Ready for ISO 27001

Ready for ISO 27001

Prepare for certification with confidence.
With i-doit and its available add-ons, you get a complete ISMS suite for the highest demands that can be variably adapted to new requirements.

ISO 27001 certfication with i-doit


Successful certification to ISO 27001 requires not only an information security management system but also the recording of assets and the creation of the necessary documentation, documents, security policies and guidelines.

01-screen-asset-management

Documentation of Assets

With over 100 predefined object types, you record every asset in your organization in i-doit. If you need new types of classes, you can configure and roll them out in just a few minutes via the web interface.

02-screen-ip-adress-management

Systems, networks and data centers

The foundation of any ISO 27001 certification is the recording of systems, networks and data centers. In addition, i-doit has IP address management (IPAM), which significantly simplifies the planning of new components and management of existing networks.

03-screen-dokumente

Asset- and system manuals

You gather all the captured information into concepts and system manuals with just a few clicks. You simply export the automatically created documents in PDF format. This way, you always have a copy of your most important documents at hand.

Kreiselement Testemonials - 650x650 – 1

An ISMS can be that simple

Ready for ISO27001 certification with i-doit pro

We guide you LIVE through the i-doit ISMS. In a detailed LIVE demo, our experts will guide you through the system and show you how you can protect your investments with i-doit ISMS.

04-screen-logbuch

Traceability of changes

All changes to existing or newly created assets are recorded in the logbook. By recording the status of each asset and automatically documenting changes, you have complete change and configuration management.

05-dokumente-notfall

Emergency and safety concepts, documents and guidelines

You create security concepts individually for each scope. You link the associated documents and policies directly to the respective locations, devices, and other assets. Restrict access to these documents to individuals and groups of individuals as needed.

06-gap-analyse

Risk und Gap Analysis

Perform the risk analysis and review for each recorded asset directly in the CMDB. Based on the review, you can assign risks from the ISO27001 catalog of measures or the IT-Grundschutz compendium. Use the gap analysis functionality to identify and close gaps in risk management.

07-risikobehandlung

Task Management

You simply assign planned measures to a responsible person. You record the necessary resources and their costs individually for each measure. The prioritization of tasks is part of the standard procedure, as is the classification of the implementation status and the definition of deadlines.

08-risikoberechnung

Risk calculation

For the classification of risks and their calculation, specify the formula to be used. This will be used in the calculation and creation of the risk matrix and applies to all risks considered. Specify different criteria individually, e.g. financial loss or impairment of task performance.

Request your free LIVE demo now

We guide you LIVE through the i-doit ISMS

In a detailed LIVE demo, our experts will guide you through the system and show you how to protect your investments with i-doit ISMS.

Stock placeholder image with laptop screen