VIVA2
i-doit / Paid
Set up an information security management system (ISMS) in accordance with the BSI's IT-Grundschutz methodology.
-
Advanced Risk analyses according to BSI IT “Grundschutz” 200-X, seamlessly integrated with the CMDB
-
Management of the BSI IT “Grundschutz” catalogs
-
Creation of reports and diagrams
-
Wizard support for collecting data
Per year:
Small - Not available
(less than 1.000 objects)
Medium - 619,00 €
(less than 5.000 objects)
Large - 1.158,00 €
(less than 10.000 objects)
Flex - Contact us
(more than 10.000 objects)
Information on support options can be found on the developer website.
More information
For installation instructions, please visit the knowledge base
Description
The update of the methodology of BSI IT “Grundschutz” from 100-X to 200-X, which was published by the Federal Office for Information Security (BSI) in October 2017, also raises the risk analysis to a new level. To support this methodology there is the proven Baseline protection add-on in a completely revised version. The add-on was not only revised in terms of content, but above all it was technically modernized. Like the well-proven Baseline protection add-on, the new Baseline protection 2 supports you in setting up an Information Security Management System (ISMS).
Core functions
Baseline protection contains the terms Availabilty, Integrity, Confidentiality, Authenticity. The Baseline protection 2 add-on supports you in implementing the BSI IT “Grundschutz” methodology 200-X. Unique is the combining of the processes of risk management with those of the IT asset management in the same tool. Due to the integration in the i-doit CMDB, the maintenance of the foundation data is a one-time exercise and the processes can merge. The add-on integrates natively into i-doit and supports all CMDB core functions such as authorization management, templates, reporting, API and many other convenient functions for data maintenance.
The IT “Grundschutz” Compendium Edition 2018 issued by BSI will be fully imported. This allows you to perform state-of-the-art analysis and assessment of your IT environment. Additional wizards simplify data entry by combining several procedure steps. Information on protection requirements, security analyzes and mitigation measures are documented. Clear summaries and reports inform about where there is sufficient security already and where there is room for improvement. The reference documents required for the audit by BSI are created based on this documentation and are available in different formats. Existing customers of the Baseline protection 1.0 add-on can also use the Baseline protection 2 Add-on.
Application scenarios
- Analysis of Availability, Integrity, Confidentiality and Authenticity of IT and the processes according to IT “Grundschutz” 200-X.
- Establishment of an Information Security Management System (ISMS)
- Building the basis for the certification according to BSI or ISO27001
Who do we recommend this add-on for?
Organizations that have to carry out IT Risk Management according to BSI IT “Grundschutz” 200-X and who want to combine this with existing data of the CMDB and the necessary maintenance processes.
Use cases
i-doit use cases for your documentation needs

You document active and passive network elements including cabling, port assignment, IP addresses and configurations centrally and comprehensibly.

You record and analyze software and licenses, monitor runtimes, users and authorizations and avoid license violations and unnecessary costs.

You analyze your IT infrastructure, identify documentation gaps and create location, user or cost centre-related reports and audit PDFs.

You document and manage contracts centrally, link them to objects and responsible parties and are automatically informed about deadlines and terms.

They document maintenance and lifecycles, make changes traceable, automate processes and keep track of responsibilities and warranty periods.

You document locations, rooms and infrastructure, link these to contact persons and also visualize server rooms clearly.
Use-Cases
.webp?width=300&name=multi-ethnic-colleagues-working-together-at-data-c-2025-03-15-19-35-44-utc%20(1).webp)
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Related Add-ons
Add-on für mächtige Datenanalyse. Berechnen Sie Servicekosten, prüfen Sie die Datenqualität der CMDB und führen Sie Ausfallsimulationen durch.
Erstellen Sie leistungsstarke Automatisierungen ohne Programmierkenntnisse ganz einfach nach einem Zeitplan oder manuell per Knopfdruck starten.
Bauen Sie ein Information-Security-Management-System mit Risikoanalyse und -management nach ISO 27001 auf.
Dokumente auch als PDF automatisch erstellen mit tagesaktuellen Daten (z.B. Hardware-Übergabeschein oder Desaster Recovery Plan).
Integrieren Sie das Monitoring-System Checkmk2 in i-doit. Abgleiche zwischen SOLL und IST aus CMDB und Monitoring werden damit unterstützt.
Erstellen Sie auf einfache Weise Formulare, die Sie Nutzern zur vereinfachten Dateneingabe zur Verfügung stellen. Beispiel: Hardware oder Waren selbst dokumentieren lassen.
Hinterlegen Sie Buttons mit eigenen Triggern und starten Sie IT-Prozesse direkt aus i-doit –z.B. das automatische Deployen einer virtuellen Maschine.
Mit diesem Add-on können Sie ein Managementsystem für die Informationssicherheit (ISMS) nach IT-Grundschutz-Methodik des BSI erstellen.
More Add-ons
Expand i-doit to include DSGVO-relevant areas. The master data remains, the extended rights system ensures security.
i-doit
Free
From the hardware handover certificate to the disaster recovery plan. Create appealing documents - also as PDF - with daily updated data from your CMDB - automatically!
i-doit
Paid
Build an information security management system with risk analysis and management according to ISO 27001.
i-doit
Paid
Record and control authorizations between business departments and IT. Authorizations can be linked to business applications via LDAP/LDAPs.
i-doit
Free
Get your personalized quote today!
Discover how the i-doit Add-on VIVA2 can support and streamline your processes. Get in touch with us for more information, pricing details, or to request a quote.

Telefon: +49 (0) 211 - 699 31 0
More Add-ons
Establish a connection to ((OTRS)) Community Edition. No customization is necessary on the ((OTRS)) Community Edition side. The add-on is also functional after an ((OTRS)) Community Edition update.
i-doit
Paid
Extend i-doit with powerful analysis functions: Calculate service costs, check data quality and perform failure simulations.
i-doit
Paid
With the i-doit REST API you integrate applications, automate workflows and develop your own add-ons!
i-doit
Free
Automatically synchronize your data between the Baramundi management suite and i-doit
i-doit
Paid
Documentation of cabling is a time-consuming task. This add-on gives you an overview and fluid workflows for this special task.
i-doit
Free
Transfer and update content from i-doit to Atlassian Confluence
i-doit
Paid
Expand i-doit to include DSGVO-relevant areas. The master data remains, the extended rights system ensures security.
i-doit
Free
Solution for data replication and synchronization of two identical i-doit CMDB
i-doit
Paid
Change the appearance of i-doit according to your CD and use your company logo, for example.
i-doit
Paid
Meet the requirements of BSI or ISO certification by documenting the disposal of any hardware in an audit-proof manner.
i-doit
Paid
From the hardware handover certificate to the disaster recovery plan. Create appealing documents - also as PDF - with daily updated data from your CMDB - automatically!
i-doit
Paid
Automate the operation of your data center with the current data from the CMDB. Events trigger and control the further processes.
i-doit
Free
Display rooms graphically. Store building plans and arrange objects such as workplaces. WLAN heat maps are also possible.
i-doit
Free
Create powerful automations without any programming knowledge!
i-doit
Paid
Easily create forms to share with users for simplified data entry.
i-doit
Paid
Transfer i-doit CIs to OpenVAS/Greenbone at configurable intervals and start the Full & Fast Scan, for example. The results are written to the i-doit logbook.
i-doit
Paid
Build an information security management system with risk analysis and management according to ISO 27001.
i-doit
Paid
This interface enables data transfer from JDisc into the i-doit CMDB according to configurable rules.
i-doit
Free
Interface between i-doit and Atlassian Jira Service Management
i-doit
Paid
Manage all your keys comfortably in i-doit. See at any time which people have access to which buildings and rooms.
i-doit
Free
Maintenance of your IT components requires not only good timing, but also timely documentation. With this add-on you simplify a lot.
i-doit
Free
With the included object catalog (UMDNS), you can document medical devices in hospitals and clinics with little effort.
i-doit
Paid
Discover agentless or via agent, trigger via ClearPass, Endpoint Manager and much more, or use our connection to the VMware or Proxmox API. Automated, interval-configurable inventory of FREICON.
i-doit
Paid
Start monitoring CIs, monitor IT services, IT processes or end-2-end monitoring results automatically in the monitos ITSM control center and also display the results directly in i-doit on the CI.
i-doit
Paid
Connect the open source monitoring solution Nagios to your i-doit CMDB. Configuration settings can be made directly in i-doit.
i-doit
Free
Via the interface, you import both hardware and software objects from the OCS Inventory NG system directly into the i-doit CMDB.
i-doit
Paid
Integrate i-doit smoothly with other systems
i-doit
Paid
The interface between i-doit and openITCOCKPIT from our partner Allgeier ITS makes it much easier to set up a monitoring system.
i-doit
Paid
Integrate the OTOBO ticket system with the i-doit CMDB to create tickets with user-specific and general data directly from the CMDB.
i-doit
Paid
Smart Dual-Flow or display the CIs of a user in a ticket, link to an IT service or an IT process in OTOBO or vice versa. The OTOBO Dual-Flow add-on from FREICON.
i-doit
Paid
Digital signatures directly in i-doit!
i-doit
Paid
The "move" in IMAC processes has a great impact on IT documentation. This add-on reduces the work to a few mouse clicks.
i-doit
Free
Install, move, add and change - normality in any IT operation. With this add-on you simplify the documentation of IMAC processes.
i-doit
Free
Change management according to ITIL is realized with this add-on. The fully integrated process is applied directly to affected CIs.
i-doit
Paid
Record and control authorizations between business departments and IT. Authorizations can be linked to business applications via LDAP/LDAPs.
i-doit
Free
Automatically synchronize your data between the Baramundi management suite and i-doit
i-doit
Paid
Integrate the Checkmk monitoring system into i-doit. Reconciliations between TARGET and ACTUAL from CMDB and monitoring are thus supported.
i-doit
Paid
Make your NAC devices transparent and automatically add them to your IT documentation.
i-doit
Paid
Import of mobile contracts, SIM cards and tariff options from Deutsche Telekom into i-doit.
i-doit
Paid
Create dependencies and alerting levels for your IT landscape according to your individual circumstances.
i-doit
Paid
Visualize and analyze your network cabling. With SHD View | Cable you always have the entire IT under control across locations.
i-doit
Paid
Extensive, confusing lists were yesterday. Discover your IT landscape from a completely new perspective!
i-doit
Paid
Create your individual work platform according to your wishes and requirements. Everything is possible.
i-doit
Paid
Graphical documentation from the server rack to the end device. With SHD View | Patch always full overview and efficiency in complex environment.
i-doit
Paid
Get Flows, Documents, Analysis and Forms Add-ons for the price of 2!
i-doit
Paid
The monitoring suite SNAG-View of our partner Sector Nord AG is connected to i-doit with this add-on and enables continuous ITSM processes.
i-doit
Paid
Store buttons with your own triggers and start IT processes directly from i-doit.
i-doit
Paid
Build information security management systems (ISMS) according to the BSI's IT Baseline Protection methodology.
i-doit
Paid
Thanks to the close integration of the i-doit CMDB with the Znuny HelpDesk system, you always have up-to-date data in the created tickets.
i-doit
Paid
Connect your i-doit system with the community ticket management system Znuny 7
i-doit
Paid


