Skip to main content

preeco | information security

The comprehensive ISMS software for BSI IT-Grundschutz and NIS2. Document your information security management systematically, conduct audits, and manage risks – fully integrated and audit-proof.

and Audit Catalogs

Plan, conduct, and document information security audits in a structured way. Use predefined catalogs based on BSI IT-Grundschutz, CISIS12, and VdA ISA, or create your own questionnaire catalogs.

Audit Catalogs

Predefined and customizable questionnaire catalogs as the foundation for your audits. Structured, reusable, and applicable across multiple tenants.

Audits

Structured execution and audit-proof documentation of information security audits. Hierarchical audit object management with direct asset linking. Graphical progress display, export as PDF or DOCX.

Risk Analyses

Assess risks systematically and document protection requirement analyses, resource assessments, and threat analyses. With graphical risk mapping and automatic versioning.

Risk Analyses

Flexible risk analyses for any scenario – from protection requirement analyses to threat analyses. Free definition of events, assessment of damage severity and probability of occurrence. Automatic versioning of all approved documents.

Security Controls and

Manage policies and technical as well as organizational measures centrally. Link TOMs directly with assets and audits for comprehensive security documentation.

Policies

Central storage and management of all security-relevant policies. Linking with other documents and complete activity log for seamless traceability.

Technical and Organizational Measures

Documentation and versioning of TOMs with automatic revision control. Linking with data processing systems and audits – always audit-ready.

Manage all IT assets and data processing systems centrally. Record responsibilities, provider details, and link assets directly with TOMs, audits, and risk analyses.

Data Processing Systems

Central management of all deployed systems with responsibilities, provider details, and purpose descriptions. Linking with TOMs, audits, and risk analyses. Automatic versioning and export for internal and external audits.

and Qualification

Plan, conduct, and document information security training for your employees. Training participation is automatically tracked and certified.

Training

Conduct online training directly in the software. Learning units with image and video content, multiple-choice exam questions with configurable minimum score.

Training Participation

Recording and verification of all training participation. Overview of the training status of all employees at a glance. Add participants manually or import via XLSX.

Training Templates

Predefined training templates as a starting point. Customizable to your organization-specific requirements and ready to use.

Reporting and

Create comprehensive status reports and keep track of all activities. Complete documentation of all changes for maximum transparency and audit security.

Activities

Automatic log of all document changes. Seamless traceability with timestamp, user, and performed action – for audits and compliance verification.

Reports

Status reports with details on all documents and automatically generated table of contents.

and Task Management

Manage tasks, checklists, files, and messages centrally in one place. All stakeholders stay informed – thanks to dashboard and follow-ups.

Tasks

Create and assign tasks directly within documents. The dashboard shows all open tasks at a glance. Email notifications ensure timely action.

Checklists

Multiple-choice checklists for quality assurance. Use template checklists or create your own. Results exportable as PDF or DOCX.

File Storage

Central upload and structured storage of documents. Tags and nestable folders facilitate organization. Files optionally shareable via public URL.

Messages

Internal communication directly in the system. Attach files, email notifications for new messages. Complete tracking of all communication.

Surveys

Create your own surveys with various question types. Analysis and download as PDF or DOCX. Usable independently or linked to documents.

Follow-ups

Scheduled reminders for all due tasks. Observers are automatically notified. No deadline is missed.

Choose Your Hosting Option

Flexible, secure, and tailored to your needs — choose the right hosting solution.

RECOMMENDED
Cloud Hosting

Cloud Hosting

Standard multi-tenant solution with quick setup. Ideal for getting started right away.

Learn more
Private Cloud

Private Cloud

Dedicated instance with custom domain and SSO integration. For organizations with advanced requirements.

Learn more
On-Premises

On-Premises

Installation in the customer's own data center. Maximum control and data sovereignty.

Learn more

Cloud and Private Cloud options are hosted in ISO 27001-certified data centers in Germany.

Professionalize your ISMS now

In a personal consultation, we'll show you how preeco | information security simplifies your security management.

Schedule a consultation now

For Your Industry

preeco | information security is used across industries – from law firms and public institutions to companies in trades, NGOs, and large corporations.

View all industries

FAQ

Frequently Asked Questions

You will receive your login credentials by email after registration. Go to the login page and enter your email address and password. If you encounter any issues, please contact our support at support@preeco.de or +49 731 280 651 51.

Navigate to the 'Audits' module and select the 'BSI IT-Grundschutz' audit catalog. The wizard will guide you through all modules and requirements. You can document the degree of fulfillment, assign measures, and record deviations. Detailed instructions can be found in our user manual.

The generic risk analysis function enables flexible assessments. Create a new risk analysis, define risks, assess probability of occurrence and damage severity, and document measures. The risk analysis can be linked to assets, TOMs, and audits. The user manual contains step-by-step instructions.

Yes, preeco | information security supports multi-tenancy. As an external information security officer, you can manage multiple tenants centrally in one system. Each tenant has its own settings and documents. Switching between tenants is done with a single click. More information can be found in the user manual in the 'Tenant Management' section.

In the 'Training' module, you can conduct online training for your employees. Create training templates, assign participants, and monitor progress. Upon successful completion, certificates of participation are automatically generated. Follow-ups remind you of due refresher training. Detailed instructions can be found in our user manual.