Key Features

Dashboard & Reporting

All information security risks are presented in an intuitive and meaningful way

My Task

all your task lists, assignments, deadlines and many others are populated in a central location so that you will never miss a task again

Auto-Populated Risk Intelligence

Potential information security events and controls are automatically proposed for each asset

Role-Based Access

Security is ensured by controlling access by roles such as Manager, Asset Owner, Risk Owner, and Risk Treatment Owner so that they will be able to manage their assigned tasks

Asset Management

Identify and manage all your information asset and edit them with ease

Risk Assessment

Manage all the risks to your information assets with easy-to-use interface such as risk register and risk treatment plan, and edit them with ease

Security Control Measurement

Implemented controls can be measured and monitored to achieve your security targets and ROI.

Statement of Applicability

Comprehensive reporting, including an “easy to work with” Statement of Applicability (SoA) and Risk Treatment Plan (RTP) reports for internal use and auditor

Email Notifications

Users will be informed of their required action via email by their peers

ISO/IEC 27001 Compliance

Meet international standard and requirements for valid, comparable and consistent results

Contact Us

CYBER INTELLIGENCE SDN BHD

C - 1 02A Coplace 2,

2260 Jalan Usahawan 1,

63000 Cyberjaya,

Selangor, Malaysia.

Phone: +603 - 8322 - 4622

Email: contactus@cyberintelligence.my

GET IN TOUCH

Fields marked with an * are required

(optional)

(optional)

Please, let us know the best time to contact you by phone (if provided).

I would like to get new blog posts by email