Information is an important company asset that needs to be protected!
The importance of information and its protection is now a top priority for companies, not least due to the increasing threat of data theft, hacker and cyber-attacks as well as the entry into force of the German IT Security Law (IT-SiG).
Our Information Security Management System (ISMS) establishes procedures and rules within the company based on ISO 27001 to manage, control, maintain and improve information security and thus prevent security breaches.
The objectives of our ISMS include:
Together, we create an integrated Information Security Management System (ISMS) to initiate and carry out procedures and methods to secure information as well as to monitor and review them going forwards.
We are a licensed producer of IT baseline protection tools.

Information Security management components
Company management is responsible for taking suitable measures to fulfil security objectives. Various standards, such as ISO 27001, provide a source of reference to help introduce an Information Security Management System.
The important thing is to integrate information security directly into the business processes and observe which information is relevant and needs to be protected.
How do you integrate an effective Information Security Management System?
Data Protection firmly under control!
The IT security law and EU GDPR have highlighted the importance of Information Security and Data Protection in the IT world. In order for a company to cope with these new requirements, Data Protection guidelines need to be integrated into the existing Information Security Management System (ISMS). Incorporating the topic of Data Protection into the existing ISMS creates an integrated Data Protection Management System (DPMS).
Link between DPMS and ISMS

Safeguard information with antares RiMIS ISMS
ISO 27001- & BSI IT baseline protection certification
Tailor software to meet your individual requirements and processes
The system provides support at a management level
Understand and follow protective measures
Modular expandability leads to investment security (return on security investment)
Educate the entire company on the topic of information security
Incorporate employees, departments and responsible persons into the ISMS process
Identify weak points, recognise, document and counteract threats
antares RiMIS ISMS is an integral component of the antares RiMIS software. Through the interplay with RiMIS, ICS, CIRS, DPMS and Compliance solution components comes a high-performance risk management solution. Additional Analysis, Reporting and Planning modules can easily be incorporated based on your requirements. Thanks to the web capability of all components, any given number of people can access the system no matter their location, keeping them involved in the process.
Turnkey concepts combined with bespoke components and expansion modules for Compliance, the Internal Control System and Critical Incident Reporting System.
A design that conforms to CI, interfaces to upstream systems and the import of inventory data guarantee optimum integration of our tool into your existing IT environment.
Browser-based applications (on-premises or cloud-based) with an intuitive interface help save valuable time and increase your response time.
Short implementation times, low maintenance requirements and an extensive service portfolio guarantee seamless use of the application and low operating costs with high investment security.
- 1
antares RiMIS ISMS is an integral component of the antares RiMIS software. Through the interplay with RiMIS, ICS, CIRS, DPMS and Compliance solution components comes a high-performance risk management solution. Additional Analysis, Reporting and Planning modules can easily be incorporated based on your requirements. Thanks to the web capability of all components, any given number of people can access the system no matter their location, keeping them involved in the process.
- 2
Turnkey concepts combined with bespoke components and expansion modules for Compliance, the Internal Control System and Critical Incident Reporting System.
A design that conforms to CI, interfaces to upstream systems and the import of inventory data guarantee optimum integration of our tool into your existing IT environment.
- 3
Browser-based applications (on-premises or cloud-based) with an intuitive interface help save valuable time and increase your response time.
Short implementation times, low maintenance requirements and an extensive service portfolio guarantee seamless use of the application and low operating costs with high investment security.
Together we will set up an integrated information security management system (ISMS) for you in order to initiate and implement measures for information security, to monitor them and to check them continuously.
We would be happy to advise you on the selection of the BI software solution according to your individual requirements and help you to design your IT strategy.
We show you the way to solve concrete problems.
Use the know-how of our software experts.
The benefits for you
Predictive
Risks are not only pragmatically indexed; the early risk detection system integrated into our GRC solution enables you to proactively prevent risks and find the ideal path forward with the controlling of measures.
User-friendly
Complex processes are easy to use thanks to the intuitive interface structure and modern, web-based design. Self-explanatory dashboards and graphics simplify day-to-day dealings and achieve fast results, such as the drill-down method.
Customisable
Along with standardised data transfer, optimum integration into your IT environment allows for customisable design which can be adapted to your guidelines and requirements in opportunity and risk management.
Fast
The fast implementation time and individual expandability is seamlessly integrated into your workflow without disruptions. Generate an optimum risk strategy in no time at all with antares RiMIS.
Approved
Corresponds to § 317 para. 4 HGB and Auditing Standard IDW PS 340, meets BilMoG requirements and paves the way to prevent violation of the Sarbanes-Oxley Act. Takes into account the aspects of KonTraG, ISO 31000, IDW (E) PS 981, COSO II as well as ONR 49000 and ÖNORM S 2410 and is based on IEC 62198.
Timesaving
The intuitive screen structure and email-supported workflow from creation to automatically created risk reports ensures a seamless and efficient risk management process.
antares RiMIS references















Our portfolio is diverse
Our BI tools help you identify the risks and weak points in your processes and create the transparency required. No matter the area you wish to use the software in, we have the right solution for your company.