Software > IT Security > ISMS - Information Security Management

ISMS - Information Security Management System

In this SoftGuide section you will find an overview of software, programs, systems and solutions for ISMS (Information / IT Security Management System) or information security management system. Components of an information security management system (ISMS) within the framework of IT-Basic protection are the resources, the employees, the security process and the management principles. Information security management includes the establishment of regulations within the company to control and improve information security.

The software for information security management listed here usually includes solutions that contain, for example, assessment tools according to ISO 27001 and ISO 27002 or monitoring of hardware interfaces. Often, however, the software also supports the complete information security management including the consideration of different company units, extensive role and rights concepts and business impact assessments and certification support. The ISMS software supports the examination of security measures for effectiveness and helps to eliminate identified deficiencies and weaknesses.

Are you looking for a suitable ISMS - Information Security Management System?
show 1 to 6 (of 6 software programs)
QSEC - GRC/ISMS, ISO 27001/BSI standard- IT protection, B3S and data protection
GRC, ISMS, risk management, IMS, IKS, and data protection - "All-in-one"!
GRC, ISMS, risk management, IMS, IKS, and data protection - All-in-one! QSEC is an integrated management system that provides the management with decisions based on transparency and facts and supplies the corporate risk management with important decision basics from the operative risk management. The implementation of. the Compliance, of Information Security Management according to the requirements of ISO 27001, BSI standard (IT-Grundschutz), B3S Risk Management anddata protection according to GDPR Data Protection according to GDPR In addition, a wide range of other requirements ...
SECURITY ASSISTANT (MR.KNOW)
Workflows on the topics of ISMS, cybersecurity and NIS2
Workflows on the topics of ISMS, cybersecurity and NIS2 Workflows on the topics of ISMS, cybersecurity and NIS2...
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management tenfold is a powerful and user-friendly identity and access management software. Managing access rights has never been easier! Organize your file servers: tenfold is perfectly tailored to meet the demands of Microsoft environments. The software creates all Active Directory accounts automatically and builds the necessary access structures in accordance with best practices right from the start. Data owners are included into specified workflows. tenfold helps you maintain control over who has access to which folders at any time.
BIC GRC Solutions
Comprehensive protection with BIC Information Security from GBTEC
Comprehensive protection with BIC Information Security from GBTEC Information is one of the most important assets in any company. It must therefore be fully protected. The ISO 27001 standard provides a set of rules that every company can use as the basis for a forward-looking information security management system. With BIC Information Security, you can set up a standard-compliant ISMS in the shortest possible time without complicated Excel applications.
DHC VISION
eDMS | eQMS | eTMF| Solutions for quality and compliance processes
eDMS | eQMS | eTMF| Solutions for quality and compliance processes DHC VISION's ISMS provides a reliable framework for documentation and the basis for managing information security. The ISMS follows the PDCA model. The IT infrastructure is comprehensively documented, risks and the current security level are analysed and processes can be set up for transparent tracking of measures.
Compliance Aspekte
Is a practical GRC tool for implementing ISMS and DSMS
Compliance Aspekte is a modular software that maps governance, risk and compliance management into a single system. The software is designed to manage company-specific and regulatory standards, policies, and best practices. The software helps you identify threats to specific assets with minimal effort. The software supports the creation of risk and exposure catalogs.
show 1 to 6 (of 6 software programs)
1
  •  

Looking for the right software? Trust SoftGuide!

Our experts will find the perfect solution for you - independently and at the cutting edge of software trends.

Search in similar categories:

Show all 357 Software categories