SCREENSHOTS

Secure Tool for Risk Management

IMPACT ASSESSMENT

You are able to conduct the Impact Assessment for all your ICT assets, View Results, Download Results in PDF and EXCEL format and Download Impact Assessment Report

SHARE

THREAT ASSESSMENT

You are able to conduct the Threat Assessment for all your ICT assets, View results, Download Results in PDF and EXCEL format and Download Threat Assessment Report.

SHARE

VULNERABILITY ASSESSMENT

You are able to conduct the Vulnerability Assessment for all your ICT assets, View results, Download Results in PDF and EXCEL format and Download Vulnerability Assessment Report.

SHARE

RISK ASSESSMENT

You are able to conduct the Risk Assessment for all your ICT assets, View Results, Download Results in PDF and EXCEL format and Download Risk Assessment Report

SHARE

Incident Management

The STORM users are able to report any security incident with all the necessary information such as the date of the incident, the asset involved, the impact level of the specific incident, the corrective and preventive actions needed etc.

SHARE

Internal Audit

The STORM users are able to report all possible Non-Conformities from internal audits and assign the corrective actions to the corresponding users via the Task Management Service.

SHARE
STORM Version 3.0: STORM has been updated in order to offer GDPR compliance services
STORM Version 2.0: The new version of STORM complies with the ISO 27001:2013 requirements
ISO 27001:2013: New version of the ISO 27001 standard published on October 2013.