FortMesa vs TRAC
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's cyber risk management and security operations capability using simple and easy to use team-based workflows. Map to a cyber standard and build controls
FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- Chat
TRAC is an easy-to-use GRC tool built to help users quickly complete important compliance tasks such as vendor management, risk assessments, and business continuity management.
With built-in intelligence and simple workflows, TRAC makes being compliant simple, while also providing critical data to
TRAC is an easy-to-use GRC tool built to help users quickly complete important compliance tasks such as vendor management, risk assessments, and...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- Chat
Images
Pricing
Starting from
US$20.00/month
- Free Version
- Free Trial
- Subscription
Starting from
US$1,500.00/year
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.4/ 5Features
4.5/ 5Customer Service
4.9/ 5Value for Money
4.7/ 5Features
Total features 50
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Approval Process Control
- Assessment Management
- Asset Tracking
- Audit Management
- Audit Planning
- Audit Trail
- Authentication
- Behavioral Analytics
- Business Continuity Exercising
- Change Management
- Collaboration Tools
- Compliance Management
- Compliance Tracking
- Customizable Reports
- Customizable Templates
- Dashboard
- Dashboard Creation
- Data Import/Export
- Data Visualization
- Document Management
- Document Storage
- Email Alerts
- Endpoint Management
- Enterprise Risk Management
- Event Logs
- Governance
- HIPAA Compliant
- IT Risk Management
- Incident Management
- Issue Management
- KRI (Key Risk Indicator) Monitoring
- Monitoring
- Operational Risk Management
- Password Management
- Patch Management
- Performance Metrics
- Policy Management
- Prioritization
- Real-Time Data
- Real-Time Reporting
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Role-Based Permissions
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Single Sign On
- Task Management
- Third-Party Integrations
- Two-Factor Authentication
- User Management
- Vendor Management
- Visual Analytics
- Vulnerability Protection
- Vulnerability Scanning
- Workflow Management
Total features 40
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Approval Process Control
- Assessment Management
- Asset Tracking
- Audit Management
- Audit Planning
- Audit Trail
- Authentication
- Behavioral Analytics
- Business Continuity Exercising
- Change Management
- Collaboration Tools
- Compliance Management
- Compliance Tracking
- Customizable Reports
- Customizable Templates
- Dashboard
- Dashboard Creation
- Data Import/Export
- Data Visualization
- Document Management
- Document Storage
- Email Alerts
- Endpoint Management
- Enterprise Risk Management
- Event Logs
- Governance
- HIPAA Compliant
- IT Risk Management
- Incident Management
- Issue Management
- KRI (Key Risk Indicator) Monitoring
- Monitoring
- Operational Risk Management
- Password Management
- Patch Management
- Performance Metrics
- Policy Management
- Prioritization
- Real-Time Data
- Real-Time Reporting
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Role-Based Permissions
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Single Sign On
- Task Management
- Third-Party Integrations
- Two-Factor Authentication
- User Management
- Vendor Management
- Visual Analytics
- Vulnerability Protection
- Vulnerability Scanning
- Workflow Management