i-doit Add-on

VIVA2

   i-doit     /        Paid

Set up an information security management system (ISMS) in accordance with the BSI's IT-Grundschutz methodology.



add-on-viva2-square
Key functionalities

  • Advanced Risk analyses according to BSI IT “Grundschutz” 200-X, seamlessly integrated with the CMDB

  • Management of the BSI IT “Grundschutz” catalogs

  • Creation of reports and diagrams

  • Wizard support for collecting data 

Pricing

Per year:

Small - Not available
(less than 1.000 objects)

Medium - 619,00 €
(less than 5.000 objects)

Large - 1.158,00 €
(less than 10.000 objects)

Flex - Contact us
(more than 10.000 objects)


Support

Information on support options can be found on the developer website

More information


Installation

For installation instructions, please contact the developer

More information


Logo_SectorNord_komplett_RGB

Description

The update of the methodology of BSI IT “Grundschutz” from 100-X to 200-X, which was published by the Federal Office for Information Security (BSI) in October 2017, also raises the risk analysis to a new level. To support this methodology there is the proven Baseline protection add-on in a completely revised version. The add-on was not only revised in terms of content, but above all it was technically modernized. Like the well-proven Baseline protection add-on, the new Baseline protection 2 supports you in setting up an Information Security Management System (ISMS).

Core functions

Baseline protection contains the terms Availabilty, Integrity, Confidentiality, Authenticity. The Baseline protection 2 add-on supports you in implementing the BSI IT “Grundschutz” methodology 200-X. Unique is the combining of the processes of risk management with those of the IT asset management in the same tool. Due to the integration in the i-doit CMDB, the maintenance of the foundation data is a one-time exercise and the processes can merge. The add-on integrates natively into i-doit and supports all CMDB core functions such as authorization management, templates, reporting, API and many other convenient functions for data maintenance.

The IT “Grundschutz” Compendium Edition 2018 issued by BSI will be fully imported. This allows you to perform state-of-the-art analysis and assessment of your IT environment. Additional wizards simplify data entry by combining several procedure steps. Information on protection requirements, security analyzes and mitigation measures are documented. Clear summaries and reports inform about where there is sufficient security already and where there is room for improvement. The reference documents required for the audit by BSI are created based on this documentation and are available in different formats. Existing customers of the Baseline protection 1.0 add-on can also use the Baseline protection 2 Add-on.

Application scenarios
  • Analysis of Availability, Integrity, Confidentiality and Authenticity of IT and the processes according to IT “Grundschutz” 200-X.
  • Establishment of an Information Security Management System (ISMS)
  • Building the basis for the certification according to BSI or ISO27001

Who do we recommend this add-on for?

Organizations that have to carry out IT Risk Management according to BSI IT “Grundschutz” 200-X and who want to combine this with existing data of the CMDB and the necessary maintenance processes.

Use-Cases

multi-ethnic-colleagues-working-together-at-data-c-2025-03-15-19-35-44-utc (1)
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

network-engineers-in-data-center-2025-03-09-23-33-55-utc
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

network-engineers-in-data-center-2025-03-09-23-33-55-utc
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

network-engineers-in-data-center-2025-03-09-23-33-55-utc
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

network-engineers-in-data-center-2025-03-09-23-33-55-utc
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

network-engineers-in-data-center-2025-03-09-23-33-55-utc
Title of the use case

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Read more

Test i-doit free for 30 days

icon-it-documentation-in-team-lt
2000+ Customers
icon-api-lt
No payment details required
icon-link-lt
Support included
icon-digital-contract-management-lt
Full functionality
icon-it-security-lt
GDPR compliant

Related Add-ons

add-on-analysis-box
i-doit Add-on Analysis

Add-on für mächtige Datenanalyse. Berechnen Sie Servicekosten, prüfen Sie die Datenqualität der CMDB und führen Sie Ausfallsimulationen durch.

add-on-flows-box
i-doit Add-on Flows

Erstellen Sie leistungsstarke Automatisierungen ohne Programmierkenntnisse ganz einfach nach einem Zeitplan oder manuell per Knopfdruck starten.

add-on-isms-box
i-doit Add-on ISMS

Bauen Sie ein Information-Security-Management-System mit Risikoanalyse und -management nach ISO 27001 auf.

add-on-documents-box
i-doit Add-on Documents

Dokumente auch als PDF automatisch erstellen mit tagesaktuellen Daten (z.B. Hardware-Übergabeschein oder Desaster Recovery Plan).

add-on-checkmk2-box
i-doit Add-on Checkmk2

Integrieren Sie das Monitoring-System Checkmk2 in i-doit. Abgleiche zwischen SOLL und IST aus CMDB und Monitoring werden damit unterstützt.

add-on-forms-box
i-doit Add-on Forms

Erstellen Sie auf einfache Weise Formulare, die Sie Nutzern zur vereinfachten Dateneingabe zur Verfügung stellen. Beispiel: Hardware oder Waren selbst dokumentieren lassen.

add-on-trigger-box
i-doit Add-on Trigger

Hinterlegen Sie Buttons mit eigenen Triggern und starten Sie IT-Prozesse direkt aus i-doit –z.B. das automatische Deployen einer virtuellen Maschine.

add-on-viva2-box
i-doit Add-on VIVA2

Mit diesem Add-on können Sie ein Managementsystem für die Informationssicherheit (ISMS) nach IT-Grundschutz-Methodik des BSI erstellen.

Get your personalized quote today!

Discover how the i-doit Add-on VIVA2 can support and streamline your processes. Get in touch with us for more information, pricing details, or to request a quote.

pwr-man-glasses-beard-tablet-blue


Telefon: +49 (0) 211 - 699 31 0