ESM - Your Digital Information Security Management System

Innovate develops ESM - Enterprise Security Modeller, an IT-system that simplifies and streamlines work within information security and risk identification:

  • Visual support for identifying all your information and how to protect it

  • Use the framework of your choice to control Information Security and Compliance

  • Supporting Risk Identification using a simplified workflow

  • Work with Data Protection by design and efficient treatment register, GDPR article 30

  • Collaborative work with Information Security and IT-architecture - get more specialists involved!

ISO/IEC 27000 support in association with Swedish Institute for Standards.

ESM - Who Should Use It?

Financial Institutions

  • "State once, measure many" - measure compliance with many regulative requirements efficiently.

  • Import own standards and get compliance reports with ease.

  • Maintain your Information Security Architecture in a dynamic and highly regulated environment

  • Integration of FFFS2014:1, :4 and :5 from Swedish Financial Supervisory, PCI-DSS, ISO/IEC27001, ISO27002

  • Integrated support for Dynamic register for GDPR, Article 30

  • Support for Data Protection by Design and Default 

Information Security Professionals

  • Maintain a repository of relevant standards and frameworks relevant for your business.

  • Get a dynamic and easy-to-work with Statement of Applicability for each standard.

  • "State-once, measure many", compliance measurement have never been more easy.

  • Maintain an Information Security Architecture with administrative and technical security controls.

  • Integrated support for several ISO-standards, e.g. ISO/IEC27001, ISO/IEC27002, ISO/IEC27005, ISO/IEC27031, ISO/IEC27701 and more.

  • Maintain an Internal Control program to manage required Internal Audit of Compliance and Control.

  • Get Compliance reports of regulative requirements, security architecture and more. 

Business Continuity Experts

  • Maintain a dynamic register for critical processes and get support for a visual Business Impact Analysis.

  • Define controls for maintaining Business Criticality.

  • Business Applications and Suppliers inherit classification from Processes.

  • Maintain an Internal Audit program for reviewing and testing ICT readiness for Business Continuity

  • Create a dynamic report of all Business Critical processes and connected Business Applications and Suppliers. 

Data Privacy Experts

  • Maintain a dynamic registry of treatment of Personal Identifiable Information.

  • Keep track of what databases and Business Applications your PII is stored and processed in

  • Define security controls for different types of information objects, thus supporting Data Protection by Design and by default.

  • Get an updated and dynamic report of treatments according to GDPR Article 30. 

Municipals and Public Administration

  • Maintain an overview of Processes, IT-architecture and Suppliers.

  • Keep track of treatments of Personal Identifiable Information

  • "State once, measure many" - import different laws and regulations and keep track of Compliance efficiently.

  • Maintain an Information Security Architecture and get compliance reports. 

ESM - How Should I Start?

Read more and sign up for your free trial here.

  1. Identify your most valuable information assets

  2. Document your critical business processes

  3. Model your critical IT-systems

  4. Connect your information to processes and systems, and get simple visual support on how to improve your information security

  • LinkedIn Social Icon
  • Facebook Social Icon
  • Twitter Social Icon
Stockholm Sweden
+46 (0)8-520 277 95‬
© 2020 Innovate Security Sweden AB