Provide insight into and manage responsibilities, recordings of processing activities related to departments, processes, assets and third parties.
By means of e-mail notification, you are easily informed of your tasks regarding planning and execution of measure implementations, audit and control tasks, improvement tasks, assessments etc.
System to handle the assessments from the management systems and to select measures to control the risks.
Achieving your goals?Do a quick scan
With the Information Security Management System module, you create a management system that maps out your information security risks (Compliance and/or Risk) in a structured and clear manner. From specific dashboards and reports for certifying bodies to functionality based on Plan-Do-Check-Act are available, including ready to go content such as standards and example measures.
The heart of the management software is based on the PDCA cycle. This integrates the control of all implemented measures and management systems into one complete system. The planning of the measure implementations (Plan), the implementation of solutions (Do), the execution of controls (Check) and the follow-up of improvement actions from checks, internal and external audits (Act).
Middels risk assessments en onderliggende behandeling(en) inclusief bewijslast kunt u aantonen dat uw organisatie adequate organisatorische en technische maatregelen heeft genomen. Met GRCcontrol bouwt u een digitaal dossier op om aan de gestelde normen en wet- en regelgeving te voldoen. U kunt aan certificerende instanties aantonen dat u real-time In Control bent.
With GRCcontrol you anticipate current risks and take appropriate safety measures.
For audit planning including automatic and periodic audits, as well as registration of external audits and registration and handling of improvement tasks.
Comes with various standard reports with the possibility to build your own reports.
For management, specialists and employees, up-to-date insight into your compliance (per organization (part), standard, process, means), risks, incidents and (internal/external) audit findings.
Numerous standards frameworks including best-practice measures mapping, numerous risks/threats set(s) including best-practice measures mapping, examples of questionnaires and registers, reporting and dashboarding.
2-factor authentication on login and encrypted traffic for secure communication and data storage in a certified data centre.
Management system for granting authorisations.
Access control based on individuals and functions including AD linking capabilities.
For recording the execution of successive activities.
For recording and distribution of documentation and burden of proof. Includes expiration dates and e-mail notification.
NL, UK, FR and GE
Access control based on individuals, roles and functions including AD/FD linking capabilities.
Incident management, including registration and handling by means of protocols (work processes) that can be set up entirely according to your own working method.
Many organizations, both national and international, now use our software for privacy, security, governance, risk and compliance management.