Contact

 

THE SIMPLE ROUTE
TO ISMS

The solution that provides you with a set of guidelines

ISMS in accordance
with DIN ISO/IEC 27001

The INDITOR® ISO solution helps you implement an Information Security Management System (ISMS) in accordance with ISO/IEC 27001. A variety of different functions guide you through the implementation, thus simplifying the process. The texts of the standards are supplemented by straightforward, clearly formulated implementation recommendations. These enable time-efficient documentation of the required measures. A centrally controlled risk management system is a further aid: assets assigned to the same risk can be combined into groups. Risk analysis can therefore be carried out per group. Risk response tasks can be drawn up and assigned to the assets. Task management provides an overview of the tasks created and shows the progress of processing.

 

The shared database for ISMS, IT disaster recovery and data protection enables the straightforward use of company data created only once, such as data on processes, personnel and infrastructure.

Slide background
Slide background
Slide background
Slide background
Slide background
Slide background

Benefits

strukturiert b

STRUCTURED
Clear process determined by the software

effizient b

EFFICIENT
Various import options and connection to available systems

aktuell b

UP TO DATE
Update data with a single click

ganzheitlich b

INTEGRAL
Introduction of an integral ISMS in accordance with ISO/IEC 27001

verständlich b

CLEAR
ISO standard requirements are supplemented with tips and suggestions

verlässlich b

RELIABLE
Central, integrated risk management for straightforward analysis, evaluation and handling of risks

mass b

CUSTOMIZED
Risk method can be individually adapted

uweit b

COMPANY-WIDE
Comprehensive task management for task processing

ISMS in accordance with DIN ISO/IEC with INDITOR ISO

  • Step 1 | Requirements catalogueRequirements and activities from ISO/IEC 27001 are supplemented with implementation tips and advice. Catalogues such as the ISO/IEC 27002 can be linked.
  • Step 2 | Asset managementCreation of assets (company values) such as processes, HR and infrastructure. The data can be used when other CONTECHNET solutions are integrated.
  • Step 3 | Determination of protection requirementsDetermination of the protection requirements and categorisation of the impact based on disaster scenarios for the individual assets of the information network in question
  • Step 4 | Risk analysis
    and evaluation
    Evaluation of the probability of various risk scenarios
  • Step 5 | Risk responseCreation of tasks and measures for responding to risks. Predefined criteria for risk acceptance simplify the prioritisation of risk response
  • Audit managementDetermination of the protection requirements and categorisation of the impact based on disaster scenarios for the individual assets of the information network in question