Company Details



LockPath connects people, processes and technology.

Contact Vendor

Company Name:
Company Website:
Company LinkedIn:
Company Twitter:
Company overview:

LockPath® was created by GRC experts who recognized the need for intuitive GRC software that was flexible and scalable to serve ever-changing and expanding organizations.

In addition to the company’s founders, LockPath’s executive team comprises top industry professionals in the fields of software development, accounting and consulting, cybersecurity, financial services, market development and other industries. LockPath employs dozens of talented professionals and has several open positions.

HQ Location:
United States
Year Founded:
Private / Public:
Ideal prospect law department size:
Number of employees:
Key Geographical Presence:
North America
  1. Keylight Operational Risk Manager (Specialty: Policies Management)

    Keylight helps companies manage the daily business activities related to risk (policy management, KRI monitoring, reporting, etc). Keylight also helps users manage risk related events that result from failed controls, actions from employees and actions from third parties.

    Keylight Compliance and Policies Management (Specialty: Policies Management)

    Keylight can help you benchmark your organization’s processes and procedures against corporate policies as well as industry and government regulations and standards. It helps organizations address multiple compliance activities within a single, centralized framework and view compliance in the context of corporate governance and risk management.

    Keylight Vendor Risk Management (Specialty: IP Search & Monitoring)

    Third parties are extensions of an organization and their actions can have a direct impact on compliance efforts, brand reputation, and operations. Keylight simplifies the process of evaluating vendors, contractors, suppliers and service providers for risk and compliance to your organization. It integrates the full vendor lifecycle into daily processes and includes capabilities for information gathering, due diligence investigation, risk assessments, contract negotiation, ongoing monitoring and termination workflows.