How does inheritance work in the information network?

Protection requirements are inherited from information assets to processes and from there to applications. Adjustments can be made consciously, are traceable, and are fully documented.

Weitere hilfreiche Antworten

Is the Leno GRC platform customizable as a No-Code solution?

Yes, as a modern cloud platform, Leno allows for No-Code configuration.

Yes, as a modern cloud platform, Leno allows for No-Code configuration. The solution is highly scalable and can be flexibly adapted to your internal structures, processes, and permission sets without any programming effort.

How does Leno replace manual Excel sheets with automated GRC workflows?

Leno eliminates manual errors through high-level automation and integrated AI

Leno eliminates manual errors through high-level automation and integrated AI. Structured workflows and built-in regulatory expertise replace tedious email-based coordination and static lists with a modern, digital process.

Can Leno link existing Third-Party Risk (TPRM) processes with Contract Management (CLM)?

Yes, Leno eliminates fragmented data silos by seamlessly linking vendors directly to their corresponding contracts, risks, and mitigation measures.

Yes, Leno eliminates fragmented data silos by seamlessly linking vendors directly to their corresponding contracts, risks, and mitigation measures. This seamless integration prevents redundant data entry and ensures full transparency.

What makes Leno the leading GRC platform for TPRM, CLM & ISR?

Leno is a modular GRC platform designed to digitalize and automate Governance, Risk & Compliance.

Leno is a modular GRC platform designed to digitalize and automate Governance, Risk & Compliance. It serves as a central hub for Third-Party Risk Management (TPRM), Contract Lifecycle Management (CLM), Information Security (ISM), and BCM.

What is a protection requirements analysis for the information network?

It determines the protection requirements of information assets, business processes, and applications in context and ensures a consistent assessment across all levels.

How fast can Leno be deployed using onboarding and templates?

Thanks to pre-defined GRC templates and expert onboarding support, you can achieve a rapid "Go-Live".

Thanks to pre-defined GRC templates and expert onboarding support, you can achieve a rapid "Go-Live". We guide you from initial data migration to full production to ensure a smooth transition.

Why does the analysis begin with information assets?

Information assets form the functional foundation. Their protection requirements determine the criticality of the processes and applications that process this information.

Is the platform available in multiple languages for global teams?

Yes, Leno supports English and German as standard.

Yes, Leno supports English and German as standard. Additional languages for international GRC teams can be added upon request to support your global compliance operations.

How does Leno handle user management and data security?

Security is ensured through Single Sign-On (SSO) and role-based access control (RBAC).

Security is ensured through Single Sign-On (SSO) and role-based access control (RBAC). Leno provides hosting and support directly from Germany, adhering to the highest security standards and architectural requirements.

How does inheritance work in the information network?

Protection requirements are inherited from information assets to processes and from there to applications. Adjustments can be made consciously, are traceable, and are fully documented.

Which modules does Leno offer for DORA, BCM, and Contract Management?

Leno TPRM (Third-Party Risk & Outsourcing), Leno CLM (Contract Management), and Leno ISM (Information Security & BCM).

Leno is modular and fully integrated. We offer specialized modules: Leno TPRM (Third-Party Risk & Outsourcing), Leno CLM (Contract Management), and Leno ISM (Information Security & BCM). All modules work together to form a holistic GRC ecosystem.

Who determines the protection requirements of applications?

The protection requirements of applications are determined directly by the responsible process owner, based on the requirements of the underlying processes.

What are protection requirement scenarios?

The scenarios enable the assessment of different damage scenarios resulting from the loss of protection objectives for a given asset, such as a business process. Possible scenarios include:

  • Financial loss (e.g., revenue loss, contractual penalties, additional costs)
  • Reputational damage (e.g., loss of trust from customers or partners)
  • Regulatory impact (e.g., findings by supervisory authorities, sanctions)
  • Business operation impairment (e.g., disruption of critical processes)

Our products

Third-Party Risk Management according to DORA, EBA Guidelines & MaRisk

Our TPRM and outsourcing management software enables compliant, transparent, and efficient lifecycle management of outsourcing arrangements, ICT services, and onward outsourcing in accordance with DORA, EBA Guidelines, and MaRisk. AI-driven automation delivers excellent usability, high data quality, and complete audit readiness.

Main functions
Explore Leno TPRM

AI-based contract lifecycle management (CLM) Software – intelligent and centralized

Our AI-powered, user-friendly, and automated software für contract lifecycle management (CLM) provides a dynamic hierarchical representation of all contract documents, continuous compliance with regulatory requirements, and transparent search and filter functions, including approval workflows and deadline monitoring.

Main functions
Explore Leno CLM

A solution for integrated ISM and BCM in accordance with international standards

Map a complete information ecosystem and connect all assets in real time. Our information security and Business Continuity Management (BCM) software enables you to conduct protection needs analyses, business impact analyses, and risk assessments, forming a fully integrated information risk management and BCM system.

Main functions
Explore Leno ISR

Get to know Leno

Book a demo
Book a meeting today to discover Leno.