n\nTools include:\n- User management and Tasks\n- Customisable fields and templates\n- Instant exporting, reporting and more.\n\nPricing is based on monthly subscriptions and support is extended via FAQs, chat, email, phone and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3acaceb1-4cf1-45d7-9b16-c71652f850e8.png","url":"https://www.softwareadvice.co.uk/software/419018/gdpr-register","@type":"ListItem"}],"numberOfItems":25}
</script>
