HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
Risk management solution with insurance-specific capabilities for operational risk, compliance management, incident management, and audit. Features include risk assessments, workflow automation, dashboarding, and reporting for insurance regulatory requirements.
Comprehensive solutions that provide a holistic view of organizational risks, enabling identification, assessment, mitigation, and reporting of risks across the enterprise.
More Enterprise Risk Management Platforms
More Risk Management ...
Automated Risk Detection System automatically scans data to detect emerging risks. |
Marketing and product documentation mention automated risk assessments and detection capabilities. | |
Manual Risk Entry Users can manually input and categorize specific risks. |
Manual risk entry is standard for ERM; Resolver offers user-submitted risk and incident entry. | |
Risk Taxonomy Customization Allows customization of taxonomy and categories to suit business needs. |
Platform advertises custom taxonomies for risks and controls. | |
Third-Party Data Integration Integration with external databases or feeds for new risk insight. |
Integration with third-party data sources and external feeds is available. | |
Risk Prioritization Engine Automatically ranks risks according to defined criteria. |
Automated prioritization/heatmap and workflow engine present, per product documentation. | |
Scenario Analysis Ability to simulate and assess impact of potential events. |
Scenario analysis features included; user can simulate risk events and impacts. | |
Inherent and Residual Risk Scoring Assesses risks before and after mitigation measures. |
Platform supports both inherent and residual risk scoring. | |
Real-Time Risk Updates Delivers up-to-the-minute changes in risk profiles. |
Real-time dashboarding & reporting on risk, implying real-time updates. | |
Qualitative & Quantitative Assessment Supports both narrative assessment and numerical scoring. |
Quantitative scoring and qualitative narrative supported per marketing materials. | |
Risk Appetite Alignment Links risk scoring and recommendations to organizational risk appetite statements. |
Risk scoring & appetite can be aligned; Resolver documentation references appetite linkage. | |
Number of Supported Risk Types How many distinct risk types the system can handle. |
No information available | |
Time to Identify New Risk System’s average time to identify a new risk from data ingestion. |
No information available |
Control Library Central repository for mitigation controls and actions. |
Resolver features a control library with cataloged mitigation controls. | |
Mitigation Assignment Assign responsibility for specific mitigation actions. |
Supports assignment/responsibility for mitigation actions through workflows. | |
Mitigation Effectiveness Tracking Monitor and assess the effectiveness of controls. |
Effectiveness tracking and reporting are standard functions. | |
Action Management & Workflow Automates workflows for follow-up and completion of tasks. |
Workflow automation includes follow-up and task completion tracking. | |
Automated Control Testing Schedules and conducts control tests on defined intervals. |
Automated/scheduled testing of controls referenced for compliance purposes. | |
Remediation Plan Management Support for managing, tracking, and reporting on remediation plans. |
Remediation plan management, tracking, and reporting available in standard feature set. | |
Control Owner Assignment Assigns named individuals or teams to each control. |
Control owner assignment functionality included. | |
Policy & Procedure Linkage Links mitigation controls to relevant internal policies. |
Controls can be linked to policies and procedures as per feature description. | |
Control Frequency Setting Supports scheduling of control activities and tests. |
Scheduler for frequency of control testing and activities. | |
Mitigation Completion Time Average required time for closure of mitigation actions. |
No information available |
Customizable Dashboards Users can design personalized dashboards and widgets. |
Customizable dashboards and widgets present; user guides confirm. | |
Regulatory Reporting Templates Standard templates for regulatory bodies (e.g., Solvency II, NAIC, IFRS 17). |
Regulatory reporting templates (e.g., Solvency II) are offered for insurance clients. | |
Data Visualization Tools Interactive charts, graphs, and heatmaps for risk data. |
Data visualization (charts, heatmaps, graphs) is part of reporting functionality. | |
Scheduled Automated Reports Create and distribute periodic risk reports automatically. |
Automated/scheduled reporting is listed among product features. | |
Report Export Formats Number of supported formats: PDF, Excel, CSV, etc. |
No information available | |
Drill-Down Analysis Click through from summary to detail in analytics dashboards. |
Drill-down analytic capability is supported in dashboards and reports. | |
Peer Benchmarking Compare risk exposure/performance against industry peers. |
No information available | |
Risk Heatmaps Visual mapping of risk severity, frequency, and exposure. |
Risk heatmaps present across dashboarding modules. | |
Real-Time Data Refresh How frequently dashboard data updates. |
undefined Real-time data refresh supported for dashboards and analytics. |
API Support Open APIs for integration with other enterprise systems. |
REST API and open integration available per developer portal. | |
Data Import/Export Ability to import and export data from/to multiple formats or systems. |
Data import/export is supported for Excel, CSV, and common formats. | |
Core Insurance Platform Integration Direct connectors with policy admin, claims, underwriting, and actuarial systems. |
Connectors for policy admin, claims, and external insurance systems mentioned. | |
Data Lake Compatibility Ability to integrate with enterprise data lakes and warehouses. |
Resolver is compatible with enterprise data lakes and data warehouses. | |
Single Sign-On (SSO) Integration with enterprise authentication systems. |
Supports enterprise SSO (SAML, OAuth) for authentication. | |
Third-Party Risk Data Integration Supports ingestion of external risk analytics or threat intelligence. |
Integration with third-party risk/threat intelligence feeds supported. | |
Webhooks Trigger external events based on platform actions. |
No information available | |
Number of Supported Connectors Quantity of pre-built integrations with third-party products. |
No information available |
Regulatory Framework Mapping Map risks/controls to standards (Solvency II, SOX, GDPR, etc.). |
Risk frameworks mapping (e.g., SOX, GDPR) is standard for audit/compliance modules. | |
Issue & Incident Management Track, escalate, and resolve compliance and risk issues. |
Issue & incident management highlighted as a main platform capability. | |
Attestation Management Collect and store formal sign-offs on compliance activities. |
Attestation management is mentioned for audit and compliance workflows. | |
Policy Management Integration Link controls to digital policy management system. |
Policy management integrations available with relevant modules. | |
Automated Regulatory Updates Receive and integrate updates to changing regulations. |
Automated regulatory updates for compliance tracking (insurance, etc.) are offered. | |
Compliance Calendar Central calendar for all compliance-related tasks and deadlines. |
Compliance calendar/tracker present in compliance & audit modules. | |
Audit Trail Immutable logs of all risk/compliance changes and actions. |
Immutable audit trails/logs are noted as standard platform features. | |
Compliance Dashboard Real-time visualizations of compliance status across risk categories. |
Compliance dashboards for real-time status are available. |
Role-based Access Control (RBAC) Granular permissions based on user roles. |
Role-based access control (permissions by role) present. | |
Multi-Factor Authentication (MFA) Adds an extra layer of user authentication. |
Multi-factor authentication available as part of enterprise security features. | |
User Provisioning & De-provisioning Automated on-boarding and deactivation of user accounts. |
Automated provisioning/de-provisioning (HRIS, SSO, Active Directory integrations). | |
Delegated Administration Assigns admin rights for specific modules or data sets. |
Delegated admin rights and permissions granularity available. | |
Audit Logging Tracks and logs all user access and data changes. |
Audit logging of all user and data access/changes. | |
User Profile Customization Ability for users to customize their workspace and alerts. |
User workspace customization (e.g., alerts, dashboards) supported. | |
Number of User Roles Supported How many distinct user roles can be configured. |
No information available | |
Concurrent User Limit Maximum number of users able to log in simultaneously. |
No information available |
Horizontal Scalability Architecture can add servers/nodes to handle increased loads. |
Cloud-native and horizontally scalable architecture cited in product architecture. | |
Transaction Processing Speed Time to process a standard risk event or transaction. |
No information available | |
Maximum Supported Records Largest volume of risk/control records the system supports. |
No information available | |
Data Ingestion Rate Volume of risk or event data ingested per unit time. |
No information available | |
Concurrent User Performance Number of concurrent users without notable slow-down. |
No information available | |
High Availability (HA) Support System includes redundancy and failover for uptime targets. |
High-availability and uptime SLAs advertised; redundant/failover design. | |
Disaster Recovery Options Automated tools for backup and business continuity. |
Disaster recovery and business continuity support described in enterprise documentation. |
Custom Workflow Builder Graphical tools to design and modify business workflows. |
Workflow builder with drag-and-drop and graphical customization is available. | |
Field/Screen Customization Add, remove, or edit data fields and screen layouts. |
Field and screen customization is supported in Resolver’s platform. | |
Rule Engine Create business logic to automate processes under specified conditions. |
Allows building business rules and logic for risk workflows. | |
Custom Risk Scoring Formulae Design and implement unique risk scoring models. |
Custom risk scoring formulas and models are supported. | |
Localization (Language/Region Support) Support for multiple languages, currencies, and date formats. |
Localization (multi-language, currency, region) is supported. | |
Branding Support Ability to add company logos, brand colors, and white labeling. |
No information available | |
Custom Alert Rules Tailor when and how system sends notifications or escalations. |
Custom and configurable alert rules supported for workflow and notifications. | |
API Extension Points Ability to extend data model and business process through APIs. |
APIs can be extended for business logic and custom data flows. |
Comprehensive Audit Trail Complete logging of all changes to risk records and configurations. |
Comprehensive audit trails maintained for all risk, compliance, and workflow changes. | |
Version Control Ability to roll back to previous states of data, methodologies, or configurations. |
Version control for key data/records is included. | |
User Activity Monitoring Monitor and review individual user actions for compliance. |
User activity monitoring through logs and reports is available. | |
Change Approval Workflow Enforces approval of critical changes before implementation. |
Change approval workflows for critical changes configurable in the system. | |
Integrated Document Management Store, version, and audit supporting documents within the platform. |
Integrated document management and audit modeling supported. | |
Time-stamped Logs Logs include accurate date/time stamps for forensic analysis. |
Logs have accurate timestamps for forensic analysis. |
Data Encryption at Rest and in Transit Sensitive data is always encrypted both during storage and transmission. |
Data encryption at rest and in transit is standard for Resolver SaaS (see security pages). | |
Granular Access Permissions Fine-grained control over specific data, modules, and features. |
Granular access permissions for data and modules; RBAC implemented. | |
Data Masking Masking of sensitive fields in UIs, reports, and exports. |
Data masking available for sensitive fields (see data protection/DSAR guides). | |
Anomaly Detection Automated detection of suspicious access or usage patterns. |
Anomaly detection for suspicious access and system events. | |
Penetration Testing Certification Third-party validation of platform security posture. |
Resolver undergoes external penetration testing and can provide certifications. | |
Security Incident Alerts Real-time notification of detected security events. |
Platform supports real-time security and incident alerts. | |
Data Retention Policies Ability to configure and enforce retention periods for sensitive data. |
Data retention policies can be set and enforced. | |
Audit Compliance (e.g., SOC2, ISO 27001) Certified compliance with recognized security standards. |
Resolver advertises SOC2 and ISO 27001 audit certifications for its SaaS platform. |
Team Task Assignment Assign specific tasks to teams or individuals in platform. |
Specific platform modules allow assigning tasks to teams/users. | |
Internal Messaging Communicate, comment, and share insights within the platform. |
No information available | |
Document Collaboration Co-author, review, and track document changes. |
Document collaboration through review, comments, and audit trails supported. | |
Notifications & Alerts Send out time- or event-based notifications to stakeholders. |
Notifications and workflow alerts built in for risk, compliance, and task events. | |
Feedback & Survey Tools Embedded features for soliciting and aggregating user input. |
No information available | |
Meeting Scheduling Integration Tools to coordinate risk meetings or reviews. |
No information available | |
Number of Supported Collaboration Users How many users can simultaneously work together on a risk or task. |
No information available | |
Integrated File Sharing Directly share reports, evidence, and documents with stakeholders. |
Direct file sharing with stakeholders documented as a collaboration function. |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.