How do you manage your IT risks? Manual risk analyses always suffer from data inconsistencies and a lack of reliability. AdiRisk provides you with ISMS software that optimally supports your risk management process. Pre-installed catalogs and automation logic simplify risk assessment, accelerate the risk analysis process and provide a better overview of risk management.
You can also benefit from other advantages such as
- Recognize risks at an early stage
With AdiRisk, you can identify, assess and treat risks before they occur.
- Save time and money
Thanks to the intuitive operation, predefined catalogs and automated functions, you quickly obtain reproducible results.
- Rely on security
Your data is processed in a German, ISO 27001-certified data center.
- Go into the audit relaxed
The standards contained in AdiRisk ensure optimum preparation for the audit. Auditors are also impressed by the ISMS software.
- No hidden costs
The license price includes everything you need for a successful start with AdiRisk. You can expect neither installation costs nor additional expenses for servers or licenses.
AdiRisk has been specially designed to meet the requirements of IT risk management. Integrated vulnerability and threat catalogs, the ISO 27001 catalogs of measures and the B3S (healthcare*)) are integral components. The software guides you intuitively through the risk management process, which is based on the ISO 27005 risk management standard.
The user can switch between an ISO 27001 and B3S view. This unique function allows users to align their measures with the respective standard.
The measures to be implemented can be assigned directly to the underlying risks and the implementation status can be viewed at any time. The dashboard and detailed reports allow you to keep an eye on your risks at all times.
All AdiRisk functions at a glance:
- Inventory, categorization and filtering of risk objects (assets)
- Automation steps through AdiRisk logic
- Simplified and intuitive operation
- Help function in the risk assessment process
- Integrated catalogs: ISO 27001, B3S, threats & vulnerabilities
- Create your own threats/vulnerabilities, action templates, processes and categorization elements
- ISO 27001 compliant
- Roles & rights model
- Active Directory (AD) connection
- Audit & management reporting functions (SoA)
- Action planning with assignment of responsible persons and deadlines
- File storage system for implementation documents
- Control overview (dashboard) and action tracking of the current risk management status
- Mapping of ISO measures to B3S (vice versa)
- Import of assets and users
- Individual color scheme and CI possible
- Translation function, language selection
*) Further B3S (industry-specific security standards) on request