HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
This content is provided by FinTechBenchmarker.com who are responsible for the content. Please contact them if you have any questions.
GRC platform with specialized insurance modules for operational risk, regulatory compliance, third-party risk, and IT/cyber risk management. Features include risk assessments, loss event management, issue remediation tracking, and regulatory reporting for NAIC, Solvency II, and ORSA.
Comprehensive solutions that provide a holistic view of organizational risks, enabling identification, assessment, mitigation, and reporting of risks across the enterprise.
More Enterprise Risk Management Platforms
More Risk Management ...
Automated Risk Detection System automatically scans data to detect emerging risks. |
. | No information available |
Manual Risk Entry Users can manually input and categorize specific risks. |
. | No information available |
Risk Taxonomy Customization Allows customization of taxonomy and categories to suit business needs. |
. | No information available |
Third-Party Data Integration Integration with external databases or feeds for new risk insight. |
. | No information available |
Risk Prioritization Engine Automatically ranks risks according to defined criteria. |
. | No information available |
Scenario Analysis Ability to simulate and assess impact of potential events. |
. | No information available |
Inherent and Residual Risk Scoring Assesses risks before and after mitigation measures. |
. | No information available |
Real-Time Risk Updates Delivers up-to-the-minute changes in risk profiles. |
. | No information available |
Qualitative & Quantitative Assessment Supports both narrative assessment and numerical scoring. |
. | No information available |
Risk Appetite Alignment Links risk scoring and recommendations to organizational risk appetite statements. |
. | No information available |
Number of Supported Risk Types How many distinct risk types the system can handle. |
. | No information available |
Time to Identify New Risk System’s average time to identify a new risk from data ingestion. |
. | No information available |
Control Library Central repository for mitigation controls and actions. |
. | No information available |
Mitigation Assignment Assign responsibility for specific mitigation actions. |
. | No information available |
Mitigation Effectiveness Tracking Monitor and assess the effectiveness of controls. |
. | No information available |
Action Management & Workflow Automates workflows for follow-up and completion of tasks. |
. | No information available |
Automated Control Testing Schedules and conducts control tests on defined intervals. |
. | No information available |
Remediation Plan Management Support for managing, tracking, and reporting on remediation plans. |
. | No information available |
Control Owner Assignment Assigns named individuals or teams to each control. |
. | No information available |
Policy & Procedure Linkage Links mitigation controls to relevant internal policies. |
. | No information available |
Control Frequency Setting Supports scheduling of control activities and tests. |
. | No information available |
Mitigation Completion Time Average required time for closure of mitigation actions. |
. | No information available |
Customizable Dashboards Users can design personalized dashboards and widgets. |
. | No information available |
Regulatory Reporting Templates Standard templates for regulatory bodies (e.g., Solvency II, NAIC, IFRS 17). |
. | No information available |
Data Visualization Tools Interactive charts, graphs, and heatmaps for risk data. |
. | No information available |
Scheduled Automated Reports Create and distribute periodic risk reports automatically. |
. | No information available |
Report Export Formats Number of supported formats: PDF, Excel, CSV, etc. |
. | No information available |
Drill-Down Analysis Click through from summary to detail in analytics dashboards. |
. | No information available |
Peer Benchmarking Compare risk exposure/performance against industry peers. |
. | No information available |
Risk Heatmaps Visual mapping of risk severity, frequency, and exposure. |
. | No information available |
Real-Time Data Refresh How frequently dashboard data updates. |
. | No information available |
API Support Open APIs for integration with other enterprise systems. |
. | No information available |
Data Import/Export Ability to import and export data from/to multiple formats or systems. |
. | No information available |
Core Insurance Platform Integration Direct connectors with policy admin, claims, underwriting, and actuarial systems. |
. | No information available |
Data Lake Compatibility Ability to integrate with enterprise data lakes and warehouses. |
. | No information available |
Single Sign-On (SSO) Integration with enterprise authentication systems. |
. | No information available |
Third-Party Risk Data Integration Supports ingestion of external risk analytics or threat intelligence. |
. | No information available |
Webhooks Trigger external events based on platform actions. |
. | No information available |
Number of Supported Connectors Quantity of pre-built integrations with third-party products. |
. | No information available |
Regulatory Framework Mapping Map risks/controls to standards (Solvency II, SOX, GDPR, etc.). |
. | No information available |
Issue & Incident Management Track, escalate, and resolve compliance and risk issues. |
. | No information available |
Attestation Management Collect and store formal sign-offs on compliance activities. |
. | No information available |
Policy Management Integration Link controls to digital policy management system. |
. | No information available |
Automated Regulatory Updates Receive and integrate updates to changing regulations. |
. | No information available |
Compliance Calendar Central calendar for all compliance-related tasks and deadlines. |
. | No information available |
Audit Trail Immutable logs of all risk/compliance changes and actions. |
. | No information available |
Compliance Dashboard Real-time visualizations of compliance status across risk categories. |
. | No information available |
Role-based Access Control (RBAC) Granular permissions based on user roles. |
. | No information available |
Multi-Factor Authentication (MFA) Adds an extra layer of user authentication. |
. | No information available |
User Provisioning & De-provisioning Automated on-boarding and deactivation of user accounts. |
. | No information available |
Delegated Administration Assigns admin rights for specific modules or data sets. |
. | No information available |
Audit Logging Tracks and logs all user access and data changes. |
. | No information available |
User Profile Customization Ability for users to customize their workspace and alerts. |
. | No information available |
Number of User Roles Supported How many distinct user roles can be configured. |
. | No information available |
Concurrent User Limit Maximum number of users able to log in simultaneously. |
. | No information available |
Horizontal Scalability Architecture can add servers/nodes to handle increased loads. |
. | No information available |
Transaction Processing Speed Time to process a standard risk event or transaction. |
. | No information available |
Maximum Supported Records Largest volume of risk/control records the system supports. |
. | No information available |
Data Ingestion Rate Volume of risk or event data ingested per unit time. |
. | No information available |
Concurrent User Performance Number of concurrent users without notable slow-down. |
. | No information available |
High Availability (HA) Support System includes redundancy and failover for uptime targets. |
. | No information available |
Disaster Recovery Options Automated tools for backup and business continuity. |
. | No information available |
Custom Workflow Builder Graphical tools to design and modify business workflows. |
. | No information available |
Field/Screen Customization Add, remove, or edit data fields and screen layouts. |
. | No information available |
Rule Engine Create business logic to automate processes under specified conditions. |
. | No information available |
Custom Risk Scoring Formulae Design and implement unique risk scoring models. |
. | No information available |
Localization (Language/Region Support) Support for multiple languages, currencies, and date formats. |
. | No information available |
Branding Support Ability to add company logos, brand colors, and white labeling. |
. | No information available |
Custom Alert Rules Tailor when and how system sends notifications or escalations. |
. | No information available |
API Extension Points Ability to extend data model and business process through APIs. |
. | No information available |
Comprehensive Audit Trail Complete logging of all changes to risk records and configurations. |
. | No information available |
Version Control Ability to roll back to previous states of data, methodologies, or configurations. |
. | No information available |
User Activity Monitoring Monitor and review individual user actions for compliance. |
. | No information available |
Change Approval Workflow Enforces approval of critical changes before implementation. |
. | No information available |
Integrated Document Management Store, version, and audit supporting documents within the platform. |
. | No information available |
Time-stamped Logs Logs include accurate date/time stamps for forensic analysis. |
. | No information available |
Data Encryption at Rest and in Transit Sensitive data is always encrypted both during storage and transmission. |
. | No information available |
Granular Access Permissions Fine-grained control over specific data, modules, and features. |
. | No information available |
Data Masking Masking of sensitive fields in UIs, reports, and exports. |
. | No information available |
Anomaly Detection Automated detection of suspicious access or usage patterns. |
. | No information available |
Penetration Testing Certification Third-party validation of platform security posture. |
. | No information available |
Security Incident Alerts Real-time notification of detected security events. |
. | No information available |
Data Retention Policies Ability to configure and enforce retention periods for sensitive data. |
. | No information available |
Audit Compliance (e.g., SOC2, ISO 27001) Certified compliance with recognized security standards. |
. | No information available |
Team Task Assignment Assign specific tasks to teams or individuals in platform. |
. | No information available |
Internal Messaging Communicate, comment, and share insights within the platform. |
. | No information available |
Document Collaboration Co-author, review, and track document changes. |
. | No information available |
Notifications & Alerts Send out time- or event-based notifications to stakeholders. |
. | No information available |
Feedback & Survey Tools Embedded features for soliciting and aggregating user input. |
. | No information available |
Meeting Scheduling Integration Tools to coordinate risk meetings or reviews. |
. | No information available |
Number of Supported Collaboration Users How many users can simultaneously work together on a risk or task. |
. | No information available |
Integrated File Sharing Directly share reports, evidence, and documents with stakeholders. |
. | No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.