Software > IT Security > ISMS - Information Security Management

ISMS - Information Security Management System

In this SoftGuide section you will find an overview of software, programs, systems and solutions for ISMS (Information / IT Security Management System) or information security management system. Components of an information security management system (ISMS) within the framework of IT-Basic protection are the resources, the employees, the security process and the management principles. Information security management includes the establishment of regulations within the company to control and improve information security.

The software for information security management listed here usually includes solutions that contain, for example, assessment tools according to ISO 27001 and ISO 27002 or monitoring of hardware interfaces. Often, however, the software also supports the complete information security management including the consideration of different company units, extensive role and rights concepts and business impact assessments and certification support. The ISMS software supports the examination of security measures for effectiveness and helps to eliminate identified deficiencies and weaknesses.

Are you looking for a suitable ISMS - Information Security Management System?
show 1 to 4 (of 4 entries)
QSEC - GRC/ISMS, ISO 27001/BSI standard- IT protection, B3S and data protection
GRC, ISMS, risk management, IMS, IKS, and data protection - "All-in-one"!
GRC, ISMS, risk management, IMS, IKS, and data protection - All-in-one! QSEC is an integrated management system that provides the management with decisions based on transparency and facts and supplies the corporate risk management with important decision basics from the operative risk management. The implementation of. the Compliance, of Information Security Management according to the requirements of ISO 27001, BSI standard (IT-Grundschutz), B3S Risk Management anddata protection according to GDPR Data Protection according to GDPR In addition, a wide range of other requirements ...
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management tenfold is a powerful and user-friendly identity and access management software. Managing access rights has never been easier! Organize your file servers: tenfold is perfectly tailored to meet the demands of Microsoft environments. The software creates all Active Directory accounts automatically and builds the necessary access structures in accordance with best practices right from the start. Data owners are included into specified workflows. tenfold helps you maintain control over who has access to which folders at any time.
DHC VISION
eDMS | eQMS | eTMF| Solutions for quality and compliance processes
eDMS | eQMS | eTMF| Solutions for quality and compliance processes DHC VISION's ISMS provides a reliable framework for documentation and the basis for managing information security. The ISMS follows the PDCA model. The IT infrastructure is comprehensively documented, risks and the current security level are analysed and processes can be set up for transparent tracking of measures.
Compliance Aspekte
Is a practical GRC tool for implementing ISMS and DSMS
Compliance Aspekte is a modular software that maps governance, risk and compliance management into a single system. The software is designed to manage company-specific and regulatory standards, policies, and best practices. The software helps you identify threats to specific assets with minimal effort. The software supports the creation of risk and exposure catalogs.
show 1 to 4 (of 4 entries)
1
  •  

Looking for the right software? Trust SoftGuide!

Our experts will find the perfect solution for you - independently and at the cutting edge of software trends.

Search in similar categories:

Show all 352 Software categories