Skip to main content Skip to footer
Spe­cial­ist solu­tion | com­pli­ance SUITE

ISMS soft­ware
from otris

Manage risks
Comply with con­trols
Prepare for cer­ti­fic­a­tions
Request a demo
Request a demo
Skip ref­er­ence clients

ISMS tool for struc­tured gov­ernance and trace­able evid­ence

Are you looking for ISMS soft­ware that allows you to im­ple­ment re­quire­ments such as ISO 27001, BSI basic pro­tec­tion or NIS-2 in a struc­tured manner? otris isms helps you to con­sist­ently manage re­spons­ib­il­it­ies, spe­cific­a­tions and evid­ence – so that in­form­a­tion se­cur­ity remains ef­fect­ive in every­day life.

In the system: In­vent­ory assets, link reg­u­lat­ory doc­u­ments, and control and doc­u­ment ISMS activ­it­ies.

In every­day life: Rate risks, manage meas­ures and in­cid­ents, and keep the status trace­able at all times.

For audits: Provide struc­tured evid­ence, prepare for audits and provide tar­geted support for cer­ti­fic­a­tions.

Skip gallery

otris isms

You can cent­rally manage spe­cific­a­tions, assets, risks, in­cid­ents and meas­ures, and doc­u­ment everything in a trace­able manner – for eval­u­ations, audits and cer­ti­fic­a­tions.

Our ISMS soft­ware at a glance

otris isms creates trans­par­ency in in­form­a­tion se­cur­ity. The in­tro­duc­tion is de­signed to be prac­tic­al – so that you can build your ISMS in a struc­tured manner and then develop it step by step. With otris isms, you can es­tab­lish and control company-wide ISMS pro­cesses, manage im­port­ant assets, eval­u­ate risks, doc­u­ment in­cid­ents and meas­ures, and create clear eval­u­ations (e.g. SoA). In­tu­it­ive op­er­a­tion, clear struc­tures, in­di­vidu­al work­flows and auto­mated pro­cesses fa­cil­it­ate the daily work of your in­tern­al and ex­tern­al ISMS data con­trol­lers.

Central plat­form

You can con­sol­id­ate all in­form­a­tion, pro­cesses and con­trols on a single plat­form – a key ad­vant­age of a web-based ISMS. Thanks to its central data­base, otris isms ensures that all parties in­volved have access to the latest in­form­a­tion. This means that re­spons­ible em­ploy­ees are always able to provide in­form­a­tion.

Doc­u­ment control

otris isms fea­tures in­teg­rated doc­u­ment control for guidelines, con­cepts and evid­ence. Doc­u­ments are created, ver­sioned, ap­proved and dis­trib­uted in a tar­geted manner. Mon­it­or­ing func­tions doc­u­ment ac­know­ledge­ment and high­light the need for action at an early stage.

Asset man­age­ment

With otris isms, you can record your assets in a struc­tured manner – in­clud­ing net­work­ing, pro­tec­tion re­quire­ments and in­di­vidu­al at­trib­utes. The system iden­ti­fies crit­ic­al assets based on a pro­tec­tion re­quire­ments ana­lys­is. During mod­el­ling, you link assets to spe­cific­a­tions so that the system can auto­mat­ic­ally derive risks and meas­ures.

In­cid­ent man­age­ment

Se­cur­ity in­cid­ents are re­cor­ded, doc­u­mented and cent­rally managed in a struc­tured manner within the system. otris ISMS sup­ports clear work­flows for re­port­ing, Rating, hand­ling and track­ing in­cid­ents. Re­spons­ib­il­it­ies are clearly as­signed, and re­port­ing ob­lig­a­tions to ex­tern­al au­thor­it­ies are sim­pli­fied.

Risk man­age­ment

otris isms in­teg­rates an es­tab­lished risk man­age­ment system that sup­ports the hazard rating. The prob­ab­il­ity of oc­cur­rence and po­ten­tial damage are as­sessed in a com­pre­hens­ible manner. Based on this, ap­pro­pri­ate pro­tect­ive meas­ures can be derived and doc­u­mented.

Audit man­age­ment

The audit func­tion auto­mat­ic­ally doc­u­ments find­ings and con­verts them into meas­ures for rem­edy­ing weak­nesses. It also enables in­di­vidu­al check­lists to be sent out with system support. Re­sponses are pos­sible even without system access, and results are eval­u­ated auto­mat­ic­ally.

Task man­age­ment

Task man­age­ment is the central task and control man­age­ment system, in­clud­ing mon­it­or­ing func­tions. Tasks and con­trols are de­livered cent­rally via the em­ploy­ee cockpit. Pro­cessing can be mon­itored by data con­trol­lers and doc­u­mented in a trace­able manner.

Content pack­ages and multi-stand­ard cap­ab­il­ity

The ISMS tool sup­ports your company with content pack­ages for cer­ti­fic­a­tion ac­cord­ing to current stand­ards. It in­cludes cata­logues for ISO/IEC 27001 and the BSI’s IT Baseline Pro­tec­tion Com­pen­di­um. Ad­di­tion­al content pack­ages (VDA-ISA, B3S, CISIS12®) can be in­teg­rated ac­cord­ing to your re­quire­ments.

Cus­tom­is­able

otris isms sim­pli­fies new and re­cer­ti­fic­a­tions. The soft­ware is multi-client and group-com­pat­ible and can be in­di­vidu­ally adapted to your re­quire­ments. We in­teg­rate in­dustry-spe­cif­ic content, your own per­form­ance in­dic­at­ors and pro­cessing and eval­u­ation pro­ced­ures into the solu­tion as re­quired.

„The ISMS soft­ware from otris was a great help in pre­par­ing for our cer­ti­fic­a­tion.“

Project manager for IT se­cur­ity cer­ti­fic­a­tion at the Prinz Mayweg Group

Why you should choose otris as your
ISMS soft­ware pro­vider

Whether you are pro­tect­ing in­form­a­tion assets, com­ply­ing with NIS-2 or seeking cer­ti­fic­a­tion: otris isms sup­ports you in setting up, op­er­at­ing and con­tinu­ously de­vel­op­ing your ISMS – based on es­tab­lished re­quire­ments. This allows you to es­tab­lish in­form­a­tion se­cur­ity as a prac­tic­al com­pon­ent of your gov­ernance.

Group and client cap­ab­il­ity. Re­li­ably map struc­tures.

Whether you are an ex­tern­al se­cur­ity con­sult­ant serving mul­tiple clients, working in a company or public au­thor­ity, or man­aging the in­form­a­tion se­cur­ity of a cor­por­a­tion as part of a team, otris isms adapts to your re­quire­ments. The soft­ware is multi-client capable and suit­able for mapping mul­tiple or­gan­isa­tion­al units and in­form­a­tion net­works. This means that your ISMS remains con­sist­ently con­trol­lable even as your struc­tures grow.

Role and access concept. Control ex­tern­al in­teg­ra­tion.

A dif­fer­en­ti­ated access concept allows you to define roles and rights – de­pend­ing on re­quire­ments for groups or in­di­vidu­al ISMS data con­trol­lers. Browser-based access to the central system pro­motes col­lab­or­a­tion and ensures a uniform level of in­form­a­tion. You can direct in­form­a­tion pro­cesses – such as the editing or pub­lic­a­tion of guidelines – to spe­cif­ic user groups. Check­lists can be edited ex­tern­ally: as an en­cryp­ted HTML ques­tion­naire that is auto­mat­ic­ally pro­cessed in the system after it has been answered.

Range of func­tions. Flex­ibly expand stand­ard soft­ware.

There are three soft­ware edi­tions to choose from, al­low­ing you to tailor the range of func­tions to your needs. Stand­ard­ised ex­ten­sions and sup­ple­ment­ary modules enable you to expand the system flex­ibly. If you have ad­di­tion­al re­quire­ments, otris can im­ple­ment a cus­tom­ised solu­tion tailored to your needs. Ex­ist­ing systems can be con­nec­ted via bi­d­irec­tion­al REST in­ter­faces, for example.

Eval­u­ations. Dif­fer­en­ti­ated and mean­ing­ful.

All logged pro­cesses and doc­u­mented in­form­a­tion can be eval­u­ated flex­ibly. The in­de­pend­ently con­fig­ur­able dash­boards provide a quick over­view of all es­sen­tial ISMS pro­cesses and lead dir­ectly to clearly presen­ted de­tailed in­form­a­tion. Sup­ple­ment­ary report queries are avail­able for both the entire ISMS (e.g. SoA) and at object level and can be gen­er­ated as reports (e.g. Excel, PDF).

On-premises or cloud. Choose your op­er­at­ing mode freely.

You are free to choose whether you want to use the ISMS soft­ware in the cloud or on-premises. On-premises means that the system is op­er­ated on your company’s own IT in­fra­struc­ture. With the cloud version, you access the servers of a secure, cer­ti­fied data centre (loc­a­tion: Germany). In both cases, you use a web browser to work with the soft­ware.

ISMS for cor­por­a­tions

When using otris isms in cor­por­ate struc­tures, scalab­il­ity and clear re­spons­ib­il­it­ies are par­tic­u­larly im­port­ant. The solu­tion sup­ports the mapping of mul­tiple or­gan­isa­tion­al units and in­form­a­tion net­works and enables a dif­fer­en­ti­ated role and access concept for teams, de­part­ments and data con­trol­lers. You can also choose the ap­pro­pri­ate op­er­at­ing model – cloud or on-premises – in line with your IT strategy. Stand­ard­ised in­ter­faces fa­cil­it­ate in­teg­ra­tion into ex­ist­ing pro­cesses and systems, while dash­boards and reports provide struc­tured evid­ence for man­age­ment, audits and su­per­vi­sion. Col­lab­or­a­tion with ex­tern­al parties can also be con­trolled, e.g. via struc­tured, ed­it­able check­lists.

„We are very sat­is­fied with otris – both with the system and with the advice.“

Frank Gund­lach
Spe­cial­ist for data pro­tec­tion and in­form­a­tion se­cur­ity, , Gen­os­senschafts­verb­and Bayern e.V.

Which version of the ISMS tool suits your re­quire­ments?

To offer you a solu­tion that suits your re­quire­ments, there are three edi­tions and func­tion­al ex­ten­sions to choose from.

STAND­ARD

Man­age­ment of assets, risks and meas­ures based on common cata­logues and stand­ards (e.g. ISO 27001). Pro­tec­tion needs ana­lys­is. SoA. Man­age­ment of IT se­cur­ity in­cid­ents.

  • Quick to get started
  • No IT re­source com­mit­ment
  • No high initial in­vest­ment
Betrieb: SaaS
from
€ 490 / Monat

otris soft­ware AG will use all in­form­a­tion provided here ex­clus­ively in ac­cord­ance with the privacy policy.

EN­TER­PRISE

Ex­ten­ded range of func­tions for larger or­gan­isa­tions and cor­por­a­tions. Ad­apt­able to company-spe­cif­ic re­quire­ments and pro­cesses. Stand­ard­ised in­ter­faces.

In ad­di­tion to STAND­ARD

  • Azure AD con­nec­tion
  • Con­fig­ur­a­tion of ex­ist­ing folders
Betrieb: SaaS oder On-Premises
from
€ 990 / Monat

otris soft­ware AG will use all in­form­a­tion provided here ex­clus­ively in ac­cord­ance with the privacy policy.

EN­TER­PRISE plus

Maximum func­tion­al­ity for in­teg­ra­tion into busi­ness pro­cesses. Cus­tom­is­able to meet company-spe­cif­ic re­quire­ments and in­ter­faces.

In ad­di­tion to EN­TER­PRISE

  • In­teg­ra­tion of cus­tom­er-spe­cif­ic in­ter­faces
  • Con­fig­ur­a­tion of work­flows
  • Ad­di­tion of further map types
Betrieb: SaaS oder On-Premises
auf Anfrage
/ Month

otris soft­ware AG will use all in­form­a­tion provided here ex­clus­ively in ac­cord­ance with the privacy policy.

Com­pli­ance soft­ware for spe­cif­ic re­quire­ments

Re­quire­ments in com­pli­ance, data pro­tec­tion and in­form­a­tion se­cur­ity vary sig­ni­fic­antly de­pend­ing on the Or­gan­isa­tion – this is evident from feed­back from pro­jects and initial dis­cus­sions. That is why the otris com­pli­ance SUITE can be com­bined as needed and, if ne­ces­sary, sup­ple­men­ted with spe­cial­ist solu­tions from the otris legal SUITE and the otris privacy SUITE. The result is a plat­form that fits into your gov­ernance and grows with your re­spons­ib­il­it­ies.

To the product world

Risk man­age­ment

Manage risks pro­act­ively and
control through­out the company.

To the product world

Policy man­age­ment

Manage guidelines di­git­ally and
legally com­pli­ant.

To the product world

Con­tract man­age­ment

Se­cur­ity and ef­fi­ciency over the entire con­tract life cycle.

How does our ISMS tool work?

otris isms sup­ports or­gan­isa­tions in es­tab­lish­ing a struc­tured ISMS (in­form­a­tion se­cur­ity man­age­ment system), op­er­at­ing it ef­fect­ively and con­tinu­ously de­vel­op­ing it further – based on the re­quire­ments of ISO/IEC 27001:2022 and the BSI IT-Grunds­chutz Com­pen­di­um. The focus is not only on meeting stand­ard re­quire­ments, but also on a prac­tic­al com­bin­a­tion of gov­ernance, Risk man­age­ment, com­pli­ance and op­er­a­tion­al im­ple­ment­a­tion.

ISMS setup. Define context, ob­ject­ives and roles.

With otris isms, you can define the scope of your ISMS as an in­form­a­tion network, analyse and doc­u­ment the or­gan­isa­tion­al and reg­u­lat­ory context, and the res­ult­ing in­form­a­tion se­cur­ity ob­ject­ives, guidelines and roles in con­trolled doc­u­ments. This creates a robust found­a­tion for an ef­fect­ive ISMS – tailored to busi­ness ob­ject­ives and risks.

Tem­plates and cata­logues. Provide spe­cific­a­tions cent­rally.

otris isms cent­rally provides rel­ev­ant stand­ards and spe­cific­a­tions cata­logues (e.g. ISO/IEC 27001, BSI IT-Grunds­chutz) as well as threat and doc­u­ment tem­plates based on them. For the defined in­form­a­tion network, the as­signed spe­cific­a­tions can be rated in terms of ap­plic­ab­il­ity and ef­fect­ive­ness and doc­u­mented in a trace­able manner.

Asset in­vent­ory. Collect and enrich data.

Assets can be re­cor­ded both within otris ISMS and via import tem­plates – in­clud­ing net­work­ing in pre­par­a­tion for the pro­tec­tion needs ana­lys­is. Assets can also be en­riched with cus­tom­er-spe­cif­ic in­form­a­tion.

Pro­tec­tion needs ana­lys­is. Rate and derive pro­tec­tion ob­ject­ives.

otris isms sup­ports various con­fig­ur­able process models for as­sess­ing and in­her­it­ing pro­tec­tion re­quire­ments. Pro­tec­tion ob­ject­ives such as con­fid­en­ti­al­ity, in­teg­rity and avail­ab­il­ity are re­cor­ded and rated in a struc­tured manner. The pro­tec­tion re­quire­ments ana­lys­is results in a list of crit­ic­al assets for further ana­lys­is.

Risk man­age­ment. Address risks and track status.

Risks can be sys­tem­at­ic­ally iden­ti­fied, rated and ad­dressed both across the entire network – based on the threat cata­logue – and at asset level. Risk man­age­ment meas­ures are derived in line with spe­cific­a­tions, re­spons­ib­il­it­ies are clearly as­signed and the im­ple­ment­a­tion status is tracked trans­par­ently. In this way, otris ISMS sup­ports in­formed de­cisions and risk-ori­ented man­age­ment of in­form­a­tion se­cur­ity.

Asset mod­el­ling. Assign spe­cific­a­tions and check com­pli­ance.

As part of asset mod­el­ling, the re­quire­ments to be met are as­signed to the cor­res­pond­ing assets. Com­pli­ance with re­quire­ments is de­term­ined auto­mat­ic­ally, for example, on the basis of binding doc­u­ments as­signed to the asset.

Risk ana­lys­is. Identi­fy de­vi­ations as risks.

Unmet re­quire­ments auto­mat­ic­ally lead to the as­sign­ment of cor­res­pond­ing risks, which are iden­ti­fied and further con­sidered as part of the risk ana­lys­is.

Doc­u­ment control. Publish rules and verify know­ledge.

Doc­u­mented rules linked to spe­cific­a­tions, as well as their veri­fi­able pub­lic­a­tion and dis­tri­bu­tion, are es­sen­tial com­pon­ents of an ISMS. otris isms in­cludes com­pre­hens­ive doc­u­ment control – from ed­it­or­i­al cre­ation and ap­prov­al routines to func­tions for pub­lic­a­tion, tar­geted de­liv­ery and ac­know­ledge­ment mon­it­or­ing.

Audit man­age­ment. Conduct audits and track meas­ures.

Ex­tern­al and in­tern­al audits as well as in­cid­ents are con­sol­id­ated in otris ISMS. The solu­tion sup­ports ques­tion-based audits both in­tern­ally and at sup­pli­ers and service pro­viders. Audit find­ings are sys­tem­at­ic­ally doc­u­mented, meas­ures are derived and tracked until their im­ple­ment­a­tion has been veri­fied.

Re­port­ing. Eval­u­ations for doc­u­ment­a­tion and man­age­ment.

Central eval­u­ations such as SoA, IT baseline pro­tec­tion check, guideline cur­rency, guideline con­firm­a­tion level and task man­age­ment per­form­ance in­dic­at­ors are avail­able to provide veri­fi­able doc­u­ment­a­tion of the es­tab­lished in­form­a­tion se­cur­ity man­age­ment system. This means you can provide in­form­a­tion at any time – to man­age­ment, aud­it­ors and su­per­vis­ory bodies.

FAQs: Fre­quently asked ques­tions about ISMS soft­ware

What is ISMS soft­ware?

ISMS soft­ware helps you to or­gan­ise in­form­a­tion se­cur­ity in a struc­tured manner. It maps central ISMS com­pon­ents such as spe­cific­a­tions, assets, pro­tec­tion needs ana­lys­is, risks, meas­ures, doc­u­ment­a­tion and eval­u­ations in a single system.

What are the ad­vant­ages of ISMS soft­ware?

ISMS soft­ware provides clarity and trace­ab­il­ity in in­form­a­tion se­cur­ity man­age­ment. It sup­ports clear re­spons­ib­il­it­ies, stand­ard­ised pro­cesses and con­sist­ent doc­u­ment­a­tion – so that you can eval­u­ate and doc­u­ment the status of your ISMS topics at any time.

How does otris ISMS support cer­ti­fic­a­tion ac­cord­ing to ISO/IEC 27001?

otris isms sup­ports you in im­ple­ment­ing re­quire­ments, cre­at­ing and man­aging rel­ev­ant doc­u­ments, and pre­par­ing and track­ing audits and meas­ures. This allows you to build up evid­ence in a struc­tured manner and make it avail­able for audits.

How can otris ISMS be in­teg­rated into ex­ist­ing IT in­fra­struc­tures?

otris isms can be in­teg­rated into ex­ist­ing struc­tures and sup­ports con­nec­tion to other systems via in­ter­faces. This allows in­form­a­tion to be used con­sist­ently and pro­cesses in the ISMS to be spe­cific­ally em­bed­ded in your system land­scape.

Try otris’ ISMS soft­ware now!

Greater se­cur­ity, or­gan­isa­tion, clarity and control in in­form­a­tion se­cur­ity: as an ISMS soft­ware pro­vider, we have already sup­por­ted many cus­tom­ers. We look forward to re­ceiv­ing your inquiry for a guided, no-ob­lig­a­tion demo of our ISMS solu­tion. Request your guided demo now!

Get in touch

Online demo | Guided. Live. No ob­lig­a­tion.

otris soft­ware AG will use all in­form­a­tion provided here ex­clus­ively in ac­cord­ance with the privacy policy.

Your contact

Back to navigation Back to content Back to navigation Back to content