By practitioners for professionals.
Over 20 years of experience in security management, gained during projects performed all over the world and possessed competences made it possible to create universal and at the same time very practical database.
What is i-SASMA?
Technology
The i-SASMA software has been prepared based on the latest technological and structural solutions. The base of its operation is a cloud, which allows access from any place and any device, as well as almost unlimited scaling. In turn, the optimization of the data acquisition process guarantees high performance of the system. The data is stored in a decentralized database secured using advanced cryptographic techniques.
Security
From the very beginning, even the stage of the idea, security of the system was a priority of the i-SASMA project. Starting from the two-step verification login process, through full encryption of transmitted content, data storage and their collection in the dispersed infrastructure (Blockchain), ending at the basic security principle, “Need to know” – limited access to information. The combination of these solutions significantly minimizes of unauthorized access to data.
Functionalities
The technology used in i-SASMA uses artificial intelligence (AI) to create models of intelligent behaviors and processes that enable their continuous analysis. The software constantly scans and compares the data available in the database and automatically identify the reasons for repeated incidents, as well as their modus operandi.
The i-SASMA software from the very beginning is created in a modular model, enabling the successive addition of more functionalities. In addition to the defined incidents and audits, the system gives the full opportunity to create Your own templates, based on which users can manage individual events or audits. An additional advantage is the possibility of adding attachments in any format and their automatized analysis.

Reports and statistics

AI

Advanced searcher

Access

Responsivness
Modules
In order to provide users with maximum effectiveness, the scope and functionality of the i-SASMA software-has been divided into 3 modules: incident management, due diligence and audit. Each module is based on an individual structure guaranteeing the maximum adjustment to the scope of activities.

Incident management
The module allows complete management of all security incidents; starting from investigations and ending with loss prevention.

Due Diligence
The module supporting the management of the due diligence process (checking / verification), allowing for the full verification process of both individuals and companies.

Audit
Audit management module allows to carry out comprehensive security audits and supply chain security audit.
Downloads
Below, you will find the documents and videos explaining the scope of i-SASMA functionality. Click on the icon to download the document or watch the movie.
Contact
SASMA EUROPE s.r.o.
Křížkovského 617/10, Muglinov, 712 00 Ostrava
Czech Republic
sasma@sas-ma.org