Prices and features
We are rethinking ISMS tools. Transparent and a little brave.
Our solution – An ISMS platform that grows with you
Your solution for a risk-based information security system according to ISO27001 based on the
Best practices of the BSI IT-Grundschutz.
free/Basic
Ideal for beginners who want to take their first steps towards an ISMS. Start quickly and easily – with no risk.-
Entities: 1
-
Users: 1
-
ISMS objects: up to 500
-
Scopes: 1
Standard
Tailored features for SMEs and startups seeking a solution for their information security.-
Entities: 1
-
User: 3
-
ISMS objects: up to 5000
-
Scopes: 2
-
BCMS-Modul zubuchbar
Professional
Designed for large organizations and companies with high security requirements.-
Entities: 3
-
User: 10
-
ISMS objects: unlimited
-
Scopes: unlimited
-
BCMS-Modul zubuchbar
Enterprise
For large companies and public authorities. Also for the fuentis GRC Suite and customization.-
Everything from Professional +
-
OnPremise & Cloud
-
Users on demand
-
Units as required
-
Customizing (according to effort)
-
Test & Notfallsysteme
-
Extended Support
-
Entwicklungskreis
-
Functional overview fuentis Suite 4
free/BasicPerfect for direct entry and first steps |
StandardFor small and medium-sized enterprises (SMEs) and startups |
ProfessionalMaximale Kontrolle und Sicherheit für komplexe Anforderungen |
|
fuentis Suite 4ISMS-Platform |
0
/mo
|
379
/mo
|
979
/mo
|
| Inventory analysis | |||
| Protection requirement assessment | |||
| Security checks | |||
| Risk analysis | |||
| GAP analysis | |||
| ISMS monitoring | |||
| Catalog manager | |||
| ISMS advanced reports | |||
| Risk overview | |||
| RTP Overview | |||
| Incident management | |||
| BSI IT-Grundschutz | |||
| ISO27001 | |||
| SOC2 | |||
| TISAX | |||
| CMDB | |||
| Document upload | |||
| Dashboards | |||
| Multilingual | |||
| Rights administration | |||
| Workflow Management | |||
| Responsibilities management | |||
| ISMS-Knowledge-Hub | |||
| Zusätzliche Kataloge | |||
| Directives documents | |||
| Online Workshops | |||
| Additional users | |||
| Partner network | |||
| Data import | |||
| BCMS-Modul |
Our small print & FAQ
Workshops
The “Workshop” is an informational and introductory event specifically designed to familiarize participants with the functionality and application possibilities of fuentis. The focus is on presenting the software product, which has been developed as an expert tool for CISOs, ISBs, and IT administrators. Workshops are online events conducted via the MS Teams software. If you do not have access to this software, you must inform fuentis AG in a timely manner. During the workshop, participants will be provided with a comprehensive overview of the tool, including a demonstration of its specific features and functionalities. The interactive nature of the workshop allows participants to gain practical experience by using the tool under guidance and asking specific questions on the subject. This is a training measure aimed at equipping participants with the necessary knowledge and skills to use the tool independently and effectively in their work environment. The workshop does not offer contractually regulated consulting services but serves to support users and build competence in handling the ISMS tool.
Introductory workshops: You will receive an online workshop introducing the software free of charge upon its implementation. The introductory workshop must be conducted within 4 weeks of the contract’s conclusion, otherwise the entitlement to the service will expire.
Partner network
In addition to its range of software products, fuentis AG ensures that you receive qualified consulting, training, and support at all times in connection with the use of the fuentis Suite, provided by expert advisors in information security and IT administration.
fuentis AG has access to a unique partner network of leading consulting firms in the field of information security. If you need assistance with the implementation of your ISMS, feel free to contact us.
Priorities include the following services:
- Consulting in the areas of information security, business continuity management, emergency management, and data protection
- Provision of corporate information security officers and data protection officers (“ISB/DSB as a Service”)
- Training/education for information security officers and data protection officers
- Development of security concepts and execution of risk analyses
- Design and execution of penetration tests
Datenimport aus Fremd-ISMS-Tools
In principle, it is possible to import data from external ISMS tools into the fuentis Suite, provided a standard interface (API) is available.
Depending on the provision and the amount of data to be imported, we can provide you with a non-binding effort estimate. Feel free to contact us for this.
Training & Self-Service-Hub
Please contact us directly for more information about training options. Trainings are billed according to the applicable daily rates based on effort.
You will gain access to the fuentis Self-Service Hub, where you can find many helpful documents, such as ISMS Quick Start Guides, to help you get started right away.
Why can't I find prices for the GRC Suite on your website?
The GRC Suite is not a standardized SaaS solution. Instead, we offer tailored solutions that are precisely aligned with the individual requirements of our customers. Therefore, a general price list would not be appropriate. If you have a serious interest in our solution, we are happy to provide you with a price list and work together to create an offer that is customized to your specific needs.
Can I also use the fuentis Suite 4 OnPremise?
Yes, the fuentis Suite 4 can also be used on-premise (only in the Enterprise version). Installation, maintenance, and service will be billed on a “Time & Material” basis in this case.
Over the course of the next year, we also plan to introduce a standardized solution for on-premise installations to offer you even more flexibility.
I need a Grundschutz++ Tool
We are working closely with the BSI and our partners to fully integrate the Grundschutz++ into our tool as quickly as possible. The fuentis Suite has already been developed with Grundschutz++ in mind, and we are confident that we will fully cover all the requirements published so far. Feel free to contact us for more information.
What do I do if I no longer want to use the tool after 12 months?
The fuentis Suite 4 free/Basic is available free of charge for 12 months from the start of the contract with the functionalities listed here. After the 12-month contract period, you can switch to a paid version with your existing database. You also have the option to store the database for a price of €79.00 per month after the usage period ends. Otherwise, you may, if possible, commission us to export the data to another provider, billed on a “Time & Material” basis.
What is the next development plan for the product? Is there a roadmap?
Yes, we have a clear roadmap for the further development of the fuentis Suite 4. We plan to release the BCMS module by the end of this year.
In 2025, we will offer new integrations with leading business and cyber security tools. The DSMS module will be released by mid-next year.
Stay tuned and feel free to contact us if you have any questions or for further details on the roadmap.
Is the tool NIS2 or DORA compatible?
We are among the half of the market that anticipated the delays in the NIS2 legislation. However, we can now confirm: Yes, our tool is fully NIS2-compliant. We will continue to update it as new developments or requirements arise.
Regarding DORA, feel free to contact us. We have the relevant requirements catalog available and are happy to advise you on the options.
Is the fuentis Suite 4 suitable for KRITIS?
Yes, fuentis Suite 4 can also support KRITIS organizations in setting up a risk-based information security management system according to ISO 27001 and BSI IT-Grundschutz. Let us examine together how we can best help you.
How do you define users? Can I book additional users?
We define “users” as named users who use the software. concurrent this means having access to them at the same time. Each user is clearly assigned and can be transferred to another employee if one employee leaves.
This means: Even if you have multiple employees with access credentials, only as many users can actively work in the software simultaneously as allowed by your license model (e.g., 1, 3, or more at the same time). If an employee leaves the company, the license can easily be reassigned to a new employee.
You can easily add additional users from the standard license.
Important: Users in this sense are power users who actively work with the software, but are not risk or process owners (ISMS objects).
What are instances?
A technical term describing the environment in which the fuentis Suite is installed. It refers to application servers/services and database systems. An instance can be installed in a private cloud (not SaaS) or on-premise. The typical use case is companies that want to keep their data physically separated in the cloud, across different accounts, VPCs, database systems, and with VPN integration if needed. This is often used in our cloud environment to support government institutions. Available only in the Enterprise version.
What are tenants?
This is a technical term that refers to the separation of data in the database hosting environment, as well as different user management within realms. The fuentis Suite is a multi-tenant application that can be installed in the cloud as SaaS, in a dedicated private cloud environment, or as a traditional on-premise solution. The primary use case for utilizing spaces is the clear separation of data at the database level between tenants (customers). This allows control over data confidentiality and privacy, different user management integration, and varied backup/restore strategies tailored to the needs of our customers. Space management is available only with the Enterprise license – Cloud or On-Premise.
What are entities?
Represents the logical separation of data within the fuentis Suite. Entities are used for complex organizational structures and can be configured in the authorization module. The typical use case for using multiple entities is the separation of roles and data within large companies or government organizations. Entity management is available only in the Pro or Enterprise license models.
What is a scope?
The scope or scoping refers to the delineation of the area to be covered by the Information Security Management System (ISMS). It defines which processes, systems, locations, and data are included in the ISMS. Scoping is a critical step to ensure that the ISMS is tailored to the specific needs of the organization and provides a clear definition of the protection coverage. A clearly defined scope helps to use resources efficiently and meet compliance requirements effectively.
What are ISMS-Objects?
All objects that the user can create within the ISMS module and that are required for building a security concept. (Scope, TOGs, Req, Mod, Measures, Threats, Risks). Resource objects connected to ISMS objects are not subject to any limitations. (Vuln, Damage Scenarios, Review Questions, Risk Treatments, PRs)
Why do terms from BSI ITGS and ISO appear in the fuentis suite?
Our fuentis Suite is designed to support multi-compliance. We offer a product that meets the requirements of ISO 27001 as well as the best practices of the BSI IT-Grundschutz. Our approach is based on the belief that a risk-based information security system works best when implemented according to ISO 27001 and with consideration of the BSI IT-Grundschutz best practices.
In the future, we plan to introduce an additional guided “scoping” phase. This will allow you to choose a specific standard and hide the other information and terms. This way, the chosen path is represented natively, and the complexity is reduced.
Can I certify an ISMS with the free version?
Yes, depending on the size of your organization and the planned project, it is possible to achieve ISO 27001 certification with our free version. We have intentionally designed it so that even in the free version, all the essential functions required for certification are available.
However, larger organizations or associations may encounter limitations, as the free version is not designed for more extensive requirements. For this reason, our product follows a freemium model: the entry is free, but for advanced features, we offer paid options.
We understand that the term “free” often raises expectations that are difficult to balance – between a risk-free trial for you and the revenue we need for further development. Therefore, we have tried to make the initial experience as flexible and risk-free as possible, so that you can evaluate our solution without having to switch to paid options immediately.
Try it out and see for yourself!
How long does it take to activate my free account?
After you have registered, we will first verify whether your request is eligible. For this, we require a business email address and your company name. Once we have this information, we will activate your access as quickly as possible.
Are there free webinars of fuentis Suite 4?
Yes, we currently offer free weekly webinars to introduce the fuentis Suite 4. Feel free to contact us for more information or to register for a webinar.
Where are the servers located? Is fuentis AG certified?
Our servers are located either in Europe or in Saxony-Anhalt, depending on the license. The data centers are certified according to the relevant standards. If you have preferences for a specific cloud provider, feel free to contact us – we will work together to find a suitable solution.
fuentis AG operates according to ISO 27001 standards and has been certified by an independent consulting firm. If you have any further questions, we are always available to assist you.
Where can I find the Terms and Conditions and SLAs?
You can find the Terms and Conditions (AGBs) and SLAs in our Self-Service Hub after registration. If you have any further questions, feel free to contact us at any time.
*Alle Preise sind exklusive gesetzlicher Mehrwertsteuer.