Suggested Categories:

ISO Compliance Software
ISO compliance software is software designed to help businesses ensure their operations meet the standards set by the International Organization for Standardization (ISO). This type of software typically includes features such as document management, risk assessment, and corrective action tracking to assist with achieving and maintaining compliance. It is often customizable to fit the specific needs of different industries and can be used for various ISO certifications. The software aims to streamline the process of meeting ISO requirements, saving businesses time and resources. Ultimately, it helps companies uphold high-quality standards in their processes and operations.
ISO 27001 Compliance Software
ISO 27001 compliance software is a tool designed to help organizations ensure their information security program aligns with the requirements of the ISO 27001 standard.
Operating Systems
Operating systems are foundational software that manage computer hardware, software resources, and provide services for applications and users. They handle critical functions such as process scheduling, memory management, device control, file systems, and security. Operating systems provide a user interface—either graphical (GUI) or command-line—that allows individuals to interact with the machine. They also offer APIs and system calls that enable developers to build and run applications consistently across devices. From personal computers to servers, mobile devices, and embedded systems, operating systems are essential for ensuring stability, efficiency, and usability in modern computing environments.
System Monitoring Software
System monitoring software is designed to track the performance, health, and availability of IT systems, including servers, networks, applications, and hardware. It continuously collects data such as CPU usage, memory consumption, disk activity, and network throughput to detect anomalies or potential failures. Many tools feature dashboards, alerts, and automated reports to help administrators respond quickly to issues before they impact end users. By providing real-time visibility, system monitoring software helps organizations maintain uptime, optimize resource usage, and improve troubleshooting efficiency. It is widely used in IT operations, DevOps, and enterprise environments to ensure system reliability and performance.
System Utilities
System utilities are specialized software tools designed to maintain, manage, and optimize computer systems. They assist with essential tasks such as file management, disk cleanup, backup, performance monitoring, and troubleshooting. Unlike applications built for end-user productivity, system utilities work behind the scenes to improve efficiency, stability, and security of the operating system. They can be built into the OS or installed as third-party tools to extend functionality. By automating maintenance and diagnostic tasks, system utilities help prolong system lifespan and ensure smooth day-to-day operations.
Comment Systems Software
Comment systems software allows websites to implement commenting features for their visitors through the use of text comment boxes.
Systems Engineering & MBSE Software
Systems engineering and MBSE software enables engineers and systems designers to create and simulate system designs using a GUI. Systems engineering software streamlines and simplifies the process of designing a system such as factory machines, industrial equipment systems, IoT systems, and more. Model-based systems engineering (MBSE) software enables systems designers to model systems based on specific requirements.
Business Phone Systems
Business phone systems are advanced communication networks designed to manage and streamline voice calls and other communication channels within organizations. They range from traditional landline systems to modern VoIP (Voice over Internet Protocol) solutions, offering features like call forwarding, voicemail, auto-attendants, and conferencing. These systems can be tailored to fit businesses of all sizes, from small startups to large enterprises, ensuring seamless internal and external communication. Many modern phone systems integrate with other business tools like CRM software to enhance productivity and customer service. Reliable and scalable, business phone systems play a crucial role in maintaining efficient operations and fostering collaboration.
Kitchen Display Systems
Kitchen display systems (KDS) are digital solutions used in commercial kitchens to streamline order management and improve communication between the front-of-house and kitchen staff. These systems replace traditional paper ticketing by displaying orders on screens, allowing kitchen staff to track and prepare dishes in real-time. KDS often integrates with point-of-sale (POS) systems, ensuring that orders are accurately transmitted directly to the kitchen as they are placed. Features such as color coding, timers, and order prioritization help improve efficiency, reduce errors, and enhance workflow. By using a kitchen display system, restaurants can speed up service, improve order accuracy, and create a more organized kitchen environment.
Student Information System Software
A Student Information System (SIS) is a centralized software platform used by educational institutions to collect, manage, and track student‐related data throughout their academic lifecycle. It typically handles everything from admissions and enrollment, to class scheduling, attendance, grading, transcripts, and reporting. Many SIS platforms also provide portals for students, parents/guardians, and teachers to access relevant information, communicate, and collaborate. The system often integrates with other tools such as Learning Management Systems (LMS), finance/payroll modules, and analytics dashboards to support administration and academic decision‐making. By automating key administrative workflows and consolidating student data, an SIS helps institutions improve efficiency, transparency, student engagement, and compliance with educational regulations.
Alternative Trading Systems
Alternative trading systems (ATS), also known as multilateral trading facilities in some parts of the world, are electronic trading systems that enable buyers and sellers to match and execute orders with one another. Alternative trading systems can facilitate the sale of securities and other assets, including digital assets. Electronic communication networks (ECN) are an example of an alternative trading system.
Airline Reservation System Software
Airline reservation systems are software platforms that help airlines manage flight bookings, ticket sales, and passenger information in an organized and efficient way. They provide real-time details on flight schedules, seat availability, pricing, and inventory, making it easy for customers and travel agents to make or modify reservations. The system automates key tasks such as check-ins, cancellations, and payment processing while maintaining compliance with international airline standards. By connecting to global distribution networks, these platforms help airlines reach more customers and improve seat utilization. Ultimately, airline reservation systems enhance the travel experience and streamline operations across booking, service, and flight management.
Retail POS Systems
Retail point of sale systems are the tools that modern retailers use to process customer transactions. They integrate a variety of technologies including barcode scanners, cash drawers, and payment processing terminals. Retailers can customize their point of sale systems according to their unique needs, allowing them to track inventory, manage staff performance, and optimize customer experience. As with all technology investments, businesses should carefully evaluate their specific requirements when selecting a retail point of sale system.
Learning Management Systems (LMS)
A Learning Management System, or LMS, is a software platform used to create, deliver and manage online training programs. They provide instructors with the ability to design course content, track learner progress, assess performance and generate reports. Learners also benefit from self-paced learning options that are available through most systems. Additionally, an LMS can be tailored to meet specific organizational needs such as providing specialized learning paths for different job roles.
Automatic Replenishment Systems
Automatic replenishment systems help businesses maintain optimal inventory levels by automatically triggering restocking based on predefined rules, usage patterns, or real-time demand. These systems analyze sales data, lead times, and stock thresholds to ensure products are reordered before shortages occur. They reduce manual intervention, minimizing human error and improving supply chain efficiency. Many solutions integrate with inventory management, ERP, and supplier platforms to enable seamless ordering and fulfillment. By improving stock availability and reducing excess inventory, automatic replenishment systems support better cash flow and customer satisfaction.
Utility Management Systems
Utility management systems are software platforms designed to help organizations monitor, control, and optimize the use of essential services such as electricity, water, gas, heating, and waste. They provide tools for tracking consumption, analyzing costs, detecting inefficiencies, and ensuring regulatory compliance. Many platforms integrate with smart meters, IoT sensors, and billing systems to deliver real-time insights and automated reporting. These systems are used by municipalities, energy providers, large enterprises, and facilities managers to reduce operational expenses and improve sustainability. By centralizing data and automating processes, utility management systems support better decision-making and resource efficiency.
Radiology Information Systems
Radiology Information Systems (RIS) are computerized systems used to manage and store medical imaging data. This includes information such as patient demographics, medical history, test results and any related documentation. RIS enable medical professionals to access this data quickly and accurately in order to optimize the delivery of health care services. Additionally, these systems help streamline administrative processes like billing, scheduling, and reporting.
Safety Instrumented Systems
Safety Instrumented Systems (SIS) are a type of industrial automation system used to monitor and measure process variables such as pressure, temperature, flow, or level. The goal of SIS is to ensure safe operation of a process by responding to unsafe conditions with predetermined control actions. Safety systems use sensors to detect abnormal conditions in a system and respond appropriately. They can also provide monitoring and protection against failure of other sub-systems within the process. SIS allow for efficient operation while maintaining safety requirements set forth by regulatory agencies.
Building Management Systems
Building management systems (BMS) are software control systems used to manage and monitor various aspects of a building. They typically include hardware, software, and sensors to collect and analyze data related to energy usage, temperature control, lighting, security, and other building functions. Building management systems can be customized to fit the specific needs of a building and can be accessed remotely for easy monitoring and adjustments. These systems aim to improve efficiency, reduce costs, and enhance occupant comfort in commercial and residential buildings. Overall, building management systems play an important role in ensuring the smooth operation of buildings by providing centralized control and monitoring capabilities.
Security System Installer Software
Security system installer software allows security service providers to improve the efficiency of their services by optimizing the management of clients, costs, schedules, and inventory.
View more categories (20) for "iso system"

18 Products for "iso system" with 2 filters applied:

  • 1
    Compliance Aspekte

    Compliance Aspekte

    expertree consulting GmbH

    Compliance Aspekte is an intuitive and easy-to-use GRC solution for compliance management. The Compliance Aspekte SCM tool helps SMBs and large enterprises from different business domains implement ISMS and DSMS to comply with any standard, be it general or industry-specific. The solution supports GDPR, TISAX, ASPICE, B3S, ISO 9001, ISO 1400, ISO 22301, ISO 27001, ISO 27019, ISO 31000,BSI IT Grundschutz and counting. It’s a perfect fit for companies that want to: - receive more...
    Starting Price: €55/user/month
  • 2
    6clicks

    6clicks

    6clicks

    6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRamp and many other standards. Hundreds of businesses trust 6clicks to set up and automate their risk and compliance programs and streamline audit, vendor risk assessment, incident and risk management and policy implementation. Easily import standards, laws, regulations or templates from our massive content library, use AI-powered features to automate...
  • 3
    ibi systems iris

    ibi systems iris

    ibi systems

    Our services and products lie on the one hand in the individually configured provision of the ISMS and GRC software “ibi systems iris” and on the other hand in the associated professional consulting services. These range from needs analysis to implementation support and training to complete process optimization (e.g. your ICS) or the establishment of an appropriate and certifiable management system (e.g. ISMS according to ISO 27001, sustainability management according to ISO 26000). ...
  • 4
    Neumetric

    Neumetric

    Neumetric

    ...With Neumetric, complex compliance is made easy and is supported by security experts, so you can reduce the need for in-house experts. Neumetric streamlines compliance management with its centralized task management system, simplifying adherence to regulations such as GDPR and ISO certification by consolidating tasks onto one platform. It enhances tracking, ensures effective administration & prepares organizations for diverse regulatory requirements. Simplifies document creation & management across domains, particularly beneficial for systems like ISMS, automating tasks and providing a centralized dashboard.
  • 5
    Vanta

    Vanta

    Vanta

    Thousands of fast-growing companies trust Vanta to help build, scale, manage and demonstrate their security and compliance programs and get ready for audits in weeks, not months. By offering the most in-demand security and privacy frameworks such as SOC 2, ISO 27001, HIPAA, and many more, Vanta helps companies obtain the reports they need to accelerate growth, build efficient compliance processes, mitigate risks to their business, and build trust with external stakeholders. Simply...
  • 6
    Cetbix GRC & ISMS
    In three steps, you can achieve information security self-assessment, ISO 27001, NIST, GDPR, NFC, PCI-DSS, HIPAA, FERPA, and more. Cetbix® ISMS strengthens your certification. Information security management system that is comprehensive, integrated, documents ready and paperless. Cetbix® online SaaS ISMS. ISMS software from Cetbix®. Other features include IT/OT Asset Management, Document Management, Risk Assessment and Management, Scada Inventory, Financial Risk, Software Implementation Automation, Cyber Threat Intelligence Maturity Assessment, and others. ...
  • 7
    Hyperproof

    Hyperproof

    Hyperproof

    Hyperproof makes building out and managing your information security frameworks easy by automating repetitive compliance operation tasks so your team can focus on the bigger things. The Hyperproof solution also offers powerful collaboration features that make it easy for your team to coordinate efforts, collect evidence, and work directly with auditors in a single interface. Gone are the days of uncertainty around audit preparation and compliance management process. With Hyperproof you get a...
  • 8
    CloudABIS

    CloudABIS

    M2SYS Technology

    ...Our software supports many fingerprint readers & device activation is seamless with our CloudScanr™ app. CloudScanr™ also enables the biometric system to instantly work across any web browser. There are many viable fingerprint readers on the market. Most fingerprint SDKs allow you to generate a standard ISO template since this is a universal format.
  • 9
    Smartlockr

    Smartlockr

    Smartlockr

    ...Smartlockr is compliant with all privacy regulations and security standards like GDPR, ISO, NTA 7516.
    Starting Price: €0.42 / month / user
  • 10
    TrustCloud

    TrustCloud

    TrustCloud Corporation

    Don’t struggle with 1000s of vulnerability smoke signals from your security tools. Aggregate feeds from your cloud, on-premises, and bespoke apps, and combine them with feeds from your security tools, to continuously measure the control effectiveness and operational status of your entire IT environment. Map control assurance to business impact to assess which gaps to prioritize and remediate. Use AI and API-driven automation to accelerate and simplify first-party, third-party, and nth-party...
  • 11
    SecOps

    SecOps

    SecOps

    ...Use our proprietary compliance patching technology to fix the gaps for CIS Level 1&2, PCI-DSS, HIPAA, ISO 27001 & more. From static image to dynamic running instances , Discover, track and continuously secure docker containers, Kubernetes pods and microservices.
  • 12
    Teramind

    Teramind

    Teramind

    Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely and...
    Starting Price: $12/month/user
  • 13
    Hakware Archangel
    Hakware Archangel is an Artificial Intelligence based vulnerability scanner and pentesting tool. Archangel scanner enables organizations to monitor their networks, systems, and applications for security vulnerabilities with advanced Artificial intelligence continuously testing your environment. Why use Archangel? -Identify vulnerabilities before cyber criminals do -Our vulnerability scanning mitigates the risks of a data breach, which will come with a range of costs, including remediation, the loss of customers as a result of reputational damage and fines -Vulnerability scanning is not explicitly required by the GDPR (General Data Protection Regulation) or POPI (Protection Of Personal Information Act), but the -Regulation does require organisations that process personal data to ensure that they have implemented appropriate technical and organisational security measures – which includes identifying vulnerabilities -The international standard for information security, ISO 27001
    Starting Price: $100
  • 14
    Netwrix Auditor
    Netwrix Auditor is a visibility platform that enables control over changes, configurations and access in hybrid IT environments and eliminates the stress of your next compliance audit. Monitor all changes across your on-prem and cloud systems, including AD, Windows Server, file storage, databases, Exchange, VMware and more. Simplify your reporting and inventory routines. Regularly review your identity and access configurations, and easily verify that they match a known good state.
  • 15
    Kontra

    Kontra

    Security Compass

    ...This practical approach leads to 3x higher completion rates than traditional security training and helps AppSec teams scale secure coding practices without pulling developers out of their workflow. Most labs take under 10 minutes to complete. The platform is SCORM-compliant and integrates with existing LMS systems or can be delivered via hosted environment. Role-based curriculum aligns with NIST, ISO 27001, and PCI-DSS, and supports ISC2 co-branded certification.
    Starting Price: $400 per year
  • 16
    Teleskope

    Teleskope

    Teleskope

    ...Once sensitive data is identified, Teleskope enables automated remediation, such as redaction, masking, encryption, deletion, and access correction, while integrating into developer workflows via its API-first model and supporting deployment as SaaS, managed, or self-hosted. The platform also builds prevention capabilities, embedding into SDLC pipelines to stop sensitive data from entering production systems, support safe AI adoption (without using unchecked sensitive data), handle data subject rights requests (DSARs), and map findings to regulatory standards (GDPR, CPRA, PCI-DSS, ISO, NIST, CIS).
  • 17
    Coralogix

    Coralogix

    Coralogix

    ...Coralogix has successfully completed relevant security and privacy compliances by BDO including GDPR, SOC 2, PCI, HIPAA, and ISO 27001/27701.
  • 18
    Email Hippo

    Email Hippo

    Email Hippo

    Email Hippo provides fast, accurate and secure email verification software, accessed via web app or API. The CORE product allows users to import lists of up to 500,000 emails and verify them directly within a self-service web app. MORE is an API product that can be used to check the validity of an email address in real time, looking at up to 74 data points for maximum accuracy. With ASSESS, users can check email addresses for common pre-fraud indicators. Email Hippo has provided email...
    Starting Price: $10.00/one-time
  • Previous
  • You're on page 1
  • Next