Plans and Pricing
Private Equity
Automate security compliance and risk management across your portfolio companies
We've created a pricing model designed for the unique operating model of private equity firms and holding companies.
100% portfolio ready
Included content
Full-stack cyber GRC
No usage limits



It's simple, we just price per portfolio company
Centralized governance and audit initiation for the PE firm and semi-autonomous operations, segregated data and discrete access management for portfolio companies.
Pricing is volume-based and dependent on the needs of each portfolio company, with options ranging from assessment and remediation only to a full-GRC solution.
Included standards, frameworks, libraries and templates



.png?width=90&height=82&name=SOC%202%20(1).png)

Features
Features
Explore the powerful and extensive GRC capability of the 'Hub' designed for organizations with distributed operations.
Content management
Included | |
---|---|
Define your own content
|
|
Create your own exclusive content library
|
|
Integrated frameworks, standards, laws, and regulations
|
|
Pre-defined risk and issue libaries
|
|
Pre-defined audit and assessment templates
|
|
Pre-defined obligation and control sets
|
|
Pre-defined projects and playbooks
|
|
Define your own content
|
|
Share content across portfolio companies
|
|
Spoke management
Included | |
---|---|
Hub for central access and control
|
|
Spoke grouping and segmentation
|
|
Spoke templating
|
|
Bulk assess Spokes
|
|
Roll up reporting & analytics
Included | |
---|---|
Pre-built reports
|
|
Dashboards
|
|
LiveDocs stories and presentations
|
|
Custom report builder
|
|
Send reports to external team members
|
|
Power BI connector for advanced analytics
|
|
Rolled up reporting and analytics across spokes
|
|
Customization, user access & security
Included | |
---|---|
Role based access control (RBAC)
|
|
Multi-factor authentication
|
|
Single Sign-On (Okta, Azure AD, PingID)
|
|
Data level permissions
|
|
Custom branding
|
|
Use your own email domain for notifications
|
Ask us
|
Use your own domain - i.e., grc.yourdomain.com
|
Ask us
|
Developer API
Included | |
---|---|
Developer API using REST architecture
|
|
Build custom GRC workflows
|
|
Trigger internal and external events
|
|
Export and integrate data for advanced reporting
|
|
Build custom control tests
|
|
Intelligently accelerate your cyber risk and compliance program today
