Manage risk

SecurirtyManager helps with risk:

  • Get rid of your spreadsheets!
  • Leverage built-in control libraries
  • Monitor risk treatments plans

 Communicate policies

SecurirtyManager helps with policies:

  • Get rid of your documents!
  • Tailor built-in policies
  • Share policies online

 Demonstrate compliance

SecurirtyManager helps with compliance:

  • Record your compliance requirements
  • Know when to check compliance
  • Automatically prepare reports!

Plans

Our plans to suit your needs.

Features

The features to make business easier.

  •  Manage business goals & objectives

    Document your business objectives so you know what is at stake when you manage risk.

    Link risks to business units and be able to know when and how achievement of business objectives is in jeopardy.

    << watch the video >> or contact us to find out more.

  •  Manage people

    Register all of your people and provide them with role based access to what they need.

    Link people to roles, organisation units and permissions so that they get the content, e.g. policies, applicable to their role.

    << watch the video >> or contact us to find out more.

  •  Manage assets

    Document your assets so you know what is at risk and therefore what you need to protect.

    Apply confidentiality, integrity and availability ratings for each asset based on a customisable scale.

    << watch the video >> or contact us to find out more.

  •  Manage threats

    Maintain a library of threats to ensure streamlined yet complete risk management.

    Link threats to identify equivalent threats that may be treated in the same way and reported on collectively.

    << watch the video >> or contact us to find out more.

  •  Manage controls

    Maintain a library of controls to ensure streamlined yet complete risk management.

    Link controls to identify equivalent controls that may be treated in the same way and reported on collectively.

    << watch the video >> or contact us to find out more.

  •  Manage risks

    Remove your dependence on spreadsheets; perform risk assessments online and ensure security is aligned with your business.

    Select from the available libraries when creating new risks and risk treatment plans.

    << watch the video >> or contact us to find out more.

  •  Manage policies

    Remove your dependency on documents; prepare and delivery your policices online.

    Link policy statements to organisational unit(s), roles, compliance requirements, security controls and/or scheduled tasks.

    << watch the video >> or contact us to find out more.

  •  Manage compliance

    Document your compliance requirements and automatically report on your compliance status.

    Link compliance requirements to policy statements and scheduled tasks (compliance checks) so you can report on status.

    << watch the video >> or contact us to find out more.

  •  Manage issues

    Register your issues and your corrective actions easily in the one online location.

    Link issues such as security incidents to the relevant threat, risk, control, policy or compliance requirement.

    << watch the video >> or contact us to find out more.

  •  Basic pre-populated content to get you started

    Get started quickly and easily with basic pre-populated content.

    Tailor the content to your needs yourself, upgrade to pro, or engage one of our consultants to assist you.

    Contact us to find out more.

  •  Pre-populated content that will help you achieve ISO 27001 compliance

    Get on the fast track to ISO 27001 compliance and certification.

    Our pro content meets the requirements of ISO 27001. You can then focus your efforts on implementation activities.

    Contact us to find out more.

  •  Reporting

    Reporting allows you to explore the effectiveness of your information security management system.

    This includes built-in reports for all aspects of the system.

    Contact us to find out more

  •  Changes (history)

    Changes provides an audit trail allowing you to see what has changed over time.

    Changes also includes a workflow for reviewing and approving changes to content.

    Contact us to find out more.

  •  Schedules (reminders)

    Know what you need to do when.

    Make use of built-in scheduled tasks for key activities or add your own when you are creating new policy statements including a benchmark for performance monitoring.

    Contact us to find out more.

Build smarter security programs.

Get in touch to find out about other ways we can help you.

Contact Us

Get in touch with us.

Your message was sent, thank you!