By using this web site you accept our use of cookies. More information about cookies
Accept
Infopulse - Expert Software Engineering, Infrastructure Management Services
By using this web site you accept our use of cookies. More information about cookies
Accept
Infopulse - Expert Software Engineering, Infrastructure Management Services
Infopulse - Expert Software Engineering, Infrastructure Management Services
Send message Request a call
Send message Please fill in this quick form and we will send you a free quote shortly.
* Required fields
Your privacy is important to us. We will never share your data.
Request a call Please fill in this quick form and we will call you back shortly.
* Required fields
Your privacy is important to us. We will never share your data.
Subscribe to our updates Be among the first to get exclusive content on IT insights, innovations, and best practices.
* Required fields
Your privacy is important to us. We will never share your data.
Subscribe to our Vacancies Please fill in this quick form to be among the first to receive our updates.
* Required fields
Your privacy is important to us. We will never share your data.
Send an email to Daniel-Steffen Schreiner Please fill in this quick form to contact our expert directly.
* Required fields
Your privacy is important to us. We will never share your data.
Infopulse - Expert Software Engineering, Infrastructure Management Services
Read the Full Case Study Don't miss the most interesting part of the story!
Submit this quick form to see the rest and to freely access all case studies on our website.
* Required fields
Your privacy is important to us. We will never share your data.

Security Compliance Manager

Ensure Security Compliance with GDPR, ISO 27001, and BSI IT-Grundschutz

Security Compliance Manager is an ISMS tool that enables enterprises to be compliant with security requirements of GDPR, ISO 27001, BSI IT-Grundschutz. A reliable replacement for a discontinued GSTOOL, SCM is a practical and efficient solution for IT security officers, data protection officers, administrators, managing directors, and CIOs.

SCM Benefits and Unique Features

Infopulse’s Security Compliance Manager (SCM) covers the whole Information Security Management System (ISMS) of a company, from planning and establishment of security concept up to certification.

SCM increases the maturity of IT operations and enables effective IT security management, compliant with GDPR, ISO 27001, and BSI IT-Grundschutz. With SCM, companies can prepare for the ISO 27001 certification based on IT-Grundschutz, easily adapt IT-Grundschutz-Compendium to specific business needs, and specify Protection Requirements of IT asset sets with multi-tenancy.

The tool is optimized for Top Management and is a perfect bet for IT security decision makers, helping them to prepare, administer and update security concepts, and establish IT Baseline Protection in the company.

Key Features

A comprehensive feature set to prepare your organization to the highest level of security compliance:

  • Managing multiple security concepts with one tool
  • Import data from the GSTOOL
  • Creation of safety concepts according to BSI IT-Grundschutz
  • Planning and carrying out Risk analysis in accordance with BSI-Standard-200-3
  • Integration of up-to-date and complete BSI- Compendium
  • Modeling according to IT-Grundschutz- Compendium
  • IT Inventory Management
  • Possibility to create and manage the groups of TOs
  • Security check
  • Cost analysis
  • Supplementary Security Analysis
  • Planning and implementation of internal audits
  • Wide set of reports (from standard to custom)
  • Privacy management of personal data through modeling with user-defined modules
  • Security concept snapshot (versioning)

4 Steps to Company’s Security Compliance with SCM

1. Create Security Concept
Automates modeling according to IT-Grundschutz- Compendium; allows defining the scope, to record all assets and objects (including non-technical objects such as employees, information/data, processes, roles, and responsibilities) and to import all required data from GSTOOL!
2. Specify Protection Requirements
Protection requirements (normal, high or very high) can be defined for any IT assets.
3. Perform Security Checkup
Allows assessing existing infrastructure protection and its compliance with security requirements of BSI IT-Grundschutz.
4. Conduct Risk Analysis (optional)
Risk analysis can be conducted for objects of high and very high protection requirements, as well as for nonstandard or unique objects.

How SCM works?

SCM is available both in German and in English and can be supplied as a web application with various licensing options. Information security, data protection, and risk management can be integrated as a complete management system and are always based on the complete, up-to-date and standard-compliant database. SCM supports multiple users with individual user interface settings and features simultaneous access.

The SCM structure is similar to the modular structure of BSI IT-Grundschutz Methodology. In order to adapt the recommended measures to the specific companies, the so-called blocks are used, which take the structure of the company into account. The blocks contain information regarding potential threats as well as measures to effectively counteract these threats.

All data can be visualized and presented in a convenient and easily comprehensible form, enhancing and accelerating decision making. E.g., all required evaluation and IT-Grundschutz certification reports (A1 to A6) can be collected in Excel, HTML and PDF formats with just 4 mouse clicks (reports on security modeling, analysis, risk handling, etc).

SCM will support the following features according to the modernized IT-Grundschutz:

New Standards:

  • Basic, Standard and Core Protection
  • Creation of safety concepts according to ISO 27001 and BSI IT-Grundschutz.
  • Modeling according to IT-Grundschutz-Compendium

Unique Features:

  • Privacy management of personal data according to GDPR
  • Integration with CMDB
  • Creation of IT-Grundschutz-Profiles acc. to particular institution needs

Subscribe to our Newsletter