Information and information processing systems are exposed to many risks, especially today. In addition to technical failure, organizational deficiencies, human errors or force majeure also pose risks to information security in companies. Industry-specific security standards (B3S) and legal regulations (e.g. IT Security Act, EU GDPR) help ensure that the security and protection of sensitive, personal data and information is an important and ongoing task that must be carried out responsibly.
R2C_SECURITY organizes and documents your information security management professionally. In addition, our software solution supports you holistically in the management of data protection and helps with certifications, for example in conformity with ISO 27001, as well as with the implementation of the EU General Data Protection Regulation (EU GDPR).
Our software solution R2C_SECURITY maps two security-relevant approaches in one integrated solution. With the information security management system, in short: ISMS, you can professionally organize and document your information security management; the data protection management system, in short: DSMS supports you in the implementation of the EU General Data Protection Regulation.
We leave the choice to you: Start with the implementation of an information security management system (ISMS) or with the implementation of the requirements of the EU General Data Protection Regulation.
R2C_SECURITY: The features at a glance:
We would be happy to advise you on all aspects of information security and data protection.
In a personal conversation, we discuss which solution suits you perfectly. You also have the opportunity to view our software solution in a free webinar.
Our software solution covers all core areas related to ISMS and data protection. It supports you, for example, through:
- Meaningful dashboards and reports
- Simple integration and maintenance of norms and standards, e.g. ISO 27001, ISO 27005, ISO 27019, ISO 27701, IT Baseline Protection, B3S, IT security catalogue
- Mapping of internal audits and self-assessments with free management of requirements through to comprehensive documentation and handling of findings
- Protection target-related IT risk management
- Protection requirements and criticality assessments for business processes and assets
- Planning, management and control of all measures
- Internal control system (ICS)
- Recording and reporting of incidents in the area of information security and data protection
- Documentation of data protection according to EU GDPR
- Audit-proof data storage and historization
- Simple upload of documents using drag & drop
- Extensive options for data import and export
- Role-based authorization concept based on the need-to-know principle
- Multilingualism (German, English & French)
- Modern, intuitive operating
In addition, R2C_SECURITY is characterized by a high level of scalability, which enables adaptation to different maturity levels of the company's internal ISMS.
R2C_SECURITY can be perfectly adapted to your requirements: Industry-specific content, standards or standardized catalogues of measures can be supplied individually.
- Intuitive, modern and web-based operating concept
- Easy integration into the existing IT landscape
- ADFS connection for cross-company and cross-network single sign-on (SSO)
- Multilingual user interface
- Flexible adaptation / expansion of the software to the specific requirements of the company
- Meaningful dashboards and reports
- Optimal process support
- Audit-proof through journalization and historization function
- Extensive import and export options, e.g. from catalogues and inventory database
- Open-standard system that supports certification (e.g. ISO 27001)
- Software made in Germany
- Integrated management system for information security and data protection
- Documentation of data protection in accordance with EU GDPR
- High acceptance of the software thanks to a simple and modern operating concept
- Low implementation effort due to high standardization
- Role-based authorization concept (need-to-know principle)
- Audit-proof documentation
- Customer support with in-house employees
- Continuous improvement and further development based on best practice approaches
- Auditor-friendly mapping of external and internal audits
- Point values for the effective assessment of protection needs and criticalities
Yes, the requirements from ISO 27001 can be mapped using the software. R2C_SECURITY is a system that is open to standards, so that other norms and standards (e.g. ISO 27000 series of standards, IT baseline protection catalog, IT security catalog, B3S, and much more) can be provided and integrated.
Yes, all threats and measures from the BSI-IT baseline protection catalog can be provided in R2C_SECURITY.
- Core module 1: Information security (Information Security Management System - ISMS):
For the introduction, operation and maintenance of an ISMS.
- Core module 2: Data protection (data protection management system DSMS)
Documentation and implementation of the requirements of the EU General Data Protection Regulation (GDPR).
- Module 3: ICS (internal control system)
Our module for the company-wide operation of an internal control system. The ICS is based on the core modules (ISMS and DSMS) mentioned above.
Customer-specific enhancements can be made in Customizing with your R2C consultant. All objects in R2C_SECURITY can be expanded with additional fields such as text fields, dropdown lists, check boxes, views and much more.
The application has a comprehensive authorization concept. Roles and rights can be assigned to the users. A variety of standard roles are available for legalization.
You can request a free webinar using our contact form. Our sales staff will present our software solution to you in a personal meeting without obligation, so that you can convince yourself of the performance of R2C_SECURITY. We will then be happy to provide you with access to our demo system, in which you can test R2C_SECURITY extensively.
Employees who are responsible for measures and / or controls can alternatively carry out their tasks in the software using Microsoft Outlook integration. In this case, a task is created for the responsible employee in Outlook, which he can edit and do there. The information from the Outlook task is transferred to the application using a standardized interface. In this way, employees can be involved in the ISMS process without having to work in the software.
As a Schleupen customer, you will be informed about an update / patch in good time and an individual appointment will be arranged with you.
We offer our application R2C_SECURITY not only on premises, i.e. installed in your system, but also in the cloud. Our GRC cloud is always online, always available and fully scalable. This way you can use the full functionality of the R2C solutions with little effort. Safety has top priority. This is also why all data is hosted in a German data center: ISO 27001 certified.
We take care of maintenance and support for you and guarantee you high data security and reliable system availability.