Management Software

Everything you need for information security & data protection management

An effective ISMS is a business enabler. It allows you to run the business the way you want to and with security designed for the way you want it to work helps you achieve that simply and cost effectively

99.5% up time - usually 100% reliability

24/7/365 availability with internet access

Deal with humans for any support issues

Discover the powerful ISMS features that will lead to your early success

Everything you need for data protection and information security management, in one place

Policy management

Manage your ISMS requirements, policies and controls in one place

  • Get a head start with frameworks that meet standards such as ISO 27001:2013, ISO 9001:2015, NIST Cyber Security, Cyber Essentials, PCI:DSS, PSN CoCo, Cloud Security Principles and more
  • Easily input information – create policies, controls and other information quickly
  • Quickly and easily create a Statement of Applicability for ISO 27001
  • See progress and completion for your ISMS at all times
  • Work well with your team using built in collaboration features and visible audit trails with version control management
  • Follow an efficient approval process to demonstrate independent evaluation

Read more…


Risk management and other decision support tools

Meet the requirements of GDPR, ISO 27001 and customers with an ISO 27001:2013 accredited risk management processes to protect your valuable information assets.

  • Save weeks of work using our risk bank of over 100 risks mapped to the controls used in their management
  • Quickly and easily add your own, assessing and evaluating impact using trusted methodologies
  • Assign and set review dates
  • Treat risks, capture evidence, and retain a full audit trail
  • Effectively manage Applicable Legislation and Interested Parties
  • Work dynamically online with teams or export as a spreadsheet when needed.

Discover how…

Evaluation & improvement

  • Evidence governance with practical audits & management reviews
  • Monitor objectives against KPI’s
  • Evidence non-conformities and corrective actions and identify areas for continual improvement, meeting requirement 10 of ISO 27001:2013
  • Manage through proven work processes, retaining information to create a full audit trail to save time later
  • Navigate and share easily to reduce management overhead.

Discover how...


Incident management
  • Evidence an end-to-end management of incidents & track events and weaknesses, following our proven work processes
  • Filter reporting by customisable settings that include notification to regulators and victims in line with EU GDPR
  • Manage and drive performance improvements using incident stats
  • Handle business continuity & disaster recovery planning.

Discover how…


Staff communication & awareness
  • Collaborate in groups
  • Set tasks for compliance
  • Improve learning and development.

Discover how…

Human resource security

Manage information security within HR through pre-built frameworks that save you time and effort during repeatable processes

  • Complete screening and recruitment, inductions, in-life compliance, training, exit and change
  • Collaborate using easy to administer teams
  • Group HR initiatives together using our simple ‘Cluster’ functionality that makes access, navigation and analysis fast and effective.

Discover how…



Supply chain management for information security

Satisfy the requirements of GDPR, and Section 15 of ISO 27001, to manage supply chain relationships:

  • Manage supplier contracts and contacts, and capture the GDPR requirement to hold DPO’s for all relevant suppliers
  • Create simple links from your disaster recovery plan for speedy retrieval from an independent and ‘always-on’ cloud solution
  • Link accounts to associated risks for ongoing management, fast analysis and improved decision making
  • Monitor and review supplier services & changes to services, setting KPI’s and capturing evidence with a clear and full audit trail
  • Capture contacts interest and satisfaction levels with quick and easy reporting
  • Categorise contracts by type and status and record power and interest levels for powerful management overview and action
  • It’s simple to create a cluster of supply chain partners to make it easy and fast to navigate and share information…you can even set up supply chain communication groups where required.

Discover how…

Project management for information security

If you’re following ISO 27001 you’ll need to address information security within project management, as required by 6.1.5 of the standard.

  • Use prebuilt accredited templates or build your own repeatable frameworks with security considerations at its core
  • It’s fast and simple to create additional standard or compliance frameworks, cutting down on the duplication across them
  • Complete project work, collaborating with colleagues with assigning, tasking, due dates, discussion areas and a place to evidence workings
  • Set KPI’s and measure performance 

Discover how…

GDPR frameworks and tools
  • Follow the full GDPR regulation as a project framework and capture your evidence, policies and workings to demonstrate compliance
  • For SME’s, follow the UK Information Commissioners Office (ICO) approved self-assessment framework and capture your evidence, policies, and workings to demonstrate compliance
  • Easily collaborate with teams, assigning tasks and due dates to ensure you are ready for May 2018
  • Follow a work process for tracking Subject Access Requests, assigning and setting due dates and reminders to ensure deadlines are met
  • Use our relationship management accounts area to record supply chain DPO’s as required by GDPR
  • Manage incidents and risks using ISO 27001 accredited tools which include ISO 27001 certified policies and controls
  • Conduct Privacy Impact Assessments and evidence findings

For the fastest way to achieve ISO 27001

Get a head start with our
actionable policies and controls

Discover our Adopt, Adapt, Add approach

Need more help with your ISO 27001 implementation?

For expert guidance and
support where and when you need it most

Meet our Virtual Coach

GDPR is coming. Are you prepared for the new regulations?

Future proof your business with our data protection frameworks and policies

See how can help

You wouldn’t try and emulate Microsoft Office so why try and build our own solution to manage the ISMS if others could do the job.

It’s more than just great cloud software with everything we need for our ISMS in one place. The team behind it invested their time into understanding our business and our goals and put together a package of remote adoption support.

Operations Director, Boomerang

Need more information on how we can help you meet your ISMS goals?

Book your demo
Software Name: Software Description: is an information security management system software that helps businesses achieve standards of quality, cyber security and data protection compliance. Software Image: Author: Review Date: