ENTERPRISE SECURITY MODELLER
take control over Information Security using a visual model of Information Security Architecture
an effective way to maintain compliance of regulations and frameworks.
support in Asset Based Risk Identification
a visual and effective GDPR-repository and support in Data Protection by Design
a visual and effective support for working with Business Continuity Planning
integrated support for ISO/IEC27000 standards, e.g. ISO/IEC27001, ISO/IEC27002, ISO/IEC27005, ISO/IEC27701
Get busy and start today!
Synchronize your team and let everyone instantly see how they can contribute to making your organization safer by adding read-only users without cost.
*ISO/IEC27000 licenses not included in free trial.
ENTERPRISE SECURITY MODELLER
KNOW AND PROTECT YOUR INFORMATION
ESM - Enterprise Security modeller is a simple visual modelling tool that help you know and protect your valuable assets. ESM will guide you to document precisely what is needed to support your business needs in information security and regulatory compliance.
In ESM you don't get just another modelling tool - you get our built in expert advice on what to modell and how to do it right!
Benefits: visual and simple repository of processes, information, suppliers and IT-systems. Get instant reports of compliance, security requirements and work with your own standards and/or frameworks.
AS SIMPLE AS POSSIBLE - BUT NOT SIMPLER
ESM is designed to be as simple as possible, but not simpler. This will help you spend your time on just the right documentation and modelling that is needed to keep your information safe and comply with regulatory demands such as GDRP.
Benefits: don't lose time with unnecessary details, document important assets and connect them to Information Security Architecture, frameworks and regulations
INTERNATIONAL STANDARDS FOR INFORMATION SECURITY
Working with Information Security is complex, the use of standards will let you use the collective experience of other organisations. ESM has a built-in support for ISO/IEC 27000 letting you efficiently connect Information Classification with the requirements in several standards. This enables a more efficient collaboration on what controls should be implemented where and follow-up the compliance.
ISO/IEC27001 - Information Security Management
ISO/IEC27002 - Information Technology, Security techniques, Code of Practise for security controls
ISO/IEC27005 - Information Technology, Security techniques, Information Security Risk Management
ISO/IEC27018 - Information Technology, Security techniques, Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
ISO/IEC27701 - Information Technology, Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines
ISO support in partnership with Swedish Institute for Standards.
Benefits: Connect requirements and security controls from ISO with your assets and maintain an updated status of compliance. A measurable Information Security Management System.
MAPPING OF GDPR
The easy-to-use, fast en efficient modelling of processes, information and IT-systems let you track information that needs to be compliant with GDPR and where that information is processed and/or stored. ESM offers a visual and simple way of working with the protection and handling of privacy information that will enable collaboration between specialists.
ISO/IEC27018 and ISO/IEC27701 provides support on what security controls should be applied to protect Your personal data. One step closer Data Protection by Design.
Benefit: Keep your repository updated and measurable, get instant reports of where your sensitive data is and how it is processed.
A PLATFORM FOR COLLABORATION
Information security is too important for your company to leave it to specific experts alone. Information Security has to built in into all areas of your business; from business processes, IT-architecture and physical infrastructure. More people need to be involved and collaborate - directly or indirectly - to keep your information safe.
Benefits: A common model, a common view of compliance and the level of protection of sensitive assets.