The solution that provides you with a set of guidelines

Download the free test version

Sign up for webcast

ISMS in accordance
with DIN ISO/IEC 27001

The INDITOR® ISO solution helps you implement an Information Security Management System (ISMS) in accordance with ISO/IEC 27001. A variety of different functions guide you through the implementation, thus simplifying the process. The texts of the standards are supplemented by straightforward, clearly formulated implementation recommendations. These enable time-efficient documentation of the required measures. A centrally controlled risk management system is a further aid: assets assigned to the same risk can be combined into groups. Risk analysis can therefore be carried out per group. Risk response tasks can be drawn up and assigned to the assets. Task management provides an overview of the tasks created and shows the progress of processing.


The shared database for ISMS, IT disaster recovery and data protection enables the straightforward use of company data created only once, such as data on processes, personnel and infrastructure.

Slide background
Slide background
Slide background
Slide background
Slide background
Slide background


strukturiert b

Clear process determined by the software

effizient b

Various import options and connection to available systems

aktuell b

Update data with a single click

ganzheitlich b

Introduction of an integral ISMS in accordance with ISO/IEC 27001

verständlich b

ISO standard requirements are supplemented with tips and suggestions

verlässlich b

Central, integrated risk management for straightforward analysis, evaluation and handling of risks

mass b

Risk method can be individually adapted

uweit b

Comprehensive task management for task processing

ISMS in accordance with DIN ISO/IEC in 4 steps

  • Step 1 | Requirements catalogueRequirements and activities from ISO/IEC 27001 are supplemented with implementation tips and advice. Catalogues such as the ISO/IEC 27002 can be linked.
  • Step 2 | Asset managementCreation of assets (company values) such as processes, HR and infrastructure. The data can be used when other CONTECHNET solutions are integrated.
  • Step 3 | Risk analysis
    and evaluation
    Evaluation of the probability of various risk scenarios and determination of their impact
  • Step 4 | Risk responseCreation of tasks and measures for responding to risks. Predefined criteria for risk acceptance simplify the prioritisation of risk response.