Lockpath

by NAVEX Global Risk & Compliance Management

Who Uses Lockpath?

We serve companies looking to automate manual processes, consolidate asset management tools, replace rigid or outdated solutions, or integrate asset management with their enterprise risk programs.

What Is Lockpath?

Lockpath brings visibility to risks frequently managed in disparate sources. It aggregates internal data points from all corners of the organization, as well as from assessments, audits, authoritative sources and external systems. By having everything centralized, correlated and connected, the platform enables organizations to see dependencies and to make smarter business decisions.

Lockpath Details

NAVEX Global Risk & Compliance Management

http://www.navexglobal.com/

Founded 2006

Lockpath Software - 1
Lockpath video
Play
Lockpath Software - 1 - thumbnail

Lockpath pricing overview

Lockpath does not have a free version.


Starting Price

Not provided by vendor

Free Version

No

Lockpath deployment and support

Support

  • Email/Help Desk
  • Phone Support
  • Chat

Deployment

  • Cloud, SaaS, Web-based
  • Windows (Desktop)
  • Windows (On-Premise)
  • Linux (On-Premise)

Training Software

  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos

Lockpath Features

  • API
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Approval Process Control
  • Archiving & Retention
  • Assessment Management
  • Asset Tracking Software
  • Audit Management
  • Audit Planning
  • Audit Trail
  • Change Management Software
  • Compliance Management
  • Configurable Workflow
  • Corrective and Preventive Actions (CAPA)
  • Customizable Forms
  • Customizable Reports
  • Customizable Templates
  • Dashboard Creation
  • Dashboard Software
  • Data Visualization Software
  • Document Management Software
  • Document Storage
  • Forms Management
  • Incident Management Software
  • Inspection Management
  • Issue Management
  • Mobile Access
  • Monitoring
  • Offline Access
  • Policy Management Software
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Role-Based Permissions
  • Security Auditing
  • Status Tracking
  • Task Management Software
  • Template Management
  • Third Party Integrations
  • Training Management
  • Version Control
  • Workflow Management Software

View full list of Audit Software

  • API
  • Activity Dashboard
  • Alerts/Notifications
  • Audit Management
  • Automatic Backup
  • Backup Log
  • Backup Scheduling
  • Backup and Recovery
  • Compliance Management
  • Compression
  • Continuous Backup
  • Customizable Reports
  • Data Import/Export
  • Data Recovery
  • Data Replication
  • Data Storage Management
  • Data Synchronization
  • Disaster Recovery
  • Document Storage
  • Email Alerts
  • Encryption Software
  • File Transfer
  • Incident Management Software
  • Incremental Backup
  • Local Server Options
  • Mobile Alerts
  • Monitoring
  • Multiple Format Support
  • Multiple System Support
  • Optical Character Recognition
  • Performance Metrics
  • Policy Management Software
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Server Options
  • Reporting & Statistics
  • Retention Policy
  • Risk Alerts
  • Risk Assessment
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Status Tracking
  • Storage Quantity Control
  • Task Management Software
  • Third Party Integrations
  • Version Control
  • Web Access / Restoration
  • Workflow Management Software

View full list of Business Continuity Software

  • API
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Approval Process Control
  • Archiving & Retention
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Compliance Management
  • Configurable Workflow
  • Corrective and Preventive Actions (CAPA)
  • Customizable Reports
  • Customizable Templates
  • Dashboard Creation
  • Data Import/Export
  • Data Visualization Software
  • Disaster Recovery
  • Document Management Software
  • Document Storage
  • Environmental Compliance
  • FDA Compliance
  • HIPAA Compliant
  • IT Risk Management
  • Incident Management Software
  • Internal Controls Management
  • Issue Management
  • Monitoring
  • Operational Risk Management
  • Policy Management Software
  • Real Time Monitoring
  • Real Time Reporting
  • Reminders
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Sarbanes-Oxley Compliance
  • Secure Data Storage
  • Security Auditing
  • Single Sign On Software
  • Summary Reports
  • Task Management Software
  • Third Party Integrations
  • Training Management
  • User Management
  • Vendor Management Software
  • Version Control
  • Visual Analytics
  • Workflow Management Software

View full list of Governance, Risk & Compliance (GRC) Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Archiving & Retention
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Collaboration Tools
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Customizable Forms
  • Customizable Reports
  • Customizable Templates
  • Data Import/Export
  • Data Security
  • Document Management Software
  • Document Storage
  • Document Templates
  • Documentation Management
  • Drag & Drop
  • For Healthcare
  • HIPAA Compliant
  • Incident Management Software
  • Monitoring
  • PCI Compliance Software
  • Policy Management Software
  • Policy Training
  • Real Time Reporting
  • Remediation Management
  • Reminders
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Risk Management Software
  • Sarbanes-Oxley Compliance
  • Search/Filter
  • Secure Data Storage
  • Security Auditing
  • Self Service Portal
  • Task Management Software
  • Third Party Integrations
  • Training Management
  • User Management
  • Vendor Management Software
  • Version Control
  • Vulnerability Scanning
  • Workflow Management Software

View full list of HIPAA Compliance Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Asset Management
  • Asset Tracking Software
  • Audit Management
  • Audit Trail
  • Barcode / Ticket Scanning
  • Change Management Software
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Configuration Management
  • Contract/License Management
  • Cost Tracking
  • Customizable Branding
  • Customizable Fields
  • Customizable Forms
  • Customizable Reports
  • Dashboard Creation
  • Data Import/Export
  • Data Visualization Software
  • Email Management Software
  • IT Asset Tracking
  • Incident Management Software
  • Inventory Management Software
  • Inventory Tracking
  • Knowledge Base Management
  • Maintenance Management Software
  • Maintenance Scheduling
  • Monitoring
  • Prioritization
  • Problem Management
  • Procurement Management
  • Real Time Reporting
  • Reporting & Statistics
  • Reporting/Analytics
  • Requisition Management
  • Role-Based Permissions
  • Self Service Portal
  • Service Level Agreement (SLA) Management
  • Supplier Management
  • Support Ticket Management
  • Support Ticket Tracking
  • Task Management Software
  • Third Party Integrations
  • User Management
  • Workflow Management Software

View full list of IT Asset Management Software

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Archiving & Retention
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Compliance Management
  • Configurable Workflow
  • Customizable Reports
  • Dashboard Creation
  • Dashboard Software
  • Data Import/Export
  • Data Visualization Software
  • Disaster Recovery
  • Document Management Software
  • Document Storage
  • Exceptions Management
  • FDA Compliance
  • Forms Management
  • HIPAA Compliant
  • IT Risk Management
  • Incident Management Software
  • Issue Management
  • KRI (Key Risk Indicator) Monitoring
  • Monitoring
  • Operational Risk Management
  • Performance Metrics
  • Policy Management Software
  • Predictive Analytics Software
  • Real Time Monitoring
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Role-Based Permissions
  • Safety Management Software
  • Sarbanes-Oxley Compliance
  • Secure Data Storage
  • Security Auditing
  • Single Sign On Software
  • Third Party Integrations
  • Training Management
  • Vendor Management Software
  • Version Control
  • Workflow Management Software

View full list of Integrated Risk Management Software

  • API
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Approval Process Control
  • Archiving & Retention
  • Assessment Management
  • Attestation
  • Audit Management
  • Audit Trail
  • Compliance Management
  • Configurable Workflow
  • Content Management System (CMS) Software
  • Customizable Reports
  • Customizable Templates
  • Document Management Software
  • Document Review
  • Document Storage
  • Document Templates
  • Forms Management
  • HIPAA Compliant
  • Incident Management Software
  • Lifecycle Management
  • Monitoring
  • Policy Creation
  • Policy Library
  • Policy Management Software
  • Policy Metadata Management
  • Policy Training
  • Purchasing & Receiving
  • Real Time Notifications
  • Real Time Reporting
  • Reminders
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Role-Based Permissions
  • Sarbanes-Oxley Compliance
  • Search/Filter
  • Secure Data Storage
  • Self Service Portal
  • Single Sign On Software
  • Template Management
  • Third Party Integrations
  • Training Management
  • Version Control
  • Visual Analytics
  • Workflow Management Software

View full list of Policy Management Software

  • API
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Approval Process Control
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Business Process Control
  • Compliance Management
  • Configurable Workflow
  • Corrective and Preventive Actions (CAPA)
  • Customizable Reports
  • Customizable Templates
  • Dashboard Creation
  • Dashboard Software
  • Data Visualization Software
  • Document Management Software
  • Document Storage
  • Exceptions Management
  • Forms Management
  • IT Risk Management
  • Incident Management Software
  • Internal Controls Management
  • Legal Risk Management
  • Mobile Access
  • Monitoring
  • Operational Risk Management
  • Policy Management Software
  • Predictive Analytics Software
  • Real Time Monitoring
  • Real Time Reporting
  • Reminders
  • Reporting & Statistics
  • Reporting/Analytics
  • Reputational Risk Management
  • Response Management
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Risk Reporting
  • Risk Scoring
  • Security Auditing
  • Task Management Software
  • Third Party Integrations
  • Training Management
  • Vendor Management Software
  • Version Control
  • Workflow Management Software

View full list of Risk Management Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Approval Process Control
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Billing & Invoicing
  • Collaboration Tools
  • Compliance Management
  • Configurable Workflow
  • Contract/License Management
  • Customizable Reports
  • Customizable Templates
  • Data Import/Export
  • Data Visualization Software
  • Document Management Software
  • Document Storage
  • Incident Management Software
  • Invoice Management
  • Invoice Processing
  • Monitoring
  • Offboarding
  • Onboarding Software
  • Performance Metrics
  • Procurement Management
  • Project Management Software
  • Purchase Order Management
  • Real Time Data
  • Real Time Reporting
  • Reminders
  • Reporting & Statistics
  • Risk Alerts
  • Risk Assessment
  • Search/Filter
  • Self Service Portal
  • Single Sign On Software
  • Sourcing Management
  • Summary Reports
  • Supplier Management
  • Task Management Software
  • Third Party Integrations
  • Transaction History
  • User Management
  • Vendor Management Software
  • Vendor Master Data Management
  • Vendor Payment
  • Workflow Management Software

View full list of Vendor Management Software

Lockpath Alternatives

More Lockpath alternatives

Lockpath Reviews

Read all reviews

Overall rating

4.6/5

Average score

Ease of Use 4
Customer Service Software 4.7
Features 4.4
Value for Money 4.5

Review software

Share your experiences with other software buyers.

Write a Review!
Jackie L.
IT GRC Keylight Program Manager
Insurance Software, 1,001-5,000 Employees
Used the Software for: 2+ years
  • Overall Rating
    5 /5
  • Ease of Use
    5 /5
  • Features & Functionality
    4 /5
  • Customer Support Software
    5 /5
  • Value for Money
    5 /5
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 2018-05-22

"Keylight is easy to use and easy to configure to suit your needs."

Pros: Keylight is completely configurable and extremely adaptable. It has powerful yet simple-to-produce reporting capabilities that enable metrics and provide transparency with ease. I can't stress enough how easy the configuration (Admin) capabilities are to learn and to use. And for those times where help is needed, the Lockpath Support and Professional Services teams are first class. Always eager to help and it is evident that customer service is a high priority for the company. Workflows and notifications can be easily built which can provide a centralized location for many use cases, including: Identifying and monitoring risks; Recording regulatory and other requirements, controls associated with those requirements, including assigning ownership and review of those controls, and Audit projects which are tied directly to the controls; Vendor Management, including monitoring compliance and tying to any applicable risks. I guess what I'm trying to say is, the Keylight GRC platform helps take some of the complexity out of GRC. The above are just a few of the many possibilities. Because the tool is so easy to configure, I tell my colleagues to "tell me your dream"-- I'm usually able to get pretty close.

Cons: Sometimes the tool is less than intuitive. Don't get me wrong-- I still stand by my statement that it is extremely easy to use-- but sometimes the way to do something is not the way you'd imagine. Most times, there is a way to do what you need to do, it's just not always the way you'd expect. Lockpath Support is always an excellent resource to work through these situations.

  • Reviewer Source 
  • Reviewed on 2018-05-22
Rick T.
System Security Analyst
Used the Software for: 1+ year
  • Overall Rating
    5 /5
  • Ease of Use
    4 /5
  • Features & Functionality
    4 /5
  • Customer Support Software
    5 /5
  • Value for Money
    4 /5
  • Likelihood to Recommend
    8/10
  • Reviewer Source 
  • Reviewed on 2018-06-08

"Robust GRC Management Tool"

Comments: Makes managing GRC tasks, exceptions, vendors, etc much MUCH more efficient. We have seen significant time savings by using this software.

Pros: This is a fully customizable solution to help meet GRC management needs. This has also been expanded into other areas, including assessments, asset reviews, documentation management/reviews, testing management, vendor management, and a host of other things.

Cons: The online doc is ok, but may need updating. We have also run into reporting limitations, and the software can struggle with graphic reporting if the number of records exceed some preset quantity. The other is very specific; when creating a new field and setting the character parameters, the parameters are permanent for the life of the field. For example, if a text field is set for 100 characters, but a year later, you find a need to allow for 500 characters, the existing field cannot be redefined. A new field needs to be created to allow for the expanded setting. So when you are trying to create a field and be cognizant of the space (i.e. limiting to 100 characters), you are limiting the future-growth of the data this field may manage. The same goes for the tolerances of the numeric fields. Once the parameters (number of spaces before and after a decimal point) are set, there is no changing the field. It must be replaced with a new field, rather than having an effective recalculation process.

  • Reviewer Source 
  • Reviewed on 2018-06-08
Mike L.
3rd party risk management specialist
Used the Software for: 2+ years
  • Overall Rating
    4 /5
  • Ease of Use
    4 /5
  • Features & Functionality
    4 /5
  • Customer Support Software
    5 /5
  • Value for Money
    4 /5
  • Likelihood to Recommend
    7/10
  • Reviewer Source 
  • Reviewed on 2018-06-06

"Keylight has been a good platform and meets our needs"

Comments: A very good third party management software. It has helped us to streamline and organize our 3rd party risk management process

Pros: Excellent customer service, intuitive and easy to use. layout and menus are well suited for navigation and functionality.

Cons: On premise solution has some bugs to work out. software could be faster when clicking through and going from page to page.

  • Reviewer Source 
  • Reviewed on 2018-06-06
Michael G.
Senior Security Engineer & Risk Analyst
Used the Software for: 2+ years
  • Overall Rating
    5 /5
  • Ease of Use
    4 /5
  • Features & Functionality
    5 /5
  • Customer Support Software
    5 /5
  • Value for Money
    5 /5
  • Likelihood to Recommend
    8/10
  • Reviewer Source 
  • Reviewed on 2018-06-06

"Excellent GRC platform with phenomenal support."

Comments: Excellent customer support and the ability for me to use the product however our organization sees fit. Often a process or workflow design can become a reality within weeks without having to build out new features or wait for software to catch up.

Pros: LockPath Keylight is highly customizable and new features and upgrades are released on a very timely schedule. The platform is highly stable and provides great insights to our data across our environments. Custom dashboards and reporting metrics can be configured for different roles as well which helps provide the most important data to a given user. Be it high level CISO dashboards, to implementation based feeds for system administrators, the customization capabilities are there.

Cons: There is a slight learning curve with this product but this has become incrementally less with every release. I would not say it is complicated by any means, complexity largely results in how vast you've opted to customize your system and integrate connectivity with other platforms through connectors.

  • Reviewer Source 
  • Reviewed on 2018-06-06
Morgan K.
Sr. Analyst
Insurance Software, 1,001-5,000 Employees
Used the Software for: 1-5 months
  • Overall Rating
    5 /5
  • Ease of Use
    4 /5
  • Features & Functionality
    4 /5
  • Customer Support Software
    5 /5
  • Value for Money
    5 /5
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 2018-10-08

"Seeking Tool for Risk Management and Workflow (Rm & Cm Applications)"

Comments: The experience with Lockpath has been positive including their attentiveness and responsiveness to meet our needs with their tool.

Pros: Lockpath Keylight is highly configurable and easy to navigate from an administrative perspective with coaching from the Professional Services team. The speed of implementation is primarily based on the tool owner to provide documentation and dedicate time to understanding the system. The user-friendliness of the front end of the tool ultimately falls on the administrator as the system is pretty much a blank slate upon purchase. The Quickstart implementation structured our system’s foundation and the remainder of the configuration was able to be completed either by the Professional Service team or by an internal administrator of the system. The Professional Service and Support teams have been highly responsive to questions and enhancement requests for the system. Professional Service hours have been very useful in working through more advanced requirements and gaining a more robust training to the system.

Cons: As noted above, the Risk Keylight application is 100% configurable which means there is no direct out-of-the-box workflows or fields. This can be an advantage or disadvantage based on the needs of your company. If your company is able to detail specific requirements, the configuration of basic workflows is quick to implement. The Compliance Keylight application came with a few pre-built workflows and forms which has been helpful to quickly input data and see results in the system.

  • Reviewer Source 
  • Reviewed on 2018-10-08