View

Sorting

Products found: 1

logo
Offer a reference bonus
0.00

secunet Automated ISMS

The automated way to achieve appropriate IT security levels

Organisations and public authorities prove their systematic approach to securely manage their IT systems by installing an information security management system (ISMS) that is based on the IT-Grundschutz methodology of the German Federal Office for Information Security (BSI). In light of shorter product life cycles and increasingly complex IT infrastructures, it is not simple to continuously manage and maintain appropriate IT security levels according to these guidelines: The selection of the security measures as well as the monitoring of the successful implementation represents a growing challenge for security officers and is hardly manageable with existing resources. How can an appropriate IT security level according to IT-Grundschutz be nonetheless reliably and sustainably implemented?

Not just a tool but a completely new methodology

Our answer to this question is “automated IT-Grundschutz” (aGS): aGS is not just a tool but a completely new methodology which helps to implement secure target configurations within a short period of time for a number of technologies . Their implementation is reliably and automatically checked and the results documented in compliance with BSI standards. The core of the new aGS methodology is the idea of modelling the IT network using pre-defined security modules (SiM) which define standardised security requirements for each class of target objects. They not only contain the guidelines from the BSI Grundschutz elements but also best practice recommendations for each technology and product version. The SiM are therefore much more precise. Thanks to the “translation” of technical measures into specific settings, they can be checked automatically. And for all non-technical measures, the SiM specify detailed multiple-choice questions which can be quickly and easily answered by the relevant employees themselves via web surveys.

Why wait?

The existing security modules - currently a total of 75, 40 of which are for systems, networks and applications - are ready for immediate use. Therefore, companies, public authorities and operators of critical infrastructures can already implement the IT-Grundschutz methodology and benefit from significant savings in time, cost and resources. Additional SiM are continuously added. Benefits:
  • Significantly reduced manual efforts for the implementation of an ISMS on the basis of IT-Grundschutz, resulting in considerable savings in time, cost and resources
  • Strong security increase due to many detailed reviews
  • Improved and continuous overview of the actual security level and status of the implementation of security measures
  • Generation of IT security concepts at the push of a button
  • Scalable product for IT infrastructures of any size
  • Also perfectly suitable for increased protection requirements
  • You can actively participate in the design of a roadmap
  • Profit from the strength of a common user network
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
1
12

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.