Resolver vs STORM
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
Resolver's cloud-based corporate security solutions help organizations reduce uncertainty from risk-based decisions. Resolver's corporate security solutions include incident management and reporting, investigations and case management, command center, physical site assessments, and enterprise security risk management (ESRM).
Resolver's cloud-based corporate security solutions help organizations reduce uncertainty from risk-based decisions. Resolver's corporate security...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
Pricing
Starting from
US$10,000.00/year
- Free Version
- Free Trial
- Subscription
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.4/ 5Features
4.3/ 5Customer Service
4.6/ 5Value for Money
4.5/ 5Features
Total features 113
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alarm Management
- Alerts/Escalation
- Alerts/Notifications
- Anonymous Feedback
- Approval Process Control
- Archiving & Retention
- Assessment Management
- Asset Tracking
- Audit Management
- Audit Planning
- Audit Trail
- Automated Routing
- Built-In Database
- Business Process Control
- Case Management
- Change Management
- Collaboration Tools
- Communication Management
- Communications Management
- Compliance Management
- Compliance Tracking
- Configurable Workflow
- Contact Management
- Contract/License Management
- Controls Audit
- Corrective and Preventive Actions (CAPA)
- Customizable Branding
- Customizable Forms
- Customizable Questions
- Customizable Reports
- Customizable Templates
- Dashboard
- Data Import/Export
- Data Management
- Data Visualization
- Document Management
- Document Storage
- Email Alerts
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Enterprise Risk Management
- Event Logs
- Event Management
- Evidence Management
- Exceptions Management
- Forms Management
- Governance
- Historical Reporting
- ISO Compliance
- IT Incident Management
- IT Risk Management
- Incident Management
- Incident Reporting
- Inspection Management
- Intake Management
- Internal Controls Management
- Intrusion Detection System
- Investigation Management
- Issue Management
- KRI (Key Risk Indicator) Monitoring
- Legal Risk Management
- Location Tracking
- Mobile Access
- Mobile Alerts
- Monitoring
- Multi-Channel Communication
- Multi-Language
- Multi-Location
- On Call Scheduling
- Operational Risk Management
- PCI Assessment
- PCI Compliance
- Performance Metrics
- Policy Management
- Prioritization
- Process/Workflow Automation
- Project Management
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Records Management
- Regulatory Reporting
- Reminders
- Reporting & Statistics
- Reporting/Analytics
- Reputational Risk Management
- Response Management
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Risk Reporting
- Risk Scoring
- Role-Based Permissions
- Safety Incident Management
- Sarbanes-Oxley Compliance
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Management
- Self Service Portal
- Single Sign On
- Sourcing Management
- Status Tracking
- Subject Profiles
- Task Management
- Task Scheduling
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Two-Factor Authentication
- User Management
- User Profiles
- Vendor Management
- Version Control
- Vulnerability Protection
- Workflow Management
Total features 33
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alarm Management
- Alerts/Escalation
- Alerts/Notifications
- Anonymous Feedback
- Approval Process Control
- Archiving & Retention
- Assessment Management
- Asset Tracking
- Audit Management
- Audit Planning
- Audit Trail
- Automated Routing
- Built-In Database
- Business Process Control
- Case Management
- Change Management
- Collaboration Tools
- Communication Management
- Communications Management
- Compliance Management
- Compliance Tracking
- Configurable Workflow
- Contact Management
- Contract/License Management
- Controls Audit
- Corrective and Preventive Actions (CAPA)
- Customizable Branding
- Customizable Forms
- Customizable Questions
- Customizable Reports
- Customizable Templates
- Dashboard
- Data Import/Export
- Data Management
- Data Visualization
- Document Management
- Document Storage
- Email Alerts
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Enterprise Risk Management
- Event Logs
- Event Management
- Evidence Management
- Exceptions Management
- Forms Management
- Governance
- Historical Reporting
- ISO Compliance
- IT Incident Management
- IT Risk Management
- Incident Management
- Incident Reporting
- Inspection Management
- Intake Management
- Internal Controls Management
- Intrusion Detection System
- Investigation Management
- Issue Management
- KRI (Key Risk Indicator) Monitoring
- Legal Risk Management
- Location Tracking
- Mobile Access
- Mobile Alerts
- Monitoring
- Multi-Channel Communication
- Multi-Language
- Multi-Location
- On Call Scheduling
- Operational Risk Management
- PCI Assessment
- PCI Compliance
- Performance Metrics
- Policy Management
- Prioritization
- Process/Workflow Automation
- Project Management
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Records Management
- Regulatory Reporting
- Reminders
- Reporting & Statistics
- Reporting/Analytics
- Reputational Risk Management
- Response Management
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Risk Reporting
- Risk Scoring
- Role-Based Permissions
- Safety Incident Management
- Sarbanes-Oxley Compliance
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Management
- Self Service Portal
- Single Sign On
- Sourcing Management
- Status Tracking
- Subject Profiles
- Task Management
- Task Scheduling
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Two-Factor Authentication
- User Management
- User Profiles
- Vendor Management
- Version Control
- Vulnerability Protection
- Workflow Management
Integrations
- Bugzilla
- Jira
- Microsoft Azure
- OTRS
- Okta
- Proteus
- ServiceNow
- Slack
- VMRay Analyzer
- Workato
- Workday HCM
- Zendesk Suite
- baramundi Management Suite
- Bugzilla
- Jira
- Microsoft Azure
- OTRS
- Okta
- Proteus
- ServiceNow
- Slack
- VMRay Analyzer
- Workato
- Workday HCM
- Zendesk Suite
- baramundi Management Suite