Compliance

ISO 20000 / BS 15000 compliance

The ISO 20000 norm (derived from the BS 15000 norm), is a guide of best practices for the supply and management of Information Systems services. The norm uses ITIL recommendations for implementation.

The ISO 20000 norm defines a set of procedures to implement in order to supply optimized IS services:

  • Service delivery
    - Service level management
    - Service reporting
    - Availability management
    - Financial management
    - Capacity management
    - Security management
  • Relationship management
    - Customer relationship management
    - Supplier management
  • Control
    - Configuration management
    - Change management
  • Release

IS Decisions proposes a range of software solutions that will support the ISO 20000 norm:

Procedure IS Decisions
Aptitude
IS Decisions
Solution
IS Decisions solution's features
Service reporting Know WinReporter Search, report and archive configuration settings
Control UserLock Search, report and archive user connectivity
FileAudit Search, report and archive file and folder accesses
Capacity management Know WinReporter Comprehensive hardware, software and system audit for Windows resources.
Security management Know WinReporter Search, report and archive security settings
Report applied security hotfixes
Report permissions applied to files, folders and shares
Detection of unauthorized/illegal software
Control UserLock Identification of users connected to the environment
Session duration per user
Disconnect or lock a user account
Computer access restriction for specific user accounts/groups
FileAudit Identification of users whose access has been denied to a file or folder
Search, report and archive user access to files or folders
Act RemoteExec Remote installation of security hotfixes by batch
Configuration management Know WinReporter Comprehensive hardware, software and system audit for Windows resources.
Search, report and archive configuration settings
Report permissions applied to files, folders and shares
Report applied hotfixes
Change management Control UserLock Identification of users connected to the environment
Search, report and archive user connectivity
FileAudit Identification of accesses to a file or folder
Search, report and archive file and folder accesses
Act RemoteExec Remote application execution
Remote system action execution
Resource updating

Share this page: