--5G Video Autoplay--

The add-ons of i-doit

Add-ons integrate into the i-doit data model and allow you to adapt the system to your requirements.

Security

Add-ons and service packages from i-doit

becon’s i-doit products are divided into add-ons, which are made available to the customer via a subscription, and service packages, which consist of a combination of services, best practices, templates and sometimes scripts.

Extensibility

The add-ons of i-doit

logo i-doit add-on isms becon gmbh
logo i-doit add-on viva2 becon gmbh
logo i-doit add-on medtec becon gmbh
logo i-doit add-on otrsc becon gmbh
logo i-doit add-on azure becon gmbh
logo i-doit add-on scanit becon gmbh

Extensibility

The add-ons of i-doit

logo i-doit add-on isms becon gmbh
logo i-doit add-on viva2 becon gmbh
logo i-doit add-on medtec becon gmbh
logo i-doit add-on otrsc becon gmbh
logo i-doit add-on azure becon gmbh
logo i-doit add-on scanit becon gmbh

The ISMS Add-on is an extension of the i-doit CMDB for setting up an Information Security Management System (ISMS). At the same time, it ensures that the requirements of ISO27001 are met.

Functions

  • Risk analysis and management within i-doit
  • Supports the implementation according to ISO27005 and BSI IT-Grundschutz 200-3 as well as the implementation of industry-specific security standards (KRITIS)
  • Import and management of threats, vulnerabilities and measures from external catalogues (ISO27001, BSI Grundschutzkompendium, B3S)
  • Documentation of the implementation status of the selected measures
  • Risk assessments directly on already documented objects or object groups
  • Reporting and integration into the documents add-on
  • Support of risk analyses of individual locations within a client

Risk analyses according to the ISO27001 standard are carried out directly in the CMDB

The ISMS Add-on provides security documentation management exactly where it belongs: Integrated into the IT documentation. This is because the IT documentation is the first to know which new components have been integrated or which changes have been made to the IT infrastructure. In order to manage the security assessment on a daily basis, the ISMS add-on enables risk recording and assessment directly on the objects (IT assets, object groups, services/business processes) in i-doit.

The ISMS Add-on is an extension of the i-doit CMDB for setting up an Information Security Management System (ISMS). At the same time, it ensures that the requirements of ISO27001 are met.

Functions

  • Risk analysis and management within i-doit
  • Supports the implementation according to ISO27005 and BSI IT-Grundschutz 200-3 as well as the implementation of industry-specific security standards (KRITIS)
  • Import and management of threats, vulnerabilities and measures from external catalogues (ISO27001, BSI Grundschutzkompendium, B3S)
  • Documentation of the implementation status of the selected measures
  • Risk assessments directly on already documented objects or object groups
  • Reporting and integration into the documents add-on
  • Support of risk analyses of individual locations within a client

Risk analyses according to the ISO27001 standard are carried out directly in the CMDB

The ISMS Add-on provides security documentation management exactly where it belongs: Integrated into the IT documentation. This is because the IT documentation is the first to know which new components have been integrated or which changes have been made to the IT infrastructure. In order to manage the security assessment on a daily basis, the ISMS add-on enables risk recording and assessment directly on the objects (IT assets, object groups, services/business processes) in i-doit.

logo i-doit add-on viva2 becon gmbh

The VIVA2 Add-on is a technically and content-wise modernized version of the VIVA Add-on, which is oriented towards the BSI IT basic protection standards 200-1 and 200-2. Like the tried and tested VIVA add-on, the new VIVA2 supports you in setting up an information security management system (ISMS) in accordance with the BSI IT-Grundschutz methodology.

Functions

  • Establishment of an ISMS according to BSI standards 200-1 and 200-2, seamlessly integrated into the CMDB
  • Management of the building blocks from the BSI IT-Grundschutz Compendium
  • Creation of reports and graphical overviews
  • Documentation of the protection requirement with visual representation of the protection requirement inheritance
  • Wizard-supported data migration from VIVA1 to VIVA2

IT-Grundschutz

The update of the BSI IT-Grundschutz methodology from 100-X to 200-X, published by the German Federal Office for Information Security in October 2017, also raises the establishment of information security management systems to a new level. To support this methodology, the proven VIVA add-on is available in a completely revised version. The add-on was not only revised in terms of content, but above all technically modernized. Like the tried and tested VIVA add-on, the new VIVA2 supports you in setting up an ISMS according to the IT-Grundschutz methodology.

logo i-doit add-on viva2 becon gmbh

The VIVA2 Add-on is a technically and content-wise modernized version of the VIVA Add-on, which is oriented towards the BSI IT basic protection standards 200-1 and 200-2. Like the tried and tested VIVA add-on, the new VIVA2 supports you in setting up an information security management system (ISMS) in accordance with the BSI IT-Grundschutz methodology.

Functions

  • Establishment of an ISMS according to BSI standards 200-1 and 200-2, seamlessly integrated into the CMDB
  • Management of the building blocks from the BSI IT-Grundschutz Compendium
  • Creation of reports and graphical overviews
  • Documentation of the protection requirement with visual representation of the protection requirement inheritance
  • Wizard-supported data migration from VIVA1 to VIVA2

IT-Grundschutz

The update of the BSI IT-Grundschutz methodology from 100-X to 200-X, published by the German Federal Office for Information Security in October 2017, also raises the establishment of information security management systems to a new level. To support this methodology, the proven VIVA add-on is available in a completely revised version. The add-on was not only revised in terms of content, but above all technically modernized. Like the tried and tested VIVA add-on, the new VIVA2 supports you in setting up an ISMS according to the IT-Grundschutz methodology.

logo i-doit add-on medtec becon gmbh

ISO 80001 urges hospitals and medical facilities to comprehensively document their environment. In addition, medical devices such as MRI, CT and PACS are increasingly based on standard IT, leading to the merging of medical IT and technology IT. Both of these factors make it useful to document medical devices in a standard CMDB.

Functions

The MedTec add-on extends i-doit with object types for the documentation of medical devices. The German Institute for Medical Documentation and Information (DIMDI) provides the Universal Medical Device Nomenclature System (UMDNS), a catalogue for the classification of medical devices. i-doit in combination with the add-on MedTec is able to document these medical devices.

logo i-doit add-on medtec becon gmbh

ISO 80001 urges hospitals and medical facilities to comprehensively document their environment. In addition, medical devices such as MRI, CT and PACS are increasingly based on standard IT, leading to the merging of medical IT and technology IT. Both of these factors make it useful to document medical devices in a standard CMDB.

Functions

The MedTec add-on extends i-doit with object types for the documentation of medical devices. The German Institute for Medical Documentation and Information (DIMDI) provides the Universal Medical Device Nomenclature System (UMDNS), a catalogue for the classification of medical devices. i-doit in combination with the add-on MedTec is able to document these medical devices.

logo i-doit add-on otrsc becon gmbh

The add-on OTRSC stands for “OTRS Connector” and is – as the name suggests – an interface add-on for the bidirectional connection of i-doit and OTRS. This interface provides event-based synchronization of i-doit Config Items with OTRS ITSM, is generic and can be extended by any functionality thanks to a suitable module in OTRS.

Functions

Digitalization with its vassals Cloud Computing, DevOps, Big Data and IoT are driving up the complexity of IT infrastructures. Automated processes in the data center backend – such as the connection of the ticket system to the CMDB – help the IT experts to focus on the essential issues to support the business departments. Faults are assigned to the devices and services causing them, problems are solved more quickly and the handling for the helpdesk engineers is improved. With this add-on, i-doit can improve service quality by sustainably optimizing response times.

logo i-doit add-on otrsc becon gmbh

The add-on OTRSC stands for “OTRS Connector” and is – as the name suggests – an interface add-on for the bidirectional connection of i-doit and OTRS. This interface provides event-based synchronization of i-doit Config Items with OTRS ITSM, is generic and can be extended by any functionality thanks to a suitable module in OTRS.

Functions

Digitalization with its vassals Cloud Computing, DevOps, Big Data and IoT are driving up the complexity of IT infrastructures. Automated processes in the data center backend – such as the connection of the ticket system to the CMDB – help the IT experts to focus on the essential issues to support the business departments. Faults are assigned to the devices and services causing them, problems are solved more quickly and the handling for the helpdesk engineers is improved. With this add-on, i-doit can improve service quality by sustainably optimizing response times.

logo i-doit add-on azure becon gmbh

The provisioning of virtual machines in the cloud is fully automated in many data centers all the way to the end user. Self-service portals enable developers and business users to retrieve resources with just a few clicks. Who wants to keep up with static documentation? I-doit is now comfortable in the dynamic world of IaaS and PaaS with this add-on. Mixed operation is possible: i-doit in your own data center or directly in the cloud – i-doit can always access the data of your Azure Cloud. You can also query other cloud products, making i-doit a comprehensive documentation solution that extends beyond the boundaries of your data center.

Functions

The AZURE add-on enables fully automated documentation of the resources used in the Microsoft Azure Cloud. Here, Azure API Management is used to read all the data of a VM into i-doit. In combination with the service package “i-doit IaC (Infrastructure as Code), i-doit can be automatically deployed in the cloud. As soon as the machine is booted, all defined resources (VMs, storage, etc.) are documented fully automatically.

logo i-doit add-on azure becon gmbh

The provisioning of virtual machines in the cloud is fully automated in many data centers all the way to the end user. Self-service portals enable developers and business users to retrieve resources with just a few clicks. Who wants to keep up with static documentation? I-doit is now comfortable in the dynamic world of IaaS and PaaS with this add-on. Mixed operation is possible: i-doit in your own data center or directly in the cloud – i-doit can always access the data of your Azure Cloud. You can also query other cloud products, making i-doit a comprehensive documentation solution that extends beyond the boundaries of your data center.

Functions

The AZURE add-on enables fully automated documentation of the resources used in the Microsoft Azure Cloud. Here, Azure API Management is used to read all the data of a VM into i-doit. In combination with the service package “i-doit IaC (Infrastructure as Code), i-doit can be automatically deployed in the cloud. As soon as the machine is booted, all defined resources (VMs, storage, etc.) are documented fully automatically.

logo i-doit add-on scanit becon gmbh

The ScanIT add-on extends i-doit with another data import option. Different data of barcodes can be captured with the help of a mobile hand scanner. These can be new objects to be created or simple category entries to be updated.

Functions

The ScanIT add-on creates efficient workflows in which data capture can be carried out entirely via the mobile device. The required data is entered into predefined lists in a user-friendly manner using a barcode scanner. Required information of existing objects can be preloaded locally via QR code scanner or search function and processed further. Subsequently, the created data sets are transferred to i-doit at the push of a button.

logo i-doit add-on scanit becon gmbh

The ScanIT add-on extends i-doit with another data import option. Different data of barcodes can be captured with the help of a mobile hand scanner. These can be new objects to be created or simple category entries to be updated.

Functions

The ScanIT add-on creates efficient workflows in which data capture can be carried out entirely via the mobile device. The required data is entered into predefined lists in a user-friendly manner using a barcode scanner. Required information of existing objects can be preloaded locally via QR code scanner or search function and processed further. Subsequently, the created data sets are transferred to i-doit at the push of a button.

Premium Partner

becon ist i-doit Premium Partner, Certified Support Partner und Development Partner der synetics GmbH und liefert somit das Rundum-sorglos-Paket.

Premium Partner

becon ist i-doit Premium Partner, Certified Support Partner und Development Partner der synetics GmbH und liefert somit das Rundum-sorglos-Paket.

i-doit service packages from becon

Die zentrale IT Dokumentation

i-doit ist eine leistungsstarke webbasierte Anwendung,
mit der Sie eine 360°-Dokumentation Ihrer gesamten IT-Infrastruktur erstellen und verwalten können.
Jetzt 30 Tage kostenlos testen!

Security

We accompany you with our experience not only with the introduction of
i-doit
also with the audit preparation.

Fact Sheet

More than just IT documentation

i-doit is more than just the best open source based platform for IT documentation. With an intelligent relationship model, the ability to model IT services, manage configurations to devices and applications, and visualize dependencies and statistics, i-doit becomes a business-ready CMDB. In this fact sheet we describe the benefits of i-doit and the service packages, add-ons and service packages becon offers you.

fact sheet i-doit it-documentation becon gmbh

Fact Sheet

More than just IT documentation

fact sheet i-doit it-documentation becon gmbh

i-doit is more than just the best open source based platform for IT documentation. With an intelligent relationship model, the ability to model IT services, manage configurations to devices and applications, and visualize dependencies and statistics, i-doit becomes a business-ready CMDB. In this fact sheet we describe the benefits of i-doit and the service packages, add-ons and service packages becon offers you.

In our webinar we will show you how you can easily connect a CMDB with an OTRS ticket system via OpenCelium. Click in now!

Fact Sheet

i-doit Add-ons ISMS + VIVA2

The ISMS Add-on is an extension of the i-doit CMDB for setting up an Information Security Management System (ISMS). At the same time, it ensures that the requirements of ISO27001 are met. The VIVA2 Add-on is a technically and content-wise modernized version of the VIVA Add-on, which is oriented towards the BSI IT basic protection standards 200-1 and 200-2. It enables the establishment of an ISMS according to BSI IT-Grundschutz methodology.

fact sheet opencelium api hub becon gmbh

Fact Sheet

i-doit Add-ons ISMS + VIVA2

The ISMS Add-on is an extension of the i-doit CMDB for setting up an Information Security Management System (ISMS). At the same time, it ensures that the requirements of ISO27001 are met. The VIVA2 Add-on is a technically and content-wise modernized version of the VIVA Add-on, which is oriented towards the BSI IT basic protection standards 200-1 and 200-2. It enables the establishment of an ISMS according to BSI IT-Grundschutz methodology.

becon BLOG

Matching articles

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

becon BLOG

Matching articles

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Contact

Instant contact

Do you have any questions, suggestions, requests or are you facing a particular challenge? We look forward to hearing from you!

+49 (0) 89 608668-0

GDPR cookie consents with Real Cookie Banner