i-doit Add-on

ISMS

   i-doit     /        Paid

Build an information security management system with risk analysis and management according to ISO 27001
add-on-isms-square
Key functionalities

  • ISO27001 Risk Management within i-doit

  • Importing and managing threats and measures from external catalogs

  • Risk evaluations directly at documented assets

  • Reporting and integration into the i-doit Add-on Documents

Pricing

Paid.

Fixed priced add-on

View pricing


Support

Information on support options can be found on the developer website 

More information


Installation

For installation instructions, please contact the developer 

More details


becon-logo

IT Documentation with i-doit: the foundation for successful ISMS

Get a comprehensive overview of your (IT) infrastructure while maintaining high data quality through integrated processes.

The i-doit Add-on ISMS integrates security documentation directly into your CMDB, where it belongs. Since IT documentation is the first to know about new components and infrastructure changes, you can manage security assessments daily through risk identification and evaluation of objects (IT assets, Configuration Items) directly in i-doit.

We believe change processes are complex enough already! Avoid purchasing additional software and maintaining redundant data. The i-doit Add-on ISMS's native i-doit integration leverages existing functions like templates, bulk processing, and reporting. Users can add security information to assets without modifying the underlying data model. For final refinements to your Risk Management Process, the i-doit Add-on Documents can incorporate ISMS data into professionally formatted documents matching your corporate design.

screenshot-ISMS-2024

Achieve ISO 27001 Compliance in Just Three Steps

With the i-doit Add-on ISMS, you seamlessly integrate risk assessment directly into your IT asset management. Whether following ISO 27001 Annex A, the BSI IT-Grundschutz Catalog, or the IT Security Catalog of the Bundesnetzagentur, you’re covered from the start.

  • Step 1: Install the i-doit Add-on ISMS and conduct risk assessments within the context of your IT assets.
  • Step 2: Customize your risk management framework by adjusting predefined catalogs, defining impact scenarios, setting up mitigation measures, and assigning roles, responsibilities, and rating scales. Initial report definitions complete this phase.
  • Step 3: Implement and maintain risk management to ensure ISO 27001 compliance. Analyze and evaluate assets, manage versioning, and follow the PDCA cycle (Plan, Do, Check, Act) with full documentation support from the i-doit Add-on ISMS.

i-doit-add-on-ISMS-screenshot

 

Use-Cases

multi-ethnic-colleagues-working-together-at-data-c-2025-03-15-19-35-44-utc (1)
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

network-engineers-in-data-center-2025-03-09-23-33-55-utc
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

network-engineers-in-data-center-2025-03-09-23-33-55-utc
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

network-engineers-in-data-center-2025-03-09-23-33-55-utc
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

network-engineers-in-data-center-2025-03-09-23-33-55-utc
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

network-engineers-in-data-center-2025-03-09-23-33-55-utc
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

Test i-doit free for 30 days

icon-it-documentation-in-team-lt
2000+ Customers
icon-api-lt
No payment details required
icon-link-lt
Support included
icon-digital-contract-management-lt
Full functionality
icon-it-security-lt
GDPR compliant

Related Add-ons

add-on-analysis-box
i-doit Add-on Analysis

Add-on für mächtige Datenanalyse. Berechnen Sie Servicekosten, prüfen Sie die Datenqualität der CMDB und führen Sie Ausfallsimulationen durch.

add-on-flows-box
i-doit Add-on Flows

Erstellen Sie leistungsstarke Automatisierungen ohne Programmierkenntnisse ganz einfach nach einem Zeitplan oder manuell per Knopfdruck starten.

add-on-isms-box
i-doit Add-on ISMS

Bauen Sie ein Information-Security-Management-System mit Risikoanalyse und -management nach ISO 27001 auf.

add-on-documents-box
i-doit Add-on Documents

Dokumente auch als PDF automatisch erstellen mit tagesaktuellen Daten (z.B. Hardware-Übergabeschein oder Desaster Recovery Plan).

add-on-checkmk2-box
i-doit Add-on Checkmk2

Integrieren Sie das Monitoring-System Checkmk2 in i-doit. Abgleiche zwischen SOLL und IST aus CMDB und Monitoring werden damit unterstützt.

add-on-forms-box
i-doit Add-on Forms

Erstellen Sie auf einfache Weise Formulare, die Sie Nutzern zur vereinfachten Dateneingabe zur Verfügung stellen. Beispiel: Hardware oder Waren selbst dokumentieren lassen.

add-on-trigger-box
i-doit Add-on Trigger

Hinterlegen Sie Buttons mit eigenen Triggern und starten Sie IT-Prozesse direkt aus i-doit –z.B. das automatische Deployen einer virtuellen Maschine.

add-on-viva2-box
i-doit Add-on VIVA2

Mit diesem Add-on können Sie ein Managementsystem für die Informationssicherheit (ISMS) nach IT-Grundschutz-Methodik des BSI erstellen.

Get your personalized quote today!

Discover how the i-doit Add-on ISMS can support and streamline your processes. Get in touch with us for more information, pricing details, or to request a quote.

pwr-man-glasses-beard-tablet-blue


Telefon: +49 (0) 211 - 699 31 0