FAQs
Where can I learn more about the SoftComply Information Security Risk Manager?
We have an extensive set of Knowledge Base articles about customisation and additional automation for the Risk Manager apps.
You are welcome to BOOK A DEMO call to learn more about the Information Security Risk Manager.
What are the main differences between the Risk Manager apps of SoftComply?
There are a number of differences between the 3 Risk Manager apps offered by SoftComply. You can read the comparison between them here.
To summarise, the SoftComply Information Risk Manager is a subset of the Risk Manager Plus, i.e. functionality of the Information Security Risk Manager is included in the Risk Manager Plus.
The Risk Manager Plus is more scaleable than the InfoSec Risk Manager, e.g.:
- You can customize Risk Models in the Information Security Risk Manager but you can’t add new Risk Models in the app. You can do that in the Risk Manager Plus app.
- You can customize the Object Registers in the Information Security Risk Manager but you can’t create new ones in the app. You can build new Object Registers in the Risk Manager app though.
- You have 2 sheets in the Risk Table that you can customize in the Information Security Risk Manager but you can’t create more Table sheets in the app. You can create any number of sheets for the Risk Tables in the Risk Manager Plus app.
How to assign fields to my Risk Table columns in the Information Security Risk Manager?
To learn how to assign fields to Risk Table columns in the Information Security Risk Manager, please continue reading the tutorial here.
My Risk Table of the Information Security Risk Manager shows the warning “Field not mapped“. How can I get rid of this warning?
To learn more about the fields and mapping of fields in the Information Security Risk Manager, please continue reading the tutorial here.
The Risk Table of the Information Security Risk Manager shows the warning “Field will be available for …“. How to solve this?
To learn more about the fields and mapping of fields in the Information Security Risk Manager, please continue reading the tutorial here.
What are Object Registers and how to use them?
Object Registers are a feature of the Information Security Risk Manager that allows you to create custom data structures (i.e. data tables) and link these structures to Jira issues like you would link other issues. Custom data structures are like database tables that you can build inside the Information Security Risk Manager application. When these registers are filled with data you can link Jira issues with the data objects. In other words, the object registers are like complex customisable dropdown lists you can use as Jira issue fields
To find out more about object registers and how to use them, please continue reading the guide here.
What happens if my evaluation period ends?
For more information about accessing your risk data when your app evaluation period ends, please continue reading here.
How to connect Confluence to the Information Security Risk Manager for risk reporting?
Just follow the guide here: Connecting Confluence to Jira.