Add to Compare
Add to Compare
Add to Compare
Compare Risk Ledger vs CTM360
Overall Rating
Ease of Use
9
0
Customer Support
9
0
Value for Money
10
0
Functionality
9
0
Specifications
Backup And Disaster Recovery
Cloud Security
Data Encryption
Intrusion Detection
Multi-Factor Authentication
Phishing Prevention
Security Audits And Reporting
Security Information And Event Management (SIEM)
Threat Intelligence
Vulnerability Management
Pros and Cons
Pros
Streamlines supplier onboarding and risk assessment processes
Reduces manual effort with centralized risk data
Enhances visibility and transparency across supply chains
Extremely quick removal of phishing sites, fake apps, and impersonation content
Clear remediation guidance through HackerView and related modules
Provides real-time view of exposed assets, risks, and email security issues
Cons
Data relies on self-assessed supplier input
Bulk supplier invitation process could be improved
Some users find the extensive modules and dashboards confusing at first
Need for more severity scoring and contextual information in reporting