The "/v3.12.0/Release v3...lease v3.12.0.tar.gz" file could not be found or is not available. Please select another file.

Best Compliance Software in the UK - Page 9

Compare the Top Compliance Software in the UK as of April 2026 - Page 9

  • 1
    TimeTrex

    TimeTrex

    TimeTrex

    Rules can be automatically applied to specific employees or situations to automate all calculations, including overtime, premiums and multiple pay rates! Managers can remotely monitor and get up to the second reports regarding employee time and attendance, from anywhere at anytime. Eliminate waiting until the end of the pay period to review attendance records. Setup an unlimited number of accruals to automatically track employee vacations, sick days or banked time. Employees can also see their own accrual balances, eliminating time-consuming requests to human resources to lookup that information. Management has fine-grained control and tracking over where employees are able to punch in/out from, including down to the device and GEO fence level. Allocate time to jobs / tasks and track employee expenses while in the field. Handle employee skills / qualifications and process payroll with just a few clicks.
    Starting Price: $5 per month
  • 2
    Avantra

    Avantra

    Avantra

    With nearly 20 years experience helping Enterprises and Managed Service Providers (MSPs) globally to better manage their SAP and cloud landscapes, we know what it takes to deliver better service, productivity, innovation and compliance to businesses who rely on SAP. Founded in Switzerland with global presence in UK, USA, Germany and Australia we are well placed to support the largest SAP customers and Managed Service Providers.
  • 3
    ManageEngine Exchange Reporter Plus
    Reporting, auditing, and monitoring solution for hybrid Exchange and Skype for Business. Monitor mailbox size, mailbox growth trend, size restrictions, and quota limits. Keep a close eye on the traffic in your organization using server traffic reports. Stay informed about the number and size of messages sent and received in your organization using the mailbox traffic reports. Fetch vital statistics about OWA, ActiveSync, and other Exchange objects like public folders and distribution lists. Get all information about the Skype for Business server including conference, instant messaging, audio, and video details. Create custom reports; customize predefined reports; schedule reports for timely updates; and export reports in CSV, PDF, HTML, and XLS formats. Over 450 intuitive Exchange Server and Exchange Online reports.
    Starting Price: $345 per year
  • 4
    Skybox Security

    Skybox Security

    Skybox Security

    The Skybox approach to risk-based vulnerability management starts with fresh vulnerability data from your entire network — physical IT, multi–cloud and operational technology (OT). Skybox uses a wide range of sources, including asset and patch management systems and network devices, to assess vulnerabilities without a scan. We also collect, centralize and merge data from multiple scanners to give you the most accurate vulnerability assessments on demand. Centralize and enhance vulnerability management processes from discovery to prioritization and remediation. Harness the power vulnerability and asset data, as well as network topology and security controls. Use network modeling and attack simulation to find exposed vulnerabilities. Augment vulnerability data with intelligence on the current threat landscape. Know your best remediation option, including patching, IPS signatures and network–based changes.
  • 5
    Qualys VMDR
    The industry's most advanced, scalable and extensible solution for vulnerability management. Fully cloud-based, Qualys VMDR provides global visibility into where your IT assets are vulnerable and how to protect them. With VMDR 2.0, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure its true risk, and track risk reduction over time. Discover, assess, prioritize, and patch critical vulnerabilities and reduce cybersecurity risk in real time and across your global hybrid IT, OT, and IoT landscape. Quantify risk across vulnerabilities, assets, and groups of assets to help your organization proactively mitigate risk exposure and track risk reduction over time with Qualys TruRisk™
  • 6
    Probely

    Probely

    Probely

    Probely is a web vulnerability scanner for agile teams. It provides continuous scanning of web applications and lets you efficiently manage the lifecycle of the vulnerabilities found, in a sleek and intuitive web interface. It also provides simple instructions on how to fix the vulnerabilities (including snippets of code), and by using its full-featured API, it can be integrated into development processes (SDLC) and continuous integration pipelines (CI/CD), to automate security testing. Probely empowers developers to be more independent, solving the security teams' scaling problem, that is usually undersized when compared to development teams, by providing developers with a tool that makes them more independent when it comes to security testing, allowing security teams to focus on more important and critical activities. Probely covers OWASP TOP10 and thousands more and can be used to check specific PCI-DSS, ISO27001, HIPAA, and GDPR requirements.
    Starting Price: $49.00/month
  • 7
    K2View

    K2View

    K2View

    At K2View, we believe that every enterprise should be able to leverage its data to become as disruptive and agile as the best companies in its industry. We make this possible through our patented Data Product Platform, which creates and manages a complete and compliant dataset for every business entity – on demand, and in real time. The dataset is always in sync with its underlying sources, adapts to changes in the source structures, and is instantly accessible to any authorized data consumer. Data Product Platform fuels many operational use cases, including customer 360, data masking and tokenization, test data management, data migration, legacy application modernization, data pipelining and more – to deliver business outcomes in less than half the time, and at half the cost, of any other alternative. The platform inherently supports modern data architectures – data mesh, data fabric, and data hub – and deploys in cloud, on-premise, or hybrid environments.
  • 8
    Digital Defense
    Providing best-in-class cyber security doesn’t mean blindly chasing the latest trends. It does mean a commitment to core technology and meaningful innovation. See how our vulnerability and threat management solutions provide organizations like yours with the security foundation needed to protect vital assets. Eliminating network vulnerabilities doesn’t have to be complicated, even though that’s what some companies would have you believe. You can build a powerful, effective cybersecurity program that is affordable and easy to use. All you need is a strong security foundation. At Digital Defense, we know that effectively dealing with cyber threats is a fact of life for every business. After more than 20 years of developing patented technologies, we’ve built a reputation for pioneering threat and vulnerability management software that’s accessible, manageable, and solid at its core.
  • 9
    Dropsuite

    Dropsuite

    Dropsuite

    Dropsuite is a cloud software platform enabling businesses and organizations globally to easily backup, recover and protect their important business information. Dropsuite’s commitment to advanced, secure, and scalable cloud technologies keeps us in the forefront of the industry and makes us the choice of leading IT Administrators and Service Providers globally. Dropsuite's cloud-based email archiving solution helps any organization efficiently store, safeguard, manage, and discover data from most email systems such as Microsoft Exchange Online, Hosted Exchange, G Suite Gmail, and IMAP or POP protocols.
  • 10
    Portnox Security

    Portnox Security

    Portnox Security

    Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. As such, the platform can be easily deployed, scaled and managed by lean, resource-constrained IT teams across any corporate network - no matter how complex.
  • 11
    EZ-GO Platform

    EZ-GO Platform

    EZ Factory

    EZ Factory is a SAAS Company with a software solution called “the EZ-GO platform”. This is a mobile solution, with a focus on continuous improvement within production environments. The simple and visual software platform is used in factories to digitize checklists, work instructions, first-line maintenance tasks, and audits to improve safety, quality, training and efficiency on the shop floor. Front-line factory workers finally know what to do, why, where, when, and how to do it. Improve safety, quality and efficiency by digitizing paper forms, lists and other documents on the shop floor. The EZ-GO platform is a mobile solution, with a focus on continuous improvement within production environments. The simple and visual app is used in factories to digitize checklists, first line maintenance tasks and audits. Furthermore, the solution offers the possibility to setup work instructions and motivates operators to propose improvements.
  • 12
    Jit

    Jit

    Jit

    DevOps ain’t easy! We are hearing more and more about the breakdown and friction where Dev meets Ops, so let’s not even talk about all the other shift-left domains that add another layer of complexity in the middle like DevSecOps. Where this comes with the need to implement and integrate dozens of security tools in their SDLC. But what if it doesn’t have to be difficult? Jit's DevSecOps Orchestration Platform allows high-velocity Engineering teams to own product security while increasing dev velocity. With a unified and friendly developer experience, we envision a world where every cloud application is born with Minimal Viable Security (MVS) embedded and iteratively improves by adding Continuous Security into CI/CD/CS.
  • 13
    OneTrust Privacy Automation
    Go beyond compliance and build trust through transparency, choice, and control. People demand greater control of their data, unlocking an opportunity for organizations to use these moments to build trust and deliver more valuable experiences. We provide privacy and data governance automation to help organizations better understand their data across the business, meet regulatory requirements, and operationalize risk mitigation to provide transparency and choice to individuals. Achieve data privacy compliance faster and build trust in your organization. Our platform helps break down silos across processes, workflows, and teams to operationalize regulatory compliance and enable trusted data use. Build proactive privacy programs rooted in global best practices, not reactive to individual regulations. Gain visibility into unknown risks to drive mitigation and risk-based decision making. Respect individual choice and embed privacy and security by default into the data lifecycle.
  • 14
    Sign.Plus
    Sign.Plus is a legally-binding electronic signature solution, designed to make workflows faster for businesses of all sizes, from large enterprises to SMEs and even individuals. Sign.Plus Features: • Fill, sign, and send PDF documents, contracts, leases, NDAs, agreements, and more. • Extremely easy-to-use eSignature solution available on multiple platforms, including web, mobile, Google Workspace, and more. • Monitor the progress of your signature requests in real-time. • Reusable templates to send out frequent documents to different recipients. • Certificate of completion that contains a tamper-proof audit report with details about the signers. • Set up a team and add your employees to your team. • Compliant with electronic signature regulations such as ESIGN, eIDAS, ZertES, and more. • Compliant with the world’s strictest data regulations such as ISO 27001, SOC2 Type 2. • Data encryption in transit and at rest. • Data residency
    Starting Price: $9.99 per month
  • 15
    Prembly

    Prembly

    Prembly

    Prembly is the go-to simplified KYC/KYB solution company, enabling digital businesses acquire and onboard customers with ease through tools that can be accessed for instant Data verification, Document Verification, and Biometric Authentication.
    Starting Price: $0.5/API Calls
  • 16
    Redact

    Redact

    Redact.dev

    Redact empowers individuals and businesses to privately and securely automate the removal of their user generated content from nearly every major platform. Strengthen your privacy and security with smart deletion, keyword scanning and complete content wipes. Download Redact today and take control of your digital footprint. Redact is a Privacy first company.
    Starting Price: $34.99
  • 17
    heyData

    heyData

    heyData

    Implementing data protection guidelines in your company has never been so easy as with heyData's premium software-as-a-service solution. More than 1,000 companies already rely on heyData’s all-encompassing data protection solution. Streamline compliance-related workflows to free up valuable time for day-to-day operations. Use the heyData platform to assign training to your employees and enter into agreements with them, such as confidentiality agreements or home office policies. These documents can be signed digitally via the platform. Your employees can use the heyData platform to familiarize themselves independently with various compliance topics, such as the General Data Protection Regulation (GDPR). A certificate of completion provides the necessary proof of the training. You can store your data protection-relevant documents in the heyData document vault, securely stored on German servers. This includes automatically generated audit reports and data protection notifications.
    Starting Price: €89 per month
  • 18
    Hürdenlos.Assist

    Hürdenlos.Assist

    Hürdenlos GmbH

    Hürdenlos.Assist is a lightweight and customizable web accessibility widget developed by Hürdenlos GmbH. It enables website visitors to adapt digital content to their individual accessibility needs directly within the user interface, without requiring complex or invasive changes to the existing website structure. The widget offers a set of practical features such as text size adjustment, improved color contrast and alternative color schemes, focus highlighting, font and spacing optimization, and enhanced keyboard navigation. These functions support people with visual, motor, or cognitive impairments, as well as users who benefit from better readability and interaction in specific situations, for example on mobile devices or in challenging lighting conditions. From a technical perspective, Hürdenlos.Assist is easy to integrate and maintain. It can typically be added to a website via a simple code snippet and works with common content management systems.
    Starting Price: €33
  • 19
    Orbiq

    Orbiq

    Orbiq GmbH

    Orbiq is a Trust Center platform that turns internal compliance work into external, verifiable proof for buyers, auditors, and regulators. Companies connect their existing ISMS, SharePoint, Confluence, or Drive to a branded Trust Center (trust.yourcompany) with layered access — public, restricted, or NDA-gated — so every stakeholder sees the right level of detail. Built for the NIS2 and DORA era, Orbiq goes beyond document sharing: live vendor registers, incident reporting with audit-logged timestamps, AI-powered questionnaire responses, and continuous monitoring give regulated enterprises the ongoing third-party visibility that modern procurement demands. Unlike tools focused on reducing questionnaire volume, Orbiq provides the structured, always-current proof layer that banks, regulators, and enterprise buyers now expect — hosted in the EU, with watermarking, download tracking, and full audit trails.
    Starting Price: $85/month
  • 20
    BoardBreeze

    BoardBreeze

    BoardBreeze

    BoardBreeze® is an AI-powered board meeting management platform that automatically converts audio recordings of board meetings into professionally formatted, compliance-ready meeting minutes — in under 15 minutes. Built specifically for board clerks, executive assistants, corporate secretaries, and governance professionals, BoardBreeze® eliminates the 4 to 6 hours of manual labor that typically follows every board meeting.Unlike general-purpose transcription tools such as Otter.ai or Fireflies.ai that produce raw, unformatted transcripts, BoardBreeze® delivers finished board meeting minutes — structured according to Robert's Rules of Order, with motions, seconds, votes, action items, and agenda items automatically identified, labeled, and organized.
    Starting Price: $29/month
  • 21
    SAP Litmos LMS
    SAP Litmos is a SAAS/Cloud platform for e-learning, also known as a learning management system or LMS. SAP Litmos cloud-based LMS is intended to get learners engaged with great user experiences anytime, anywhere, on any device. SAP Litmos LMS allows you to create courses and learning paths utilizing video, audio, text, surveys, and more in SCROM, Tin Can, or AICC. An LMS gives training professionals everything they need to manage their entire training program from one secure, centralized environment. A cloud-based solution that unifies virtual, classroom, mobile, and social learning, SAP Litmos LMS empowers training departments, sales and service leaders, safety and compliance managers, and HR teams to collaborate, author, globally distribute, and track web-based training courses, as well as schedule and track instructor-led courses. It automates formerly burdensome tasks so that teams can focus their energy on aligning training with the company’s strategic agenda.
  • 22
    AuditBoard

    AuditBoard

    AuditBoard

    AuditBoard transforms how audit, risk, and compliance professionals manage today’s dynamic risk landscape with a modern, connected platform that engages the front lines, surfaces the risks that matter, and drives better strategic decision-making. More than 25% of the Fortune 500 leverage AuditBoard to move their businesses forward with greater clarity and agility. AuditBoard is top-rated in audit management and GRC software on G2, and was recently ranked as one of the 100 fastest-growing technology companies in North America by Deloitte. To learn more, visit: auditboard.com.
  • 23
    TurnKey Lender

    TurnKey Lender

    TurnKey Lender

    TurnKey Lender is a one-stop lending infrastructure used by creditors in 50+ countries to automate all elements of their operations. The platform enables lenders to profitably grow their business while cutting operational costs and risks. It's a powerful AI-driven SaaS that automates over 90% of all lending processes and gives both B2C and B2B lenders a competitive edge. TurnKey Lender Platform has several pre-configured solutions packages including Commercial, Consumer, Pay Later, Auto, Mortgage, Leasing, Factoring. Built in constant collaboration with lenders worldwide, TurnKey Lender is the ultimate solution that answers real-life digital lending challenges in a sophisticated manner.
  • 24
    ObservePoint

    ObservePoint

    ObservePoint

    Automatically audit and monitor your data collection technologies and user paths to ensure accurate and secure customer data. Automatically test and validate your website technologies to ensure accurate data collection and insights. Audit your cookies and tags to know what data is being collected, who is collecting it, and where they are sending it. Standardize campaign tracking and automate page testing for accurate customer journey insights and smooth experiences.Set up regular audits of your web properties to uncover potential tagging errors, such as duplicate, missing, or unauthorized tags. Validate the data you’re collecting so you can make better decisions for your customers and your company. Connect to any WiFi-enabled device and run test scripts on the spot to ensure data collection matches your expectations.
  • 25
    Polarion REQUIREMENTS
    Effectively gather, author, approve and manage requirements for complex systems across entire project lifecycles. Facilitate synchronicity and easy access via 100% browser-based access to all Polarion data. Enable real-time communication between analysts, engineers, QA members and DevOps teams etc. via threaded discussions, wikis, notifications, alerts & more. Pass any audit, compliance, or regulatory inspection with traceability that is easily implemented and guaranteed via automatic change control of every requirement. Manage work items and documents via workflows that enforce how and when they move from state to state based on definable rules, with full audit trails, electronic signature and security. An exclusive innovation, Polarion LiveDocs, enables you to collaborate concurrently and securely on specification documents with having every single paragraph uniquely identifiable and traceable.
  • 26
    SailPoint

    SailPoint

    SailPoint Technologies

    You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world.
  • 27
    Chef

    Chef

    Progress Software

    Chef turns infrastructure into code. With Chef, you can automate how you build, deploy, and manage your infrastructure. Your infrastructure becomes as versionable, testable, and repeatable as application code. Chef Infrastructure Management ensures configurations are applied consistently in every environment with infrastructure management automation. Chef Compliance makes it easy to maintain and enforce compliance across the enterprise. Deliver successful application outcomes consistently at scale with Chef App Delivery. Chef Desktop allows IT teams to automate the deployment, management, and ongoing compliance of IT resources. Ensure configurations are applied consistently in every environment. Powerful policy-based configuration management system software. Runbook automation to consistently define, package & deliver applications. IT automation & DevOps dashboards for operational visibility.
  • 28
    Check Point CloudGuard

    Check Point CloudGuard

    Check Point Software Technologies

    The Check Point CloudGuard platform provides you cloud native security, with advanced threat prevention for all your assets and workloads – in your public, private, hybrid or multi-cloud environment – providing you unified security to automate security everywhere. Prevention First Email Security: Stop zero-day attacks. Remain ahead of attackers with unparalleled global threat intel. Leverage the power of layered email security. Native Solution, at the Speed of Your Business: Fast, straightforward deployment of invisible inline API based prevention. Unified Solution for Cloud Email & Office Suites: Granular insights and clear reporting with a single dashboard and license fee across mailboxes and enterprise apps. Check Point CloudGuard provides cloud native security for all your assets and workloads, across multi-clouds, allowing you to automate security everywhere, with unified threat prevention and posture management.
  • 29
    LiveRamp

    LiveRamp

    LiveRamp

    Everything we do centers on making data safe and easy for businesses to use. Our Safe Haven platform powers customer intelligence, engages customers at scale, and creates breakthrough opportunities for business growth. Our platform offers the modern enterprise full control of how data can be accessed and used with industry leading software solutions for identity, activation, and data collaboration. Build access to data, develop valuable business insights and drive revenue while maintaining full control over access and use of data at all times. Accurately address your specific audiences at scale across any channel, platform, publisher or network and safely translate data between identity spaces to improve results. Protect your customer data with leading privacy-preserving technologies and advanced techniques to minimize data movement while still enabling insight generation.
  • 30
    Silverfort

    Silverfort

    Silverfort

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative agentless and proxyless technology, Silverfort seamlessly integrates with all existing IAM solutions (e.g., AD, RADIUS, Azure AD, Okta, Ping, AWS IAM), extending coverage to assets that could not previously have been protected, such as legacy applications, IT infrastructure, file systems, command-line tools, and machine-to-machine access. Our platform continuously monitors all access of users and service accounts across both cloud and on-premise environments, analyzes risk in real time, and enforces adaptive authentication and access policies.
MongoDB Logo MongoDB