University of Wisconsin–Madison

Reviewed tools list

The Risk Management & Compliance (RMC) department in the Office of Cybersecurity would like to share with our campus partners work that is completed to assess risk for tools, services and vendors. This resource will offer insight and options to determine if tools, services or vendors might work for you. This is not a blanket endorsement of these tools. You will need to review your data classification and the type of assessment that was completed to find commonalities. Please refer to the Risk Control Families and a sample of the questions from each family. To achieve a similar risk level as below, you will need to be prepared to respond to these questions, and more, to determine your unique level of risk. By making this information available, the Office of Cybersecurity is hoping to accomplish several goals:
  • Offering information to campus partners to choose tools that may already be in use on campus
  • By requesting a risk assessment for your use case for an existing tool, risk assessment timelines may be more efficient.

Contact Risk Management & Compliance (RMC) for additional questions about the reviewed tools resource.

Use this resource to

Line art image of a magnifying glass

Explore tools

Explore a repository of tools, vendors & services reviewed by RMC for security.

Discover previously reviewed tools

Obtain information about the previously reviewed tools which could offer similar service types (i.e., data management tools, ticketing tools, etc.).
Line art image of a decision tree branching off into different sections

Review data classifications

Review the data classification that was requested for use with each tool, vendor, or service.

Review the Data Classification policy

Line art image of a shield with a hacker

Understand risk reviews

Gain a clear understanding of the depth of risk review that was completed based on the service requested (e.g. Request to Procure vs. Request to Operate). Your risk may differ based on how you secure and handle the data in your environment.

This list is not intended for

Line art image of an x inside of a circle

Purchasing permission

If a tool is on this list, you do not have permission to purchase it. Purchases must be channeled through your purchasing department(s) with proper purchasing authority and contract review.
Line art image of an x inside of a circle

Bypassing risk assessments

If a tool is on this list, it does not eliminate the need for a risk assessment by Cybersecurity. The Office of Cybersecurity will need to ensure that the data you are using matches the data reviewed previously, and other security measures match the completed review. This also applies to the type of service assessment completed. If only a request for purchase (RTP) has been completed, a more thorough risk assessment will need to be in place for implementation of the service.

Reviewed tools list

The Risk Management & Compliance (RMC) department in the Office of Cybersecurity would like to share with our campus partners work that is completed to assess risk for tools, services and vendors. This resource will offer insight and options to determine if tools, services or vendors might work for you. This is not a blanket endorsement of these tools. You will need to review your data classification and the type of assessment that was completed to find commonalities. Please refer to the Risk Control Families and a sample of the questions from each family. To achieve a similar risk level as below, you will need to be prepared to respond to these questions, and more, to determine your unique level of risk.

View the Reviewed tools resource list (Smartsheet)

Question & review requests

Contact Risk Management & Compliance (RMC) for additional questions about the reviewed tools resource.

Contact RMC

If you are considering using a tool which is not on this list, please submit a request to our OneTrust team.

Complete the OneTrust intake form