Due to an incompatibility of the previous version of the ISMS add-on with the current i-doit version 27, we are now enjoying an early new release. In addition to fixing the compatibility issues, standard requirement texts are now displayed in formatted form and risk owners can now be documented in the risk assessment.
New features of the ISMS 1.5.5 update in detail:
Text formatting for standard request texts
Various options for automatically formatting text elements such as headings, tables and bulleted lists were missing for displaying texts from standard requirements (such as the controls from ISO 27002). To avoid having to import inline formatting, standard requirement texts have now been given standard formatting for these elements. For better readability, the request texts are displayed with a serif font.
New ‘risk owner’ attribute
Risk owners can now be documented directly in the risk assessment via a separate attribute. This replaces the previous option of documenting risk owners via a contact assignment on the object concerned, as the risk assessments on an object could have different risk owners, which was previously not possible.
ATTENTION!
When updating to version 1.5.5, all contact assignments with the ‘Risk owner’ role are migrated to the existing risk assessments. The contact assignments are then deleted in the same way as the ‘Risk owner’ role.
Bug fixes ISMS 1.5.5
As in every release, the open bugs have been fixed. A complete list of all changes and fixed bugs can be found in the CHANGELOG.
premium partner
becon is an i-doit Premium Partner, Certified Support Partner and Development Partner of synetics GmbH and thus offers an all-round carefree package.




Service Management
Thei-doit Compliance Suite gathers all important tools for your IT security in one place: CMDB, ISMS, data protection and change management
Execution of risk analyses according to ISO27001 standard with the i-doit add-on ISMS
User Story of Schweickert GmbH

The digital world undoubtedly has its challenges. Especially when it comes to managing sensitive information. Surely you know all too well about the risks involved. But how can you manage these risks effectively and efficiently without getting lost in a sea of Excel spreadsheets?
In our latest user story, Christian Berg, Security Consultant and Information Security Officer at Schweickert GmbH, presents a solution that addresses precisely this issue. In the user story, he reports on the decision-making process leading up to the use of the i-doit add-on ISMS and how the tool facilitates his work. With features such as the Tree-View, the ISMS Risk Matrix and a wealth of objects, he demonstrates how easy and cost-effective the implementation of an information security management system can be.
Request User Story now
Information security with ISMS in i-doit
Information security affects every company. Protect your valuable data with standards and norms such as ISO 27001 and IT Grundschutz from the BSI. Standards help to proactively counter threats from outside and inside. Minimize the risk and thereby increase the security of your company. Monitor your processes by using meaningful reports. Benefit from the integration of a CMDB and numerous extensions to automate your IT documentation.
Information Security Management System
The practical guide to the i-doit ISMS

Systems, applications and processes within organizations are becoming increasingly complex. This increases the attack surface that potential attackers and malware can exploit. The goal of information security is to keep this attack surface low and to protect corporate assets. The topic of security only gains importance in many companies when business-critical processes have been disrupted or financial damage has occurred. Most impacts can be averted with simple means or their scope can be drastically reduced. We would like to introduce you to these steps in the i-doit ISMS Practice Guide.
Request ISMS Whitepaper now
Subscribe to our blog!
We will not only talk about us here, but above all provide interesting information about the transformation of IT with all its technological facets.
blog
Related blog articles
EU AI Regulation: Regulation with foresight – What companies need to know now
With the AI Act, the EU has adopted the world’s first comprehensive AI regulation for the regulation of AI according to a risk-based approach.
becon GmbH is new consulting partner of KIX Service Software
becon GmbH is pleased to announce the official partnership with KIX. As a KIX Consulting Partner, we now offer companies comprehensive support for all aspects of KIX Service Software.
CMDB and ITIL: Best practices for successful IT service management
Effective IT service management (ITSM) is essential for the success of companies. The Configuration Management Database (CMDB) and the ITIL (Information Technology Infrastructure Library) framework play a central role in this. These two elements help companies to manage their IT services efficiently, improve service quality and optimize operating costs.
Contact
Instant contact
Do you have any questions, suggestions, requests or are you facing a particular challenge? We look forward to hearing from you!