Software solutions & data protection R2C_SECURITY

Software solutions & data protection R2C_SECURITY

Information security and data protection transparently and manage them efficiently

Information and information processing systems are particularly exposed to many risks today. In addition to technical failures, organizational deficiencies, human errors or acts of God represent risks for information security in companies. Industry-specific security standards (B3S) and legal regulations (e.g. IT security law, EU GDPR) help to protect sensitive data and Information is an important and ongoing task that must be carried out responsibly.

Our software solution R2C_SECURITY organizes and documents your information security management professionally. In addition, our software solution supports you with certifications, for example according to ISO 27001 and BSI-IT-Grundschutz, as well as with the implementation of the EU General Data Protection Regulation

Services provided by the R2C_SECURITY software solution

Our software solution R2C_SECURITY maps two security-relevant approaches in one integrated solution. With the module information security (information security management system, short: ISMS) you can organize and document your information security management professionally; the data protection module (data protection management system, in short: DSMS) supports you in the implementation of the EU General Data Protection Regulation.

We give you the choice: start with the implementation of an information security management system (ISMS) or with the implementation of the requirements of the EU General Data Protection Regulation or use only one of the two modules.

R2C_SECURITY module 1: information securityModule 1: information security
R2C_SECURITY module 1: data protectionModule 2: data protection

Services of the software solution R2C_SECURITY

Our software solution covers all core areas related to ISMS and data protection. For example, it supports:

  • Meaningful dashboards and reports
  • Revision-proof documentation and historization
  • Open system (e.g. ISO 27001, 27005, 27019, IT-Grundschutz, B3S)
  • Multilingualism (German, English & French)
  • SOA assistant
  • Import / export assistant
  • Modern, intuitive operating concept

The role-based authorization concept allows you to assign user roles and responsibilities to control access to the application and use of the system in detail.

In addition, R2C_SECURITY is characterized by a high degree of scalability, which enables adaptation to different maturity levels of the company's internal ISMS.

This is what the R2C_SECURITY solution offers you

R2C_SECURITY can be perfectly adapted to your requirements: industry-specific content or standards-based catalogs of measures can be supplied individually.

  • Simple integration into the existing IT landscape
  • Intuitive, modern and web-based operating concept
  • Adaptation / extension of the software to company-specific requirements
  • Open standard system, supporting you for certifications (e.g. ISO 27001 or BSI-IT baseline protection)
  • Meaningful reports
  • Optimum process support
  • Software made in Germany
  • Choice of scalability for users
  • Documentation of data protection according to EU-GDPR
  • Intelligent rights and roles concepts
  • Revision-secure documentation
  • Point values for effective assessments of protection requirements  and critical areas
  • Extensive options for the import and export of catalogues, inventory databases etc.
  • Auditor-appropriate depiction of external and internal audits
  • Quick and effective self-checks

Write us

* Required fields

Frequently asked questions (FAQ)

Here you will find answers to questions that we are asked again and again. Do you have any further questions? Then just get in touch with us! We're here to help.


Yes, the requirements from ISO 27001 can be mapped using the software. R2C_SECURITY is a system that is open to standards, so that other norms and standards (e.g. ISO 27000 series of standards, IT baseline protection catalog, IT security catalog, B3S, and much more) can be provided and integrated.

Yes, all threats and measures from the BSI-IT baseline protection catalog can be provided in R2C_SECURITY.

  • Core module 1: Information security (Information Security Management System - ISMS):
    For the introduction, operation and maintenance of an ISMS.
  • Core module 2: Data protection (data protection management system DSMS)
    Documentation and implementation of the requirements of the EU General Data Protection Regulation (GDPR).
  • Module 3: ICS (internal control system)
    Our module for the company-wide operation of an internal control system. The ICS is based on the core modules (ISMS and DSMS) mentioned above.

Customer-specific enhancements can be made in Customizing with your R2C consultant. All objects in R2C_SECURITY can be expanded with additional fields such as text fields, dropdown lists, check boxes, views and much more.

The application has a comprehensive authorization concept. Roles and rights can be assigned to the users. A variety of standard roles are available for legalization.

You can request a free webinar using our contact form. Our sales staff will present our software solution to you in a personal meeting without obligation, so that you can convince yourself of the performance of R2C_SECURITY. We will then be happy to provide you with access to our demo system, in which you can test R2C_SECURITY extensively.

Employees who are responsible for measures and / or controls can alternatively carry out their tasks in the software using Microsoft Outlook integration. In this case, a task is created for the responsible employee in Outlook, which he can edit and do there. The information from the Outlook task is transferred to the application using a standardized interface. In this way, employees can be involved in the ISMS process without having to work in the software.

As a Schleupen customer, you will be informed about an update / patch in good time and an individual appointment will be arranged with you.

We offer our application R2C_SECURITY not only on premises, i.e. installed in your system, but also in the cloud. Our GRC cloud is always online, always available and fully scalable. This way you can use the full functionality of the R2C solutions with little effort. Safety has top priority. This is also why all data is hosted in a German data center: ISO 27001 certified.

We take care of maintenance and support for you and guarantee you high data security and reliable system availability.