Skip to content

i-doit INDITOR - Your ISMS for ISO certifications, BSI & NIS-2

An ISMS in 15 days

Clear processes and predefined catalogs ensure the practical implementation of regulatory requirements.

As a GRC solution "Made in Germany", i-doit INDITOR creates a
reliable basis for sustainable information security.

rating-stars-transparent-white 4.7/5 on Capterra | 2,000+ satisfied customers

i-doit-inditor-header

Test i-doit INDITOR now for 30 days free of charge

icon-it-documentation-in-team-dk
2,000+ customers
icon-api-dk
No payment details required
icon-link-dk
Support included
icon-digital-contract-management-dk
Full range of functions
icon-it-security-dk
EU-DSGVO compliant

i-doit INDITOR ISO: Your path to ISO 27001 certification

Structured implementation of standard requirements and audit-proof documentation

inditor_05 risk treatment
icon-it-documentation-in-team-lt ISO 27001
Integration of the DIN EN ISO/IEC 27001/27002 catalogs for the ISMS structure  
icon-api-lt Standard texts & implementation
Clearly formulated requirements with practical implementation aids  
icon-link-lt Risks & measures
Systematic risk analysis and tracking of measures in accordance with standards  
icon-digital-contract-management-lt Catalogs & Industries
Support for B3S, IT security catalog, TISAX®/VDA-ISA, VAIT, BAIT, ISO 9001, ISO 27019, VdS 10000, and many more.  
icon-it-security-lt Audits & evidence
Comprehensible documentation for internal and external audits  

i-doit INDITOR BSI: Structured implementation of IT baseline protection

Centralized mapping and audit-proof documentation of requirements according to BSI IT-Grundschutz

INDITOR_Screenshot_Modeling
icon-it-documentation-in-team-dk BSI IT basic protection
Illustration of the 200 standards of the Federal Office for Information Security (BSI)  
icon-api-dk Public organizations
Designed to meet the requirements of authorities and public institutions  
icon-link-dk Procedure & information networks
Individual definition of the procedure for each information network  
icon-digital-contract-management-dk Determination of protection requirements
Carrying out the protection requirements analysis at process level  
icon-it-security-dk Audits & evidence
Comprehensible documentation for tests and certifications according to BSI  

i-doit INDITOR NIS-2: NIS-2-compliant & practically implemented

Central implementation with GAP analysis and audit-proof evidence

Incident management
icon-it-documentation-in-team-lt NIS-2 Implementation Act
Complete mapping of the requirements of the NIS-2 implementation law  
icon-api-lt Complete documentation of security incidents
Implement documentation, risk assessment & measures in compliance with NIS-2  
icon-link-lt Protection requirements & risks
Structured determination of protection requirements and systematic risk assessment  
icon-digital-contract-management-lt Measures & treatment
Derivation, implementation and follow-up of suitable safety measures  
icon-it-security-lt NIS-2 checklist & GAP analysis
Integrated checklist for stocktaking, assignment of measures, responsibilities and evidence  

Catalogs

Advantages of our ISMS solution

Our editions for the i-doit INDITOR at a glance

The right ISMS solution for ISO, BSI and NIS-2 - transparent and clear

i-doit INDITOR ISO
from 588 €
/ year
i-doit INDITOR BSI
from € 1,908
/ year
i-doit INDITOR NIS-2
from 1.908€
/ year
Function overview
Administration
idoit-check-mark
idoit-check-mark
idoit-check-mark
Master data
idoit-check-mark
idoit-check-mark
idoit-check-mark
Dashboard
idoit-check-mark
idoit-check-mark
idoit-check-mark
Reports
idoit-check-mark
idoit-check-mark
idoit-check-mark
Asset management
idoit-check-mark
idoit-check-mark
idoit-check-mark
Documents
Optional
Optional
Optional
Goal management
idoit-check-mark
idoit-check-mark
idoit-check-mark
Supplier management
idoit-check-mark
idoit-check-mark
idoit-check-mark
Measures
idoit-check-mark
idoit-check-mark
idoit-check-mark
Safety incident management
idoit-check-mark
idoit-check-mark
idoit-check-mark
Risk management
idoit-check-mark
idoit-check-mark
idoit-check-mark
Determining the need for protection
idoit-check-mark
idoit-check-mark
idoit-check-mark
Staff exchange
idoit-check-mark
idoit-check-mark
idoit-check-mark
Audit management
idoit-check-mark
idoit-check-mark
NIS-2 Checklist
idoit-check-mark
IT baseline protection check
idoit-check-mark
Catalogs
Optional
Optional
Optional
Purchase license
Optional
Optional
Optional

Use cases

Use cases relating to ISMS, risk and compliance management

Audit management
Audit management

You control audits centrally, plan audits, document results and automatically generate audit reports.

View use case

Document management
Document management

You can manage documents in an audit-proof manner, version and edit them directly in the tool and use templates and import functions.

View use case

GAP analysis
GAP analysis

i-doit supports GAP analyses according to standards such as ISO 27001, ISO 9001 or NIS2, including maturity level assessment, responsibilities and document assignment.

View use case

Supplier management
Supplier management

You evaluate and manage suppliers centrally, document contracts and maintain contact details and replacement suppliers.

View use cases

Action management
Action management

You derive measures, distribute tasks, track deadlines and receive automatic notifications by e-mail.

View use case

Security incident management
Security incident management

You document and evaluate security incidents in accordance with ISO and NIS2, assign affected assets and centrally derive measures.

View use case

Contact (1)

Book your personal live demo

Our i-doit team will be happy to take the time to advise you personally on your application.

i-doit INDITOR Overview

The information security software that provides you with a guide

1. Catalog of requirements

Illustration of the requirements of the ISO / IEC 27001 catalog linked to the scope. The requirements and measures are supplemented in our ISMS tool i-doit INDITOR with implementation instructions and assistance. ISO / IEC 27002 is automatically linked.

Define responsibilities, implementation statuses and measures for individual requirements. Link guidelines (e.g. compliance) and documents relevant to the requirements and add implementation instructions.

 

i-doit-GRC-Inditor-Unnamed-screenshot

2. Asset management

With i-doit INDITOR ISO asset management, you can manage processes, personnel and IT infrastructure centrally. Included ISO-compliant standard processes can be expanded and imported. Asset trees, groups and dependencies support risk assessments in risk management. Existing inventory and IT solutions, suppliers and organizational units can be easily integrated. For maximum transparency in complex companies.

i-doit-GRC-Inditor-Processes-screenshot

3. Determination of protection requirements

The protection requirement determines how important a process is for the functioning of all other processes in a company. You can make this determination in our software using a customizable Business Impact Analysis (BIA). This can be individually adapted to the circumstances and structures in your company.

The need for protection is automatically passed on to the people, applications and infrastructure it contains.

i-doit-GRC-Inditor-BIA-screenshot

4. Risk assessment

In the risk assessment, you determine how high the probability of a risk occurring in a particular scenario is.

You assess the likelihood that these hazards will affect your company and the most probable consequences of this impairment for your company.

i-doit-GRC-Inditor-risk-editing-screenshot

5. Audit management

Audit management is the ideal way to prepare for certification, e.g. to ISO/IEC 27001. You can plan and manage audits and check the current implementation status.

Compare security measures that have already been implemented with the requirements of the ISO standard to identify the level of security achieved and identify opportunities for improvement.

 

i-doit-GRC-Inditor-Audit-Report_Final-Screenshot

Industries

View all solutions for your industry

FAQs about i-doit INDITOR

Your advantages at a glance

What is an ISMS and why do I need it?

An information security management system (ISMS) is a systematic approach to ensuring information security in organizations. It helps to identify and assess risks and implement suitable measures to secure processes and data - e.g. in accordance with ISO/IEC 27001.

Which norms and standards does the ISMS tool support?

The ISMS tool covers requirements from the following norms and standards, among others:

  • ISO/IEC 27001 & ISO/IEC 27002

  • Compliance catalogs (e.g. TISAX®, BAIT, VAIT, DIN EN ISO 9001 etc.)

  • Risk management, audit and action management including BIA (Business Impact Analysis)

What does NIS2 mean and who does it apply to?

The EU's NIS 2 Directive is a legal framework for increasing cyber security in critical sectors. It extends the requirements for security measures and reporting obligations for companies and organizations in the EU.

How does the ISMS module NIS2 help me with implementation?

With the i-doit INDITOR NIS 2 module, i-doit offers a tool that maps the contents of the NIS 2 directive in a fully structured manner. Among other things, it supports

  • Clear inventory of the implementation status

  • Integrated GAP analysis/checklist for NIS2 compliance

  • Centralized management of responsibilities, evidence and measures

  • Audit-proof documentation for audit preparation

What is the difference between ISO 27001 and NIS2?
  • ISO 27001 is an international standard for a structured ISMS.

  • NIS2 is an EU directive with binding legal requirements on cyber security for affected organizations.

    The NIS2 module uses an ISMS system as a technical platform to implement the directive efficiently.

What is IT baseline protection?

IT baseline protection is an approach developed by the German Federal Office for Information Security (BSI) for a holistic information security management system. It comprises organizational, infrastructural and technical measures to secure systems and processes.

How does i-doit support IT baseline protection?

With i-doit INDITOR BSI, i-doit offers software for implementing IT baseline protection in accordance with the BSI standards (including 200-1, 200-2, 200-3). This solution:

  • maps the BSI specifications in a structured manner

  • enables risk management, documentation & task management

  • provides templates for guidelines and reports

  • supports individually customizable per scope

Can I use the solutions in combination?

Yes, the -i-doit software has a modular structure and can be used flexibly:

  • Only individual modules (e.g. ISO-ISMS, NIS2 or IT-Grundschutz)

  • or integrated as part of a comprehensive information security management system with a shared database and standardized interface.

What are the advantages of using the software?

With i-doit solutions, you benefit from

  • Structured and standardized procedures

  • Centralized documentation and verification

  • Automated process support

  • Audit and certification preparation

  • Reduction of manual effort

How do I start with the implementation?

You can:

  • request a demo or trial version

  • book a consultation or webinar

  • introduce the software step by step - from the first status check to full compliance implementation.