RiskWatch ERM offers risk assessment, mitigation tracking, compliance management, and reporting functionalities tailored for various industries, including insurance. The platform features customizable dashboards and mobile accessibility.
More about RiskWatch International
Comprehensive solutions that provide a holistic view of organizational risks, enabling identification, assessment, mitigation, and reporting of risks across the enterprise.
More Enterprise Risk Management Platforms
More Risk Management ...
Automated Risk Detection System automatically scans data to detect emerging risks. |
RiskWatch ERM advertises automated risk assessment, which strongly implies automated risk detection as part of its core offering. | |
Manual Risk Entry Users can manually input and categorize specific risks. |
Platform allows users to input and manage specific risks, matching the 'manual risk entry' feature. | |
Risk Taxonomy Customization Allows customization of taxonomy and categories to suit business needs. |
Customizable dashboards and risk assessment categories indicate taxonomy customization is available. | |
Third-Party Data Integration Integration with external databases or feeds for new risk insight. |
Integration for compliance management suggests support for third-party data integrations. | |
Risk Prioritization Engine Automatically ranks risks according to defined criteria. |
No information available | |
Scenario Analysis Ability to simulate and assess impact of potential events. |
RiskWatch ERM supports scenario and risk impact analysis, as evidenced in product documentation. | |
Inherent and Residual Risk Scoring Assesses risks before and after mitigation measures. |
The platform provides both inherent and residual risk scoring in risk assessment workflows. | |
Real-Time Risk Updates Delivers up-to-the-minute changes in risk profiles. |
Real-time dashboards and updates are listed among features. | |
Qualitative & Quantitative Assessment Supports both narrative assessment and numerical scoring. |
Both qualitative and quantitative assessments are supported; platform specifically mentions numeric and narrative scoring. | |
Risk Appetite Alignment Links risk scoring and recommendations to organizational risk appetite statements. |
Custom risk appetite frameworks are promoted as part of the product's adaptability. | |
Number of Supported Risk Types How many distinct risk types the system can handle. |
No information available | |
Time to Identify New Risk System’s average time to identify a new risk from data ingestion. |
No information available |
Control Library Central repository for mitigation controls and actions. |
RiskWatch includes a control library used for mitigation actions and tracking. | |
Mitigation Assignment Assign responsibility for specific mitigation actions. |
Allows assigning mitigation responsibilities to users, as per UI screenshots. | |
Mitigation Effectiveness Tracking Monitor and assess the effectiveness of controls. |
Mitigation effectiveness tracking is included in reporting and dashboards. | |
Action Management & Workflow Automates workflows for follow-up and completion of tasks. |
Automated workflows—including action management—are part of the mitigation module. | |
Automated Control Testing Schedules and conducts control tests on defined intervals. |
No information available | |
Remediation Plan Management Support for managing, tracking, and reporting on remediation plans. |
Remediation plan management is explicitly listed as a feature. | |
Control Owner Assignment Assigns named individuals or teams to each control. |
Platform allows assignment of control owners for mitigation tasks. | |
Policy & Procedure Linkage Links mitigation controls to relevant internal policies. |
Links between controls and relevant policies are supported. | |
Control Frequency Setting Supports scheduling of control activities and tests. |
Platform provides scheduling of control tasks. | |
Mitigation Completion Time Average required time for closure of mitigation actions. |
No information available |
Customizable Dashboards Users can design personalized dashboards and widgets. |
Customizable dashboards are a central selling point. | |
Regulatory Reporting Templates Standard templates for regulatory bodies (e.g., Solvency II, NAIC, IFRS 17). |
Compliance and regulatory reporting, including templates, are marketed as a feature. | |
Data Visualization Tools Interactive charts, graphs, and heatmaps for risk data. |
Interactive graphs and data visualization are emphasized in demos and documentation. | |
Scheduled Automated Reports Create and distribute periodic risk reports automatically. |
Scheduled, automated report distribution is available. | |
Report Export Formats Number of supported formats: PDF, Excel, CSV, etc. |
No information available | |
Drill-Down Analysis Click through from summary to detail in analytics dashboards. |
Dashboards support drill-down analysis. | |
Peer Benchmarking Compare risk exposure/performance against industry peers. |
No information available | |
Risk Heatmaps Visual mapping of risk severity, frequency, and exposure. |
Visual risk heatmaps are present in the analytics features. | |
Real-Time Data Refresh How frequently dashboard data updates. |
No information available |
API Support Open APIs for integration with other enterprise systems. |
RESTful API support for integrations is included according to product specs. | |
Data Import/Export Ability to import and export data from/to multiple formats or systems. |
Data import/export capability is a frequently cited feature. | |
Core Insurance Platform Integration Direct connectors with policy admin, claims, underwriting, and actuarial systems. |
No information available | |
Data Lake Compatibility Ability to integrate with enterprise data lakes and warehouses. |
No information available | |
Single Sign-On (SSO) Integration with enterprise authentication systems. |
Single sign-on (SSO) support is available for enterprise customization. | |
Third-Party Risk Data Integration Supports ingestion of external risk analytics or threat intelligence. |
Supports ingestion of external risk analytics; explicitly listed. | |
Webhooks Trigger external events based on platform actions. |
No information available | |
Number of Supported Connectors Quantity of pre-built integrations with third-party products. |
No information available |
Regulatory Framework Mapping Map risks/controls to standards (Solvency II, SOX, GDPR, etc.). |
RiskWatch ERM maps risks and controls to regulatory standards, as described for insurance and financial sectors. | |
Issue & Incident Management Track, escalate, and resolve compliance and risk issues. |
Platform includes incident and issue management as part of workflows. | |
Attestation Management Collect and store formal sign-offs on compliance activities. |
No information available | |
Policy Management Integration Link controls to digital policy management system. |
Integrates with policy management to link rules with controls. | |
Automated Regulatory Updates Receive and integrate updates to changing regulations. |
No information available | |
Compliance Calendar Central calendar for all compliance-related tasks and deadlines. |
Product contains a compliance calendar for tasks and deadlines. | |
Audit Trail Immutable logs of all risk/compliance changes and actions. |
Immutable audit trail is noted as part of their compliance assurance. | |
Compliance Dashboard Real-time visualizations of compliance status across risk categories. |
Compliance dashboard with real-time compliance status provided. |
Role-based Access Control (RBAC) Granular permissions based on user roles. |
Role-based access control (RBAC) cited as a core feature for all users. | |
Multi-Factor Authentication (MFA) Adds an extra layer of user authentication. |
Multi-factor authentication (MFA) supported for secure access. | |
User Provisioning & De-provisioning Automated on-boarding and deactivation of user accounts. |
Automated onboarding/provisioning and de-provisioning advertised in documentation. | |
Delegated Administration Assigns admin rights for specific modules or data sets. |
No information available | |
Audit Logging Tracks and logs all user access and data changes. |
Audit logging is part of audit trail and compliance features. | |
User Profile Customization Ability for users to customize their workspace and alerts. |
User profile customization supported for dashboards and notifications. | |
Number of User Roles Supported How many distinct user roles can be configured. |
No information available | |
Concurrent User Limit Maximum number of users able to log in simultaneously. |
No information available |
Horizontal Scalability Architecture can add servers/nodes to handle increased loads. |
Described as a cloud platform with scalable infrastructure. | |
Transaction Processing Speed Time to process a standard risk event or transaction. |
No information available | |
Maximum Supported Records Largest volume of risk/control records the system supports. |
No information available | |
Data Ingestion Rate Volume of risk or event data ingested per unit time. |
No information available | |
Concurrent User Performance Number of concurrent users without notable slow-down. |
No information available | |
High Availability (HA) Support System includes redundancy and failover for uptime targets. |
Marketed as a highly available solution with business continuity protections. | |
Disaster Recovery Options Automated tools for backup and business continuity. |
Disaster recovery and automated backups cited among enterprise ready features. |
Custom Workflow Builder Graphical tools to design and modify business workflows. |
Includes drag-and-drop workflow builder per demo and manuals. | |
Field/Screen Customization Add, remove, or edit data fields and screen layouts. |
Allows field and screen customization as part of its configurability. | |
Rule Engine Create business logic to automate processes under specified conditions. |
Business rules engine available for workflow and automation customization. | |
Custom Risk Scoring Formulae Design and implement unique risk scoring models. |
Risk scoring formulae are customizable. | |
Localization (Language/Region Support) Support for multiple languages, currencies, and date formats. |
Supports multiple language, currency, and date/region formats. | |
Branding Support Ability to add company logos, brand colors, and white labeling. |
No information available | |
Custom Alert Rules Tailor when and how system sends notifications or escalations. |
Custom alerting rules are supported for notifications and escalations. | |
API Extension Points Ability to extend data model and business process through APIs. |
REST APIs may be extended for custom data/process integrations. |
Comprehensive Audit Trail Complete logging of all changes to risk records and configurations. |
Comprehensive audit log of changes provided by platform. | |
Version Control Ability to roll back to previous states of data, methodologies, or configurations. |
Version control for risk and control records exists. | |
User Activity Monitoring Monitor and review individual user actions for compliance. |
User activity monitoring is supported. | |
Change Approval Workflow Enforces approval of critical changes before implementation. |
No information available | |
Integrated Document Management Store, version, and audit supporting documents within the platform. |
Integrated document management included as standard. | |
Time-stamped Logs Logs include accurate date/time stamps for forensic analysis. |
Audit logs are time-stamped, per product documentation. |
Data Encryption at Rest and in Transit Sensitive data is always encrypted both during storage and transmission. |
Encryption at rest and in transit are part of security features. | |
Granular Access Permissions Fine-grained control over specific data, modules, and features. |
Granular access permissions are part of the RBAC feature set. | |
Data Masking Masking of sensitive fields in UIs, reports, and exports. |
Data masking available for sensitive fields in compliance exports and UI. | |
Anomaly Detection Automated detection of suspicious access or usage patterns. |
Anomaly detection (unusual behavior detection) is supported per security documentation. | |
Penetration Testing Certification Third-party validation of platform security posture. |
No information available | |
Security Incident Alerts Real-time notification of detected security events. |
Security incident alerts are sent for important security events. | |
Data Retention Policies Ability to configure and enforce retention periods for sensitive data. |
Data retention policies can be configured by administrators. | |
Audit Compliance (e.g., SOC2, ISO 27001) Certified compliance with recognized security standards. |
Compliance certifications (e.g., SOC2) promoted by the vendor. |
Team Task Assignment Assign specific tasks to teams or individuals in platform. |
Facilitates team task assignment within projects. | |
Internal Messaging Communicate, comment, and share insights within the platform. |
Internal messaging and commentary supported in the platform. | |
Document Collaboration Co-author, review, and track document changes. |
Document collaboration (co-authoring and review) part of risk document workflow. | |
Notifications & Alerts Send out time- or event-based notifications to stakeholders. |
Notifications and alerts configurable for stakeholders. | |
Feedback & Survey Tools Embedded features for soliciting and aggregating user input. |
Feedback and survey tools embedded for stakeholder engagement. | |
Meeting Scheduling Integration Tools to coordinate risk meetings or reviews. |
No information available | |
Number of Supported Collaboration Users How many users can simultaneously work together on a risk or task. |
No information available | |
Integrated File Sharing Directly share reports, evidence, and documents with stakeholders. |
Integrated file/document sharing is a documented capability. |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.