Features tour

 

Everything you need for information security management, in one place

 

Requirements, controls & policies

Capture your requirements. Host your policies, controls & complete approval management. Handle multiple standards such as ISO 27001, NIST cyber security, PCI DSS and more.

Discover how...

Risk and interested parties tools

Manage information security risks plus applicable legislation and interested parties management.

Discover how...

Evaluation & improvement

Complete management reviews & audits. Evidence governance & monitor objectives. Undertake improvements and manage corrective actions for continual improvement.

Discover how...

 

Incident
management

Manage incidents & track events and weaknesses. Handle business continuity  & disaster recovery planning.

Discover how...

Staff communication & awareness

Collaborate in groups. Set tasks for compliance. Improve learning and development.

Discover how...

 

Human resource security

Complete screening and recruitment, inductions, in-life compliance, training, exit and change.

Discover how...

Supply chain mgt for information security

Manage supplier contracts and contact. Monitor and review supplier services & changes to services.

Discover how...

Project management for information security

Use prebuilt accredited templates or build your own frameworks. Complete project  work & measure performance with reports.

Discover how...