{"id":1070,"date":"2024-07-22T09:31:09","date_gmt":"2024-07-22T07:31:09","guid":{"rendered":"https:\/\/ilogs.systems\/?page_id=1070"},"modified":"2025-08-01T10:50:57","modified_gmt":"2025-08-01T08:50:57","slug":"smt-security-management-tool","status":"publish","type":"page","link":"https:\/\/ilogs.systems\/en\/smt-security-management-tool\/","title":{"rendered":"SMT &#8211; Security Management Tool"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row row top-row wpb_custom_034b39d9bc6c6b310d69e39f0ccf274f\"><div class=\"vc_column_container col-md-12\"><div class=\"wpb_wrapper vc_column-inner\"><div class=\"porto-u-heading  wpb_custom_95aa9a11c17ad45cfabaf210d84ee7cc porto-u-ad87e2eaf3f9c495180fe0156ddf3eb0\"><div class=\"porto-u-sub-heading\" style=\"\">\n<h3 style=\"text-align: left;\">IT security made easy<\/h3>\n<p style=\"text-align: left;\">Based on common security standards such as ISO 27000, company-specific security policies and compliance policies can be easily integrated, and security-related aspects can be communicated throughout the organization.<\/p>\n<p style=\"text-align: left;\">With the aim of providing companies with a transparent platform that supports all life-cycle aspects of security policies and measures, SMT was originally designed and developed in collaboration with security experts from AIT.<\/p>\n<h3 style=\"text-align: left;\">Adaptable and comprehensive<\/h3>\n<p style=\"text-align: left;\">IT security must continuously adapt to ever-present threat scenarios. At the same time, measures are subject to potential changes with each new customer or project. SMT supports organizations in defining such security architectures, overarching measures, and, of course, all related processes.<\/p>\n<h3 style=\"text-align: left;\">Seamless security management<\/h3>\n<p style=\"text-align: left;\">Only a seamless and continuous security management system provides fundamental protection. Security-relevant information must be consistently available to all stakeholders to enable vulnerability analysis. Periodic reviews and audits are facilitated by establishing a central registry with schedules and content.<\/p>\n<h3 style=\"text-align: left;\">Transparent documentation<\/h3>\n<p style=\"text-align: left;\">The online status of relevant security documentation and content is available to all participants. SMT also provides a secure foundation for further security certifications.<\/p>\n<p><\/div><style>.porto-u-ad87e2eaf3f9c495180fe0156ddf3eb0.porto-u-heading{text-align:left}<\/style><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row row top-row wpb_custom_034b39d9bc6c6b310d69e39f0ccf274f\"><div class=\"vc_column_container col-md-12\"><div class=\"wpb_wrapper vc_column-inner\">\r\n\t<div class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element  wpb_custom_81a4f7ef9830bf958462581aa01150fb\"><div class=\"wpb_wrapper\">\r\n\t\t\t\r\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"1024\" height=\"413\" data-src=\"https:\/\/ilogs.systems\/wp-content\/uploads\/2024\/06\/Screen-04-1024x413.gif\" class=\"vc_single_image-img attachment-large lazyload\" alt=\"\" title=\"\u00dcbersicht SMT\" data-srcset=\"https:\/\/ilogs.systems\/wp-content\/uploads\/2024\/06\/Screen-04-1024x413.gif 1024w, https:\/\/ilogs.systems\/wp-content\/uploads\/2024\/06\/Screen-04-768x310.gif 768w, https:\/\/ilogs.systems\/wp-content\/uploads\/2024\/06\/Screen-04-640x258.gif 640w, https:\/\/ilogs.systems\/wp-content\/uploads\/2024\/06\/Screen-04-400x161.gif 400w, https:\/\/ilogs.systems\/wp-content\/uploads\/2024\/06\/Screen-04-367x148.gif 367w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/413;\" \/><\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/div><\/div><\/div><div class=\"vc_row wpb_row row top-row wpb_custom_034b39d9bc6c6b310d69e39f0ccf274f\"><div class=\"vc_column_container col-md-12\"><div class=\"wpb_wrapper vc_column-inner\"><div class=\"porto-u-heading  wpb_custom_95aa9a11c17ad45cfabaf210d84ee7cc porto-u-ad87e2eaf3f9c495180fe0156ddf3eb0\"><div class=\"porto-u-sub-heading\" style=\"\">\n<h3 style=\"text-align: left;\">Advantages at a Glance<\/h3>\n<p style=\"text-align: left;\"><strong>Immediately deployable &amp; intuitive<\/strong><\/p>\n<ul style=\"text-align: left;\">\n<li><strong>Timely maintenance:<\/strong> With SMT, even highly complex security architectures can be efficiently maintained through simple individual steps.<\/li>\n<li><strong>Effective information:<\/strong> The distribution of security-relevant information is carried out to all relevant parties, with the right security level and at the right time.<\/li>\n<li><strong>Certification basis:<\/strong> By developing a comprehensive knowledge base, SMT provides the foundation for certifications according to common standards.<\/li>\n<\/ul>\n<p style=\"text-align: left;\"><strong>Process-based approach<\/strong><\/p>\n<ul style=\"text-align: left;\">\n<li><strong>Integrated management:<\/strong> SMT combines security processes, documents, and policies into a process-oriented knowledge management system.<\/li>\n<li><strong>Flexible security process:<\/strong> A dynamic foundation enables companies to respond flexibly to constantly changing conditions.<\/li>\n<li><strong>Audit-capable system:<\/strong> The central, audit-capable system of SMT makes modifications to security concepts and vulnerability analyses transparent and traceable.<\/li>\n<li><strong>Methodical support:<\/strong> SMT provides methodical support for maintaining and conducting security analyses through process-oriented approaches.<\/li>\n<\/ul>\n<p style=\"text-align: left;\"><strong>Reliable<\/strong><\/p>\n<ul style=\"text-align: left;\">\n<li><strong>Experienced partner:<\/strong> Benefit from our extensive experience and numerous successful customer projects. Our eProcess technology is used reliably and stably in many companies, ranging from a few to several thousand employees.<\/li>\n<\/ul>\n<p><\/div><style>.porto-u-ad87e2eaf3f9c495180fe0156ddf3eb0.porto-u-heading{text-align:left}<\/style><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"IT-Sicherheit leicht gemacht Ausgehend von den g\u00e4ngigen Sicherheitsstandards wie ISO 27000, k\u00f6nnen unternehmenseigene Sicherheitsrichtlinien und Compliance-Policies problemlos integriert und sicherheitsrelevante Aspekte in der gesamten Organisation kommuniziert werden. Mit dem Ziel, Unternehmen eine transparente Plattform zur Verf\u00fcgung zu stellen, die alle Life-Cycle-Aspekte von Sicherheitsrichtlinien und Ma\u00dfnahmen unterst\u00fctzt, wurde SMT urspr\u00fcnglich in Zusammenarbeit mit den Sicherheitsexperten:innen vom [...]","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1070","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ilogs.systems\/en\/wp-json\/wp\/v2\/pages\/1070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ilogs.systems\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ilogs.systems\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ilogs.systems\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ilogs.systems\/en\/wp-json\/wp\/v2\/comments?post=1070"}],"version-history":[{"count":12,"href":"https:\/\/ilogs.systems\/en\/wp-json\/wp\/v2\/pages\/1070\/revisions"}],"predecessor-version":[{"id":1362,"href":"https:\/\/ilogs.systems\/en\/wp-json\/wp\/v2\/pages\/1070\/revisions\/1362"}],"wp:attachment":[{"href":"https:\/\/ilogs.systems\/en\/wp-json\/wp\/v2\/media?parent=1070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}