Cetbix ISMS Description

You can achieve ISO 27001, NIST, GDPR, NFC, PCI-DSS, HIPAA, FERPA and more in three steps. Cetbix® ISMS empowers your certification. An integrated, comprehensive, document-driven and paperless information security management system. Other features include IT/OT/Employees asset management, document management, risk assessment and management, scada inventory, financial risk, software distribution automation, Cyber Threat Intelligence Maturity Assessment and others. More than 190 organizations worldwide rely on Cetbix® ISMS to efficiently manage information security and ensure ongoing compliance with the Data Protection Regulation and other regulations.

Pricing

Pricing Information:
Prices are based on your needs.
Free Trial:
Yes

Integrations

API:
Yes, Cetbix ISMS has an API

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Cetbix
Year Founded:
2019
Headquarters:
United Kingdom
Website:
www.cetbix.com/products/cetbixismssoftware
Update This Listing
Recommended Products
Idea Management Software | Codigital Icon
Idea Management Software | Codigital

The most powerful and engaging way for groups to generate, prioritize and refine ideas.

Codigital is a cloud-based technology for harnessing the collective intelligence of groups in real time. Participants generate, prioritize and refine ideas until the best co-created insights and solutions emerge.

Product Details

Platforms
SaaS
Type of Training
Documentation
Live Online
Webinars
In Person
Videos
Customer Support
Phone Support
24/7 Live Support
Online

Cetbix ISMS Features and Options

Integrated Risk Management Software

Audit Management
Compliance Management
Dashboard
Disaster Recovery
IT Risk Management
Incident Management
Operational Risk Management
Risk Assessment
Safety Management
Vendor Management

GDPR Compliance Software

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting