Key Features

Dashboard & Reporting
All information security risks are presented in an intuitive and meaningful way

My Task
all your task lists, assignments, deadlines and many others are populated in a central location so that you will never miss a task again

Auto-Populated Risk Intelligence
Potential information security events and controls are automatically proposed for each asset

Role-Based Access
Security is ensured by controlling access by roles such as Manager, Asset Owner, Risk Owner, and Risk Treatment Owner so that they will be able to manage their assigned tasks

Asset Management
Identify and manage all your information asset and edit them with ease

Risk Assessment
Manage all the risks to your information assets with easy-to-use interface such as risk register and risk treatment plan, and edit them with ease

Security Control Measurement
Implemented controls can be measured and monitored to achieve your security targets and ROI.

Statement of Applicability
Comprehensive reporting, including an “easy to work with” Statement of Applicability (SoA) and Risk Treatment Plan (RTP) reports for internal use and auditor

Email Notifications
Users will be informed of their required action via email by their peers

ISO/IEC 27001 Compliance
Meet international standard and requirements for valid, comparable and consistent results
Contact Us
CYBER INTELLIGENCE SDN BHD
C - 1 02A Coplace 2,
2260 Jalan Usahawan 1,
63000 Cyberjaya,
Selangor, Malaysia.
Phone: +603 - 8322 - 4622
Email: contactus@cyberintelligence.my
GET IN TOUCH