Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Software

Hall 7A / Booth Number 7A-523

ISiProtect

Categories

Data protection, data security Business continuity Security management Risk analysis and management

Key Facts

  • Web-based editing of measures and VTs
  • Role-based access by organizational unit
  • Capture and documentation of processing activities

Product Description

The WEB frontend ISiProtect enables the participation of the organizational units (OU) in the creation, maintenance and editing of structures for information security and data protection. In addition, the OUs are involved in the creation and editing of the BCM as well as events (audit, security incident, etc.).   ISiProtect is connected to the ISiMap database and can be accessed directly via the Internet.   Main contents:   Information security/events - Role-based access: each user sees only the assets and measures assigned to him/her - Documentation of performed actions by the OU (e.g. IT service) - Processing of events and their measures by the OU - Workflow between information security officer and the OUs - In development: further escalation mechanisms and BCM   Data protection - Role-based access: each user sees only the VTs assigned to him/her - Recording and documentation of processing activities - Purpose, legal basis, data (internal/external), protection needs, documents, notes - Printing of the list of processing activities - Workflow between data protection officer and the OUs   
... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.