Welcome to Compliance Labs

Join us

  • Minimum length of 8 characters.
    The password must have a minimum strength of Strong
    Strength indicator
  • Subscription Plan

    Includes all Basic features, plus:

    • Access to over 1,000 software vendors for compliance.
    • Evidence Effectiveness Evaluation: Comprehensive assessment for one software and one compliance framework.
    • Full access to Software Compliance Testing reports.
    • Unlimited access to exclusive compliance resources (including compliance insights and trend reports, implementation guides, pre-written compliance policies, and comparative Software Compliance Testing reports).
    • Dedicated compliance analyst support via email.
    • Ability to request vendors perform compliance evaluations.

    Features:

    • Access to over 500 software vendors for compliance.
    • Compare and analyze software features, data handling practices, scope, and compliance impacts.
    • Save, export, and share your personalized software vendor lists.

    Includes all Growth Plan features, plus:

    • Evidence Effectiveness Evaluation: Comprehensive assessment for one software and one compliance framework.
    • Unlimited access to exclusive compliance resources (including compliance insights and trend reports, implementation guides, pre-written compliance policies, and comparative Software Compliance Testing reports).
    • Capability to share Compliance Testing reports directly.
    • Dedicated compliance analyst available via email.

    Includes all Free Plan features, plus:

    • Access to over 1,000 software vendors for compliance.
    • Enhanced featured listing on Compliance Labs (one software, up to three compliance frameworks).
    • Compliance Assurance Evaluation: Independent assessment validating compliance adherence for one software and one compliance or framework.
    • Full access to Software Compliance Testing reports.
    • Dedicated vendor portal for streamlined updates and statistical tracking.
    • Monthly compliance alerts highlighting regulatory updates affecting your software.

    Features:

    • Access to over 500 software vendors for compliance.
    • Compare and analyze software features, data handling practices, scope, and compliance impacts.
    • Save, export, and share your personalized software vendor lists.
    • Featured listing on Compliance Labs (one software, one compliance framework).

    You can complete the payment after confirming your email address.

    Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
    • Software logo
    • Vendor
    • What is this Software?
    • Website
    • Cybersecurity Regulations, Standards and Guidelines Tested
    • Other Cybersecurity Regulations, Standards and Guidelines Supported
    • Deployment
    • Environment
    • Region
    • Industry
    • Capabilities
    • Application and DevOps Security
    • Asset Inventory and Management
    • Audit and Compliance Management
    • Awareness and Training
    • Backup and Recovery
    • Data Security
    • Endpoint and Device Protection
    • Identity Management and Access Control
    • Incident Response
    • Logging and Threat Detection
    • Network security
    • Posture and Vulnerability Management
    • Risk Assessment and Management
    • Software Bill Of Materials (SBOM)
    • Zero Trust Network Access
    • DORA Requirements Supported by the Software
    • HIPAA Requirements Supported by the Software
    • MITRE Mitigations Enterprise Supported by the Software
    • ISO/IEC 27001 Requirements Supported by the Software
    • NERC CIP Requirements Supported by the Software
    • NIST CSF Controls Supported by the Software
    • NIST SP6800-53 (LOW) Controls Supported by the Software
    • NIST SSDF Controls Supported by the Software
    • PCI DSS Requirements Supported by the Software
    • Scope Impact
    • Periodic compliance activities supported by the Software
    • The Software store, process, or transmit
    • The Software requires to be integrated with other systems impacting the cybersecurity or compliance of the customer
    • Software modules implemented
    • Software vendor Third-Party Service Providers (TPSPs) used
    • Software NERC CIP scoping
    • Software NIST SSDF scoping
    • Software PCI DSS scoping
    Compare
    Compare ×
    View comparison Continue browsing software