Information and information processing systems are particularly exposed to many risks today. In addition to technical failures, organizational deficiencies, human errors or acts of God represent risks for information security in companies. Industry-specific security standards (B3S) and legal regulations (e.g. IT security law, EU GDPR) help to protect sensitive data and Information is an important and ongoing task that must be carried out responsibly.
Our software solution R2C_SECURITY organizes and documents your information security management professionally. In addition, our software solution supports you with certifications, for example according to ISO 27001 and BSI-IT-Grundschutz, as well as with the implementation of the EU General Data Protection Regulation
Our software solution R2C_SECURITY maps two security-relevant approaches in one integrated solution. With the module information security (information security management system, short: ISMS) you can organize and document your information security management professionally; the data protection module (data protection management system, in short: DSMS) supports you in the implementation of the EU General Data Protection Regulation.
We give you the choice: start with the implementation of an information security management system (ISMS) or with the implementation of the requirements of the EU General Data Protection Regulation or use only one of the two modules.
We would be happy to advise you on all aspects of information security and data protection.
In a personal conversation, we discuss which solution suits you perfectly. You also have the opportunity to view our software solution in a free webinar.
Our software solution covers all core areas related to ISMS and data protection. For example, it supports:
- Meaningful dashboards and reports
- Revision-proof documentation and historization
- Open system (e.g. ISO 27001, 27005, 27019, IT-Grundschutz, B3S)
- Multilingualism (German, English & French)
- SOA assistant
- Import / export assistant
- Modern, intuitive operating concept
The role-based authorization concept allows you to assign user roles and responsibilities to control access to the application and use of the system in detail.
In addition, R2C_SECURITY is characterized by a high degree of scalability, which enables adaptation to different maturity levels of the company's internal ISMS.
R2C_SECURITY can be perfectly adapted to your requirements: industry-specific content or standards-based catalogs of measures can be supplied individually.
- Simple integration into the existing IT landscape
- Intuitive, modern and web-based operating concept
- Adaptation / extension of the software to company-specific requirements
- Open standard system, supporting you for certifications (e.g. ISO 27001 or BSI-IT baseline protection)
- Meaningful reports
- Optimum process support
- Software made in Germany
- Choice of scalability for users
- Documentation of data protection according to EU-GDPR
- Intelligent rights and roles concepts
- Revision-secure documentation
- Point values for effective assessments of protection requirements and critical areas
- Extensive options for the import and export of catalogues, inventory databases etc.
- Auditor-appropriate depiction of external and internal audits
- Quick and effective self-checks
Yes, the requirements from ISO 27001 can be mapped using the software. R2C_SECURITY is a system that is open to standards, so that other norms and standards (e.g. ISO 27000 series of standards, IT baseline protection catalog, IT security catalog, B3S, and much more) can be provided and integrated.
Yes, all threats and measures from the BSI-IT baseline protection catalog can be provided in R2C_SECURITY.
- Core module 1: Information security (Information Security Management System - ISMS):
For the introduction, operation and maintenance of an ISMS.
- Core module 2: Data protection (data protection management system DSMS)
Documentation and implementation of the requirements of the EU General Data Protection Regulation (GDPR).
- Module 3: ICS (internal control system)
Our module for the company-wide operation of an internal control system. The ICS is based on the core modules (ISMS and DSMS) mentioned above.
Customer-specific enhancements can be made in Customizing with your R2C consultant. All objects in R2C_SECURITY can be expanded with additional fields such as text fields, dropdown lists, check boxes, views and much more.
The application has a comprehensive authorization concept. Roles and rights can be assigned to the users. A variety of standard roles are available for legalization.
You can request a free webinar using our contact form. Our sales staff will present our software solution to you in a personal meeting without obligation, so that you can convince yourself of the performance of R2C_SECURITY. We will then be happy to provide you with access to our demo system, in which you can test R2C_SECURITY extensively.
Employees who are responsible for measures and / or controls can alternatively carry out their tasks in the software using Microsoft Outlook integration. In this case, a task is created for the responsible employee in Outlook, which he can edit and do there. The information from the Outlook task is transferred to the application using a standardized interface. In this way, employees can be involved in the ISMS process without having to work in the software.
As a Schleupen customer, you will be informed about an update / patch in good time and an individual appointment will be arranged with you.
We offer our application R2C_SECURITY not only on premises, i.e. installed in your system, but also in the cloud. Our GRC cloud is always online, always available and fully scalable. This way you can use the full functionality of the R2C solutions with little effort. Safety has top priority. This is also why all data is hosted in a German data center: ISO 27001 certified.
We take care of maintenance and support for you and guarantee you high data security and reliable system availability.