VIVA2
i-doit / Paid
Set up an information security management system (ISMS) in accordance with the BSI's IT-Grundschutz methodology.
-
Advanced Risk analyses according to BSI IT “Grundschutz” 200-X, seamlessly integrated with the CMDB
-
Management of the BSI IT “Grundschutz” catalogs
-
Creation of reports and diagrams
-
Wizard support for collecting data
Per year:
Small - Not available
(less than 1.000 objects)
Medium - 619,00 €
(less than 5.000 objects)
Large - 1.158,00 €
(less than 10.000 objects)
Flex - Contact us
(more than 10.000 objects)
Information on support options can be found on the developer website.
More information
For installation instructions, please visit the knowledge base
Description
The update of the methodology of BSI IT “Grundschutz” from 100-X to 200-X, which was published by the Federal Office for Information Security (BSI) in October 2017, also raises the risk analysis to a new level. To support this methodology there is the proven Baseline protection add-on in a completely revised version. The add-on was not only revised in terms of content, but above all it was technically modernized. Like the well-proven Baseline protection add-on, the new Baseline protection 2 supports you in setting up an Information Security Management System (ISMS).
Core functions
Baseline protection contains the terms Availabilty, Integrity, Confidentiality, Authenticity. The Baseline protection 2 add-on supports you in implementing the BSI IT “Grundschutz” methodology 200-X. Unique is the combining of the processes of risk management with those of the IT asset management in the same tool. Due to the integration in the i-doit CMDB, the maintenance of the foundation data is a one-time exercise and the processes can merge. The add-on integrates natively into i-doit and supports all CMDB core functions such as authorization management, templates, reporting, API and many other convenient functions for data maintenance.
The IT “Grundschutz” Compendium Edition 2018 issued by BSI will be fully imported. This allows you to perform state-of-the-art analysis and assessment of your IT environment. Additional wizards simplify data entry by combining several procedure steps. Information on protection requirements, security analyzes and mitigation measures are documented. Clear summaries and reports inform about where there is sufficient security already and where there is room for improvement. The reference documents required for the audit by BSI are created based on this documentation and are available in different formats. Existing customers of the Baseline protection 1.0 add-on can also use the Baseline protection 2 Add-on.
Application scenarios
- Analysis of Availability, Integrity, Confidentiality and Authenticity of IT and the processes according to IT “Grundschutz” 200-X.
- Establishment of an Information Security Management System (ISMS)
- Building the basis for the certification according to BSI or ISO27001
Who do we recommend this add-on for?
Organizations that have to carry out IT Risk Management according to BSI IT “Grundschutz” 200-X and who want to combine this with existing data of the CMDB and the necessary maintenance processes.
Use cases
i-doit use cases for your documentation needs

You document active and passive network elements including cabling, port assignment, IP addresses and configurations centrally and comprehensibly.

You record and analyze software and licenses, monitor runtimes, users and authorizations and avoid license violations and unnecessary costs.

You analyze your IT infrastructure, identify documentation gaps and create location, user or cost centre-related reports and audit PDFs.

You document and manage contracts centrally, link them to objects and responsible parties and are automatically informed about deadlines and terms.

They document maintenance and lifecycles, make changes traceable, automate processes and keep track of responsibilities and warranty periods.

You document locations, rooms and infrastructure, link these to contact persons and also visualize server rooms clearly.
More Add-ons
Expand i-doit to include DSGVO-relevant areas. The master data remains, the extended rights system ensures security.
i-doit
Free
From the hardware handover certificate to the disaster recovery plan. Create appealing documents - also as PDF - with daily updated data from your CMDB - automatically!
i-doit
Paid
Build an information security management system with risk analysis and management according to ISO 27001.
i-doit
Paid
Record and control authorizations between business departments and IT. Authorizations can be linked to business applications via LDAP/LDAPs.
i-doit
Free
Get your personalized quote today!
Discover how the i-doit Add-on VIVA2 can support and streamline your processes. Get in touch with us for more information, pricing details, or to request a quote.

Telefon: +49 (0) 211 - 699 31 0


