Information Security

Information Security

TIC Software; Testing Software, Inspection Software & Certification Software

The video above shows the usability and possibilities of our tool. This is done through a visual product, to see how this works in a hands-on scenario apply for a demo.  The chart seen above shows the process that Easy2Certify uses to guide the certification process, but what does this mean for Information Security?


Companies need to get connected before an audit can be executed. The Acquisition module within the Easy2Certify program uses the CRM function to organize possible new, and existing, clients. The Acquisition module is meant to create folders and categories to “drag-and-drop” organizations into. Use this to organize the flow of new and existing clients. The folders and categories can be used to create mailing campaigns.


The Quote module is used to create a visual representation of to where the clients are in the process of certification. Again with the information from the CRM function, the Quote module creates an step-by-step guide which every client follows. Automatic e-mails can be send when a client moves a next step in the process, letting clients know where they stand in the process.


Creating a clear and effective schedule can be a large and ineffective process. With the Schedule module the scheduling becomes visual. Every auditor has his own place in a easy to follow agenda. For the planner in the organisation it is easy to see who is planned in on what project, which auditor has more capabilities and how many hours are still available every week. Create an effective and cost-free schedule, without effort, every week.


When it is time to execute the audit, the scheduled auditor gets a notification. The auditor is provided with the proper Audit plan and Checklist for the norm that need to be certified. The Audit plan and Checklist are provided through an online platform. No need for Word-documents or printed papers. In the video above you can see what such a form looks like.


In the Execution module the auditor notes how many hours were spend on the audit. This data, with many other datasets, gets transferred towards the Invoicing module. When the whole checklist, and CRM fields, have been filled in the invoice is instantly completed. No more need for complex calculations or back-tracking information. Everything is in the place it needs to be.


After the whole audit has been completed it is time to hand out the Certificate. A certificate is created automatically by a premade template. This certificate can be send with an e-mail. This, however, can only be done when the audit is successful. If there is one, or more, non-conformity(s) a non-conformity report is made instead of the certificate. To see more about this, watch the video at the top of the page or request a demo.

  • Client Consultry
  • Date August 27, 2014
  • Tags Person
  • URL View Project

Related Projects