Creativity

Innovation

Originality

Imagination

 

About us

ITSM CENTER d.o.o. is a company from Slovenia, focusing on IT Service Management (ITSM), Project Management, Information Security Management and Digital transformation to ensure our clients reach their strategic goals in effective and efficient manner.

Company Brochure

End-to-End Governance, Risk and Compliance with ZenGRC.

Leverage one platform for all your compliance, audit, risk, third-party risk solutions, and governance and policy management applications.
This email address is being protected from spambots. You need JavaScript enabled to view it.    Brochure

ZenGRC is designed to help business leaders mitigate the risks they know about and prevent the risks they can’t see coming.

ZenGRC offers an established solution to elevate your company’s risk and compliance program to the highest infosec standards. The cloud-based SaaS solution fits your existing GRC program and also evolves to guide you throughout your maturity roadmap. With ZenGRC as the central platform for your organization’s entire infosec ecosystem, you can achieve continuous monitoring and efficient audit management capabilities, as well as customizable, end-to-end risk management that’s built-in — not bolted on.

ZenGRC Platform
Audits

Support the full audit process by gathering evidence and reports based on the right control designs and tests. Ensure audits remain current as your business evolves using live dashboards that let you prioritize audit work based on risk exposure, business objectives and audit committee requests as well as generate dynamic audit reports in Word or PDF format with push-button ease.

Easy evidence collection: Customized, role-based dashboards, project queues and automated notifications make sure audit findings are assigned to the right business owners so issues are addressed and resolved correctly.

Cross-Team collboration: With one-click navigation, audit staff can manage electronic work papers and findings, review notes and get a live view of audit project status and utilization, all of which can be share with other assurance functions, including SOX compliance, enterprise risk, information security, quality control and vendor management.

Expose compliance-related risks with intuitive and automated alerts and workflows so you can catch and remediate risks with real-time updates.

Address Enterprise Risk Management (ERM) and Cybersecurity Risk across threats, vulnerabilities and incidents from one application and communicate current risk status and potential threats through risk heatmaps, dashboards and reports.

Evaluate risks across connections, such as systems, business divisions and controls, using customizable risk calculations with multivariable scoring, including SCF and NIST frameworks, Cyber Risk Catalog and the RISQ Management Enterprise registers, and CIS-RAM Simplified and RISQ calculation methods.

Continuous Risk Monitoring
Governance and Policy Management

Consolidate policies and procedures and automate routine compliance activities in your organization.

ZenGRC equips your security and compliance teams with a single, integrated experience that reveals information security risk across your business. It’s hard to see evolving threats unless they’re exposed. ZenGRC shows where risk is changing in your organization.

ZenGRC simplifies audit and compliance management with complete views of control environments, easy access to information necessary for program evaluation and continual compliance monitoring to address critical tasks at any time.

Pre-built compliance dashboards provide visibility into completed tasks, open items, reviewer hierarchies, progress, status, pending deadlines and supporting documentation, revealing the health of your company’s compliance and IT information security programs along with a simple way to manage your compliance program.

Compliance
Third-party Risk Management

Save time, increase visibility and improve vendor relationships with streamlined vendor and third-party risk management that automates questionnaires and assessments, eliminating labor-intensive internal tasks.

Vendor Questionnaires: Create a more efficient and less manual risk-based approach to vendor management by defining actions for specific questions, which may spawn multiple workflows to ensure issues are addressed.

Business Impact Questionnaires: A more efficient way to gather information, documentation or opinions, questionnaires are designed so that responses lead to cascading questions. A weighing scale in the questionnaire applies a risk score.

Vendor Specific Reporting: Assess and compare vendors by individual responses and risk scores over time and easily report insights to management.

Safeguard your business by planning for worst-case scenarios and potential threats.

Business Continuity and Disaster Recovery
Out of the box content

  • Compliance frameworks
  • Compliance dashboards that provide a holistic view into your compliance program
  • Secure Controls Framework ™ : Industry-leading, unified compliance framework that supports 32 domains and over 750 controls
  • Risk registry
  • Use recognized standard calculations or create your own custom calculations
  • Secure Controls Framework ™ (SCF) controls specific to Business Continuity and Disaster Recovery

  • Control dashboard: What is your control health related to, BC / DR?
  • Control gap analysis: Where do your BC gaps exist?
  • Status and resolution: What are your corrective action plans?
  • Vulnerabilities: Where do you need to take action?
  • Severity: Which risk areas need the most attention?
  • Systematic: Which workflows, task management, and mitigation strategies do you need?
  • Maturity: Is your risk posture ok?
  • Benchmarking: How are you doing relative to your competitors?
  • Assessment status: What is your current assessment standing (annually, quarterly)?
  • Gap analysis: What compliance gaps exist today?
  • Future gap analysis: How much effort required to comply with additional frameworks?
  • Audit readiness: How effective is your control testing and evaluation?
  • Real-time evidence collection status: Do you have what you need to support your audit?
  • Issue management: Can you track issue status and resolution?
  • Compliance status: Where are you out of compliance?
  • Questionnaire status and management
  • Risk rating of vendors based on scored questionnaires

Reporting

Privacy policy

ITSM CENTER d.o.o. is committed to ensuring that your privacy is protected. Should we ask you to provide certain information by which you can be identified when using this website, then you can be assured that it will only be used in accordance with GDPR and all internal privay policies.

Intelectual property rights

ITIL® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. PRINCE2® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. The Swirl Logo is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

Keep in touch

ITSM CENTER d.o.o.
Ljubljanska cesta 12F, 1236 Trzin, Slovenia

Email: info@itsm-center.si, Phone: +386 1 2425 866

Working hours: 8:00 - 17:00 CET

We use cookies on our website. Some of them are essential for the operation of the site, while others help us to improve this site and the user experience (tracking cookies). You can decide for yourself whether you want to allow cookies or not.