The GlobalSuite® – Information Security solution facilitates the automation and management of the ISO 27001 standard to optimize your Information Security System (ISMS). It is the software for the implementation, management and maintenance of Information Security Management Systems based on ISO 27001. The versatility of the Software makes you accomplish the most complex requirements in an affordable and intuitive way
Our software
Discover our ISO 27001 software
Features
Risk Identification
Guidance of services and processes through asset inventory. Configuration of dimensions and valuation levels.
Risk Management
Catalogue of configurable controls and summary of them, management settings, risk reassessment, parameterizable questionnaires.
Risk Analysis
Parameterization of probability and impact, risk assessment, cost analysis, asset threats and configurable.
Risk Assessment
Definition of acceptable risk, acceptable risk levels, risk listing, risk map, simultaneous or dependent risks.
SGSI processes
It allows to manage the proposal of indicators, Differential Analysis, Declaration of Applicability, capacity management, management of changes and acquisitions, etc.
Continuity, Capacity and Training Plans
It allows you to track a history of each plan and assign metrics for tracking.
Integration with Power BI
Make the most of GlobalSuite data® by performing an executive dashboard in a Business Intelligence tool such as Power BI.
Documentary Manager
It allows the control of all the documentation, in different formats, to support the management of the continuity of the company.
Balanced Scorecard
The comprehensive dashboard enables the management and strategic control of the organization through different metrics and indicators.
Does it improve your company's position in the market, secure your business and bring trust to your customers?
ISO 27001 is an international standard that allows companies to certify their Information Security Management System (ISMS). The implementation of the standard in your organization has the following benefits:
- Improved image and relationships with third parties.
- Greater control of the people in your organization.
- Improvement in the record of incidents and weaknesses.
- Improved business continuity management
ISO 27001:2013 for Information Security Management Systems allows organizations to assess the risk and apply the controls necessary to mitigate or eliminate them.
Our function is to prepare your company to implement the SGSI through a team of professionals CISM, CISA, Lead Auditor, etc. who are specialized in the implementation and subsequent certification in ISO 27001.
A properly implemented SGSI improves image and relationships with third parties, gains greater control of people, improves the record of incidents and weaknesses, and also improves business continuity.
Once the risks have been analyzed, planning and implementing security measures will be made to reduce and eliminate them. In this way, all your assets and information systems will operate in a controlled environment.
PLAN—This phase will analyze the company’s activity environment. The information processed by it, the established corporate policies and the legal requirements applicable to each company. During this stage the company will have to design a formal procedure for the continuous identification and assessment of risks and the selection of control objectives, as well as the controls that allow it to manage these risks.
IMPLEMENT (Do): At this stage, the focus will need to be on the development and implementation of an effective medium- and long-term plan that avoids or attenuates potential information security risks. In this phase, the training and information of the company’s staff will also be initiated, so as to ensure the correct implementation of the SGSI.
REVIEW:The implementation of the SGSI requires monitoring and review of the controls and measures implemented. It is therefore essential to carry out both internal and external audits that review the effectiveness and efficiency of the SGSI, and identify the possible threats, vulnerabilities and risks of the system.
ACT—The implementation of an SGSI requires the constant action, maintain and improvement of the SGSI. When the SGSI check detects threats, vulnerabilities and risks, appropriate corrective and preventive measures are necessary to ensure the security and protection of company information at all times. The phases of the project for the implementation and subsequent certification of its SGSI are: Scope Delimitation. Analysis and Risk Management. Declaration of Applicability. Policies and Procedures. Security Director Plan. Business Continuity Plan. Training Plan. Incident Management. Development of the SGSI. Internal Audit. Certification by accredited entity (if applicable). Our function is to prepare your company to implement the system. Once the system is achieved in your company it is your decision whether it is certified or not. This work requires specialists with extensive organizational knowledge, information systems management and current information security technology. Without a doubt, to obtain the certification, the most economical, practical and fast option is to hire a specialized consultancy to carry out this preparation.