regfor modules
The regfor application consists of 10 functional modules, which are linked to each other. A unified data model, close interconnection of modules, advanced task automation and workflow management, and extensive use of generative AI and visualization tools simplify compliance management, including cybersecurity, and expand user competencies.
The regfor application is a way to meet regulatory and compliance requirements efficiently and cost-effectively and to counter the increasingly significant threats in the cyber world.
Currently available modules
ANALYST
An easy-to-understand guide to the requirements of standards and methodologies in the areas of security, digitalization, artificial intelligence, human resource management, supplier management, and environmental protection. | Enables an organization to conduct a guided self-assessment of its compliance status, including cyber security. A structured questionnaire consisting of several sets of specific questions helps to identify requirements, assess risks, and then determine the level of compliance achieved. | Progressive completion of the questionnaire, tracking of progress, and immediate assessment of compliance. | Individual areas or questions can be easily delegated to responsible parties.
ARCHITECT
A design module to identify, manage, and monitor corrective and safety measures identified in the compliance analysis and risk assessment. It creates a pipeline of measures, prioritizes them, and breaks them down into manageable tasks. | It supports continuous monitoring and evaluation of the implementation of measures and sub-tasks.
INSPECTOR
An integrated OSINT tool for analyzing an organization's risk exposure to the Internet, deep web, and darknet. Performs on-demand or scheduled scans of defined risk information sources (Internet, dark net, dark web). | Searches for threats and generates a report including simple scoring. | Any findings are reflected in the threat analysis and definition of corrective actions and steps to prevent further leaks.
INVESTIGATOR
Verification of credibility and risk exposure of suppliers | Analytical module for automated retrieval of information about third parties (suppliers, business partners, persons in engagement, etc.) | Automated processing | Analytical report on third parties regarding their compliance and security exposure.
DATA VAULT
Module for long-term secure storage, sharing, and distribution of information, documents, and other content throughout the tool. | Automation of workflows and processes. | Verification of all stored content and demonstration of continuous development in the field of cybersecurity. | Creation of secure temporary and long-term virtual data rooms, sharing of documentation between users of the tool and beyond.
Modules in development
RESPONDER
An integrated tool for the management and documentation of security events and incidents and a communication gateway for the timely reporting of security incidents to the relevant supervisory authority (NÚKIB, ÚOOÚ, ČNB, etc.). | Semi-automated collection of relevant information and inputs related to the incident itself and the whistleblower's security ecosystem.
WATCHDOG
A module for intuitive management of the compliance and security ecosystem of the organization, subordinate units, suppliers, and their chains. Provides monitoring of links and maturity of supply chain links, manages sharing of information and profiles between them. | Notification of security events, collection of information on compliance status, assigning self-assessments to suppliers, and monitoring their performance and responses.
AUDITOR
A module for preparing and automating internal or external compliance, cybersecurity, and third-party audits. It ensures efficient administration of audits, semi-automated collection, and preparation of important documents and necessary documentation and their distribution according to the selected methodology via a secure VDR. | It manages communication and information exchange between the auditor and the auditee. | It stores compliance status prints and backups of historical audits.
SCHOLAR
An integrated platform for compliance and cybersecurity training. It includes programs, individual courses, and practice-oriented training prepared by top trainers.| It enables staff training to be planned, monitored, evaluated, and documented, and internal and external certifications to be managed.| A tool for demonstrating compliance with legislative requirements in the field of education and continuous training.
E-SHOP
Module for access to premium services, documentation, and content. | Top security services (e.g. penetration testing, incident response, etc.), up-to-date templates and documentation packages, expert consultations, and other support in a few clicks directly in the tool.
Contact us for an introduction to regfor application
Expert applications for managing your compliance and cybersecurity