Skip to content
Information security risk management

Safer, smarter information security.

Off-the-shelf control libraries, registers and analytics that give you visibility of your IT control framework and its effectiveness, allowing you to better protect your organisation.

Request a demo Download brochure

Implement IT controls frameworks consistently

Build trust with customers by establishing a systematic approach to IT control standards and frameworks:

  • Centralise libraries and registers for IT risk, controls, activities and policies

  • Follow a consistent approach to documenting which controls apply (e.g. Statement of Applicability)

  • Demonstrate compliance with controls through controls assurance

Provide visibility to information security risk owners

Help risk owners in the business know what they need to do and how they can achieve it:

  • Optimise workflow so risk owners take action at the right time, with calendars for testing and reviews

  • Provide risk owners with the visibility required to adequately monitor their components

  • Break down the silos between information security risk management, resilience management and enterprise risk management

  • Centralise libraries to easily assess the the risk and health of your assets.

Streamline reporting to boards, executives and regulators

Provide appropriate insights to boards, executives, regulators and other stakeholders overseeing information security risk management:

  • Easily report on the IT risk posture of your organisation.

  • Provide the right info for board and executives in one place in a simple, easy-to-understand format

  • Gain a clear understanding of your organisation’s current IT controls framework and its effectiveness

  • Create consistency in management with centralised libraries of risks and controls

Demonstrate compliance with standards

Streamline the demonstration of IT standards compliance to achieve certification and give comfort that you are protecting yourself and customers from security risks:

  • Manage compliance with multiple ISMS control frameworks (including ISO27001, NIST, SOC2 and CPS234)

  • Map your master control framework to track compliance with other frameworks

  • Link enterprise risk controls to IT controls

  • Manage ongoing assurance in relation to your business-critical resources

Information security brochure.

Safer, smarter information security, allowing you to better protect your organisation.

Download brochure

IT risk management eBook.

What IT risk is, why it matters, why it’s different from cyber risk, and why it’s not just a concern for the IT department.

Find out more

Cyber risk management eBook.

How boards, executives and managers can meet their responsibilities to address growing and changing cyber threats.

Find out more

Buyer’s guide.

What an ERM solution is, why you need one, and how to make the right choice.

Get the buyer’s guide

Protecht ERM. Safer, smarter risk management across the information security lifecycle.

Preconfigured content - for a turnkey launch

Optimise your risk management at the click of a button. Set up and maintain your ERM system with Marketplace: preconfigured registers, dashboards and reports.

Popular register packages for IT risk management

ISMS Control Library – ISO 27001

Provides a Control Library in line with the ISO/IEC 27001:2022 standard. These controls can be downloaded into the central library and tailored specifically to your organisation. The controls are also mapped to controls in SOC 2 Trust Services Criteria, NIST CSF and APRA CPS234, allowing customers to save time determining overlap in their implemented controls.

ISMS Control Library – NIST CSF v1.1

Provides a Control Library in line with the NIST CSF control framework. These controls can be downloaded into the central library and tailored specifically to your organisation. The controls are also mapped to controls in SOC 2 Trust Services Criteria and ISO 27001, allowing customers to save time determining overlap in their implemented controls.

ISMS Control Library – NIST CSF v2

This package provides a NIST CSF 2.0 Control Library in line with the NIST CSF v2 control framework released in Feb 2024. These controls can be downloaded into the central library and tailored specifically to your organisation. Protecht has also provided a mapping to other common ISMS industry standards/frameworks like SOC 2 Trust Services Criteria and ISO 27001.

ISMS Control Library – SOC2 POF & TSC

Provides a Control Library in line with the SOC 2 criteria. The SOC 2 POF (Point of Focus) control library has been designed by Protecht as suggested controls to comply with the SOC 2 TSC (Trust Services Criteria) requirements. These controls can be downloaded into the central library and tailored specifically to your organisation. The controls are also mapped to controls in NIST CSF and ISO 27001, allowing customers to save time determining overlap in their implemented controls.

ISMS Control Library – APRA 234

Provides a Control Library in line with the APRA CPS 234 prudential standard. These controls can be downloaded into the central library and tailored specifically to your organisation. The controls are also mapped to controls in ISO 27001, allowing customers to save time determining overlap in their implemented controls.

ISMS Registers and Dashboards

Streamlines data capture and reporting to help organisations manage:

  • Controls, statements of applicability and assurance activities

  • Conducting and overseeing IT risk assessments

  • Asset and application risks and health assessments

  • Cataloguing, reviewing and approving policies, policy exceptions and documents

  • Minimising disruption from incidents

  • Visibility of ISMS actions

  • Capturing of exceptions with the policy and documents register

  • Generating risk reports for risk events and ISMS risk entries of interest

ISMS - Security Calendar

Systematically capture and track important security events such as penetration test due dates, cryptographic key renewals, and audits. The ISMS Security Calendar register and dashboard allow you to:

  • Assign ownership and due dates to key events

  • Report on status of events and their completion

  • Provide a centralised repository of important security events

CISO Dashboard

Presents key information from the ISMS registers providing an overview of:

  • IT controls

  • IT risks and drilldown details

  • IT assets and their status

  • IT policies and policy exceptions

  • Helps the user to report on the IT risk posture of the organisation and inform decisions regarding cybersecurity and ISMS strategy.

Case study

How WorldRemit manages risk across 130 countries.

See this story See all stories