preeco | information security
The comprehensive ISMS software for BSI IT-Grundschutz and NIS2. Document your information security management systematically, conduct audits, and manage risks – fully integrated and audit-proof.
and Audit Catalogs
Plan, conduct, and document information security audits in a structured way. Use predefined catalogs based on BSI IT-Grundschutz, CISIS12, and VdA ISA, or create your own questionnaire catalogs.
Audit Catalogs
Predefined and customizable questionnaire catalogs as the foundation for your audits. Structured, reusable, and applicable across multiple tenants.
Audits
Structured execution and audit-proof documentation of information security audits. Hierarchical audit object management with direct asset linking. Graphical progress display, export as PDF or DOCX.
Risk Analyses
Assess risks systematically and document protection requirement analyses, resource assessments, and threat analyses. With graphical risk mapping and automatic versioning.
Risk Analyses
Flexible risk analyses for any scenario – from protection requirement analyses to threat analyses. Free definition of events, assessment of damage severity and probability of occurrence. Automatic versioning of all approved documents.
Security Controls and
Manage policies and technical as well as organizational measures centrally. Link TOMs directly with assets and audits for comprehensive security documentation.
Policies
Central storage and management of all security-relevant policies. Linking with other documents and complete activity log for seamless traceability.
Technical and Organizational Measures
Documentation and versioning of TOMs with automatic revision control. Linking with data processing systems and audits – always audit-ready.
Manage all IT assets and data processing systems centrally. Record responsibilities, provider details, and link assets directly with TOMs, audits, and risk analyses.
Data Processing Systems
Central management of all deployed systems with responsibilities, provider details, and purpose descriptions. Linking with TOMs, audits, and risk analyses. Automatic versioning and export for internal and external audits.
and Qualification
Plan, conduct, and document information security training for your employees. Training participation is automatically tracked and certified.
Training
Conduct online training directly in the software. Learning units with image and video content, multiple-choice exam questions with configurable minimum score.
Training Participation
Recording and verification of all training participation. Overview of the training status of all employees at a glance. Add participants manually or import via XLSX.
Training Templates
Predefined training templates as a starting point. Customizable to your organization-specific requirements and ready to use.
Reporting and
Create comprehensive status reports and keep track of all activities. Complete documentation of all changes for maximum transparency and audit security.
Activities
Automatic log of all document changes. Seamless traceability with timestamp, user, and performed action – for audits and compliance verification.
Reports
Status reports with details on all documents and automatically generated table of contents.
and Task Management
Manage tasks, checklists, files, and messages centrally in one place. All stakeholders stay informed – thanks to dashboard and follow-ups.
Tasks
Create and assign tasks directly within documents. The dashboard shows all open tasks at a glance. Email notifications ensure timely action.
Checklists
Multiple-choice checklists for quality assurance. Use template checklists or create your own. Results exportable as PDF or DOCX.
File Storage
Central upload and structured storage of documents. Tags and nestable folders facilitate organization. Files optionally shareable via public URL.
Messages
Internal communication directly in the system. Attach files, email notifications for new messages. Complete tracking of all communication.
Surveys
Create your own surveys with various question types. Analysis and download as PDF or DOCX. Usable independently or linked to documents.
Follow-ups
Scheduled reminders for all due tasks. Observers are automatically notified. No deadline is missed.
Choose Your Hosting Option
Flexible, secure, and tailored to your needs — choose the right hosting solution.
Cloud Hosting
Standard multi-tenant solution with quick setup. Ideal for getting started right away.
Learn morePrivate Cloud
Dedicated instance with custom domain and SSO integration. For organizations with advanced requirements.
Learn moreOn-Premises
Installation in the customer's own data center. Maximum control and data sovereignty.
Learn moreCloud and Private Cloud options are hosted in ISO 27001-certified data centers in Germany.
FAQ
Frequently Asked Questions
You will receive your login credentials by email after registration. Go to the login page and enter your email address and password. If you encounter any issues, please contact our support at support@preeco.de or +49 731 280 651 51.
Navigate to the 'Audits' module and select the 'BSI IT-Grundschutz' audit catalog. The wizard will guide you through all modules and requirements. You can document the degree of fulfillment, assign measures, and record deviations. Detailed instructions can be found in our user manual.
The generic risk analysis function enables flexible assessments. Create a new risk analysis, define risks, assess probability of occurrence and damage severity, and document measures. The risk analysis can be linked to assets, TOMs, and audits. The user manual contains step-by-step instructions.
Yes, preeco | information security supports multi-tenancy. As an external information security officer, you can manage multiple tenants centrally in one system. Each tenant has its own settings and documents. Switching between tenants is done with a single click. More information can be found in the user manual in the 'Tenant Management' section.
In the 'Training' module, you can conduct online training for your employees. Create training templates, assign participants, and monitor progress. Upon successful completion, certificates of participation are automatically generated. Follow-ups remind you of due refresher training. Detailed instructions can be found in our user manual.