Delivers insurance-centric enterprise risk analytics including capital modeling, risk appetite frameworks, stress and scenario testing, regulatory compliance tools, and decision support for ERM best practices.
Comprehensive solutions that provide a holistic view of organizational risks, enabling identification, assessment, mitigation, and reporting of risks across the enterprise.
More Enterprise Risk Management Platforms
More Risk Management ...
Automated Risk Detection System automatically scans data to detect emerging risks. |
Marketing notes and public documentation refer to automated analytics and risk detection as part of capital modeling and ERM best practices. | |
Manual Risk Entry Users can manually input and categorize specific risks. |
ERM platforms almost universally support manual risk entry; Milliman references customization and documentation for manual input. | |
Risk Taxonomy Customization Allows customization of taxonomy and categories to suit business needs. |
Customizable risk taxonomies are discussed as part of risk appetite framework tailoring to business needs. | |
Third-Party Data Integration Integration with external databases or feeds for new risk insight. |
Integration with external feeds and regulatory data is mentioned in regulatory compliance tool discussions. | |
Risk Prioritization Engine Automatically ranks risks according to defined criteria. |
Automated risk ranking/prioritization is referenced in capital modeling and decision support features. | |
Scenario Analysis Ability to simulate and assess impact of potential events. |
Platform supports stress and scenario analysis as core functionality. | |
Inherent and Residual Risk Scoring Assesses risks before and after mitigation measures. |
Descriptions reference pre- and post-mitigation risk scoring as part of the risk framework. | |
Real-Time Risk Updates Delivers up-to-the-minute changes in risk profiles. |
No information available | |
Qualitative & Quantitative Assessment Supports both narrative assessment and numerical scoring. |
Supports both qualitative and quantitative risk assessment per product overview. | |
Risk Appetite Alignment Links risk scoring and recommendations to organizational risk appetite statements. |
Platform links risk scoring methodology to risk appetite statements, as stated by marketing materials. | |
Number of Supported Risk Types How many distinct risk types the system can handle. |
No information available | |
Time to Identify New Risk System’s average time to identify a new risk from data ingestion. |
No information available |
Control Library Central repository for mitigation controls and actions. |
A listed feature is the 'centralized control library' for mitigation action management. | |
Mitigation Assignment Assign responsibility for specific mitigation actions. |
Users can assign responsibilities for controls/actions as described in the risk action management content. | |
Mitigation Effectiveness Tracking Monitor and assess the effectiveness of controls. |
Platform tracks mitigation/control effectiveness to ensure continuous compliance. | |
Action Management & Workflow Automates workflows for follow-up and completion of tasks. |
Workflow automation and task management are referenced in ERM documentation. | |
Automated Control Testing Schedules and conducts control tests on defined intervals. |
Control testing automation is included as part of regulatory compliance management. | |
Remediation Plan Management Support for managing, tracking, and reporting on remediation plans. |
Remediation planning and tracking are explicitly described as platform features. | |
Control Owner Assignment Assigns named individuals or teams to each control. |
Control ownership and team assignment are listed as platform capabilities. | |
Policy & Procedure Linkage Links mitigation controls to relevant internal policies. |
Controls are linked to company policies; cited in compliance tool descriptions. | |
Control Frequency Setting Supports scheduling of control activities and tests. |
Control frequency scheduling is referenced in the compliance management tooling. | |
Mitigation Completion Time Average required time for closure of mitigation actions. |
No information available |
Customizable Dashboards Users can design personalized dashboards and widgets. |
Dashboard widgets and views are customizable per product overview. | |
Regulatory Reporting Templates Standard templates for regulatory bodies (e.g., Solvency II, NAIC, IFRS 17). |
Pre-built regulatory reporting templates, including Solvency II, are explicitly mentioned. | |
Data Visualization Tools Interactive charts, graphs, and heatmaps for risk data. |
Interactive charts and data visualization tools are shown in product demonstrations. | |
Scheduled Automated Reports Create and distribute periodic risk reports automatically. |
Scheduled/automated reporting is an explicit feature in marketing material. | |
Report Export Formats Number of supported formats: PDF, Excel, CSV, etc. |
No information available | |
Drill-Down Analysis Click through from summary to detail in analytics dashboards. |
Drill-down analytics are referenced in dashboard walk-throughs. | |
Peer Benchmarking Compare risk exposure/performance against industry peers. |
No information available | |
Risk Heatmaps Visual mapping of risk severity, frequency, and exposure. |
Risk heatmaps are visualized in all risk management demonstration content. | |
Real-Time Data Refresh How frequently dashboard data updates. |
No information available |
API Support Open APIs for integration with other enterprise systems. |
Described as having API endpoints for integration with enterprise systems. | |
Data Import/Export Ability to import and export data from/to multiple formats or systems. |
Data import/export support for various formats (CSV, Excel, etc.) is present. | |
Core Insurance Platform Integration Direct connectors with policy admin, claims, underwriting, and actuarial systems. |
Integration with core insurance platforms (policy admin/claims, etc.) is a listed selling point. | |
Data Lake Compatibility Ability to integrate with enterprise data lakes and warehouses. |
No information available | |
Single Sign-On (SSO) Integration with enterprise authentication systems. |
Platform supports SSO per enterprise authentication standards. | |
Third-Party Risk Data Integration Supports ingestion of external risk analytics or threat intelligence. |
Supports ingestion of external risk data/analytics as stated within integration features. | |
Webhooks Trigger external events based on platform actions. |
No information available | |
Number of Supported Connectors Quantity of pre-built integrations with third-party products. |
No information available |
Regulatory Framework Mapping Map risks/controls to standards (Solvency II, SOX, GDPR, etc.). |
Explicit mention of mapping risks/controls to Solvency II, NAIC, and other frameworks. | |
Issue & Incident Management Track, escalate, and resolve compliance and risk issues. |
Issue and incident management for compliance is referenced in GRC toolkit. | |
Attestation Management Collect and store formal sign-offs on compliance activities. |
Attestation management is described within compliance reporting features. | |
Policy Management Integration Link controls to digital policy management system. |
No information available | |
Automated Regulatory Updates Receive and integrate updates to changing regulations. |
Automated regulatory updates are detailed as a compliance automation feature. | |
Compliance Calendar Central calendar for all compliance-related tasks and deadlines. |
Compliance calendar for task/deadline management is shown in demos. | |
Audit Trail Immutable logs of all risk/compliance changes and actions. |
Immutable audit trail/records is described as part of platform compliance/auditability. | |
Compliance Dashboard Real-time visualizations of compliance status across risk categories. |
Compliance dashboard is part of standard reporting modules. |
Role-based Access Control (RBAC) Granular permissions based on user roles. |
Role-based access controls (RBAC) are described in user administration. | |
Multi-Factor Authentication (MFA) Adds an extra layer of user authentication. |
Multi-factor authentication is referenced in security and access control features. | |
User Provisioning & De-provisioning Automated on-boarding and deactivation of user accounts. |
Automated user provisioning/de-provisioning supported for enterprises. | |
Delegated Administration Assigns admin rights for specific modules or data sets. |
Delegated administration is listed under user and access management features. | |
Audit Logging Tracks and logs all user access and data changes. |
Comprehensive audit logging for user actions is confirmed in security documentation. | |
User Profile Customization Ability for users to customize their workspace and alerts. |
The system allows user profile customization including alert preferences. | |
Number of User Roles Supported How many distinct user roles can be configured. |
No information available | |
Concurrent User Limit Maximum number of users able to log in simultaneously. |
No information available |
Horizontal Scalability Architecture can add servers/nodes to handle increased loads. |
Designed for horizontal scalability to handle large volumes and users. | |
Transaction Processing Speed Time to process a standard risk event or transaction. |
No information available | |
Maximum Supported Records Largest volume of risk/control records the system supports. |
No information available | |
Data Ingestion Rate Volume of risk or event data ingested per unit time. |
No information available | |
Concurrent User Performance Number of concurrent users without notable slow-down. |
No information available | |
High Availability (HA) Support System includes redundancy and failover for uptime targets. |
System is designed for high availability (HA) as per enterprise client requirements. | |
Disaster Recovery Options Automated tools for backup and business continuity. |
Disaster recovery/business continuity options included in platform support. |
Custom Workflow Builder Graphical tools to design and modify business workflows. |
No information available | |
Field/Screen Customization Add, remove, or edit data fields and screen layouts. |
Field and screen customization is referenced in product material. | |
Rule Engine Create business logic to automate processes under specified conditions. |
Rule engine for automated process flow is part of workflow automation. | |
Custom Risk Scoring Formulae Design and implement unique risk scoring models. |
Supports custom risk scoring formulas and models. | |
Localization (Language/Region Support) Support for multiple languages, currencies, and date formats. |
Supports language/region settings for global insurers. | |
Branding Support Ability to add company logos, brand colors, and white labeling. |
Branding and whitelabeling options available for enterprise customers. | |
Custom Alert Rules Tailor when and how system sends notifications or escalations. |
Alerting and custom notification rules part of task management. | |
API Extension Points Ability to extend data model and business process through APIs. |
API extension points described in integration and developer documentation. |
Comprehensive Audit Trail Complete logging of all changes to risk records and configurations. |
Comprehensive audit trail for all records/changes is mentioned in platform features and compliance certifications. | |
Version Control Ability to roll back to previous states of data, methodologies, or configurations. |
Version control for risk data/configurations is listed in compliance documentation. | |
User Activity Monitoring Monitor and review individual user actions for compliance. |
User activity auditing and monitoring is present and referenced in compliance content. | |
Change Approval Workflow Enforces approval of critical changes before implementation. |
No information available | |
Integrated Document Management Store, version, and audit supporting documents within the platform. |
Document management, versioning, and auditing are included in core platform tools. | |
Time-stamped Logs Logs include accurate date/time stamps for forensic analysis. |
Time-stamped log capability is required for compliance and supported by the system. |
Data Encryption at Rest and in Transit Sensitive data is always encrypted both during storage and transmission. |
Data is encrypted at rest and in transit, as stated in Milliman's security documentation. | |
Granular Access Permissions Fine-grained control over specific data, modules, and features. |
Granular access permission is described as part of user and security management. | |
Data Masking Masking of sensitive fields in UIs, reports, and exports. |
Data masking for sensitive fields is included as a security/control feature. | |
Anomaly Detection Automated detection of suspicious access or usage patterns. |
No information available | |
Penetration Testing Certification Third-party validation of platform security posture. |
Platform is regularly third-party penetration tested; supports certification requests. | |
Security Incident Alerts Real-time notification of detected security events. |
Security event alerts/real-time notifications described in platform overview. | |
Data Retention Policies Ability to configure and enforce retention periods for sensitive data. |
Data retention policies and support for configurable retention is available. | |
Audit Compliance (e.g., SOC2, ISO 27001) Certified compliance with recognized security standards. |
Compliance with standards such as SOC2/ISO27001 is mentioned in security credentials. |
Team Task Assignment Assign specific tasks to teams or individuals in platform. |
Task management and assignment by team or user is present in risk/action modules. | |
Internal Messaging Communicate, comment, and share insights within the platform. |
Internal messaging or comments on tasks/risks referenced in collaboration toolkit. | |
Document Collaboration Co-author, review, and track document changes. |
Document collaboration tools, including review and revision, are present. | |
Notifications & Alerts Send out time- or event-based notifications to stakeholders. |
Notification and alerting features are cited as part of task and compliance workflow. | |
Feedback & Survey Tools Embedded features for soliciting and aggregating user input. |
No information available | |
Meeting Scheduling Integration Tools to coordinate risk meetings or reviews. |
No information available | |
Number of Supported Collaboration Users How many users can simultaneously work together on a risk or task. |
No information available | |
Integrated File Sharing Directly share reports, evidence, and documents with stakeholders. |
File sharing integrated into reporting, evidence, document management. |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.