Protection requirements are inherited from information assets to processes and from there to applications. Adjustments can be made consciously, are traceable, and are fully documented.
Yes, as a modern cloud platform, Leno allows for No-Code configuration.
Yes, as a modern cloud platform, Leno allows for No-Code configuration. The solution is highly scalable and can be flexibly adapted to your internal structures, processes, and permission sets without any programming effort.
Leno eliminates manual errors through high-level automation and integrated AI
Leno eliminates manual errors through high-level automation and integrated AI. Structured workflows and built-in regulatory expertise replace tedious email-based coordination and static lists with a modern, digital process.
Yes, Leno eliminates fragmented data silos by seamlessly linking vendors directly to their corresponding contracts, risks, and mitigation measures.
Yes, Leno eliminates fragmented data silos by seamlessly linking vendors directly to their corresponding contracts, risks, and mitigation measures. This seamless integration prevents redundant data entry and ensures full transparency.
Leno is a modular GRC platform designed to digitalize and automate Governance, Risk & Compliance.
Leno is a modular GRC platform designed to digitalize and automate Governance, Risk & Compliance. It serves as a central hub for Third-Party Risk Management (TPRM), Contract Lifecycle Management (CLM), Information Security (ISM), and BCM.
Sie bestimmt den Schutzbedarf von Informationsobjekten, Geschäftsprozessen und Anwendungen im Zusammenhang und stellt eine konsistente Bewertung über alle Ebenen sicher.
It determines the protection requirements of information assets, business processes, and applications in context and ensures a consistent assessment across all levels.
Thanks to pre-defined GRC templates and expert onboarding support, you can achieve a rapid "Go-Live".
Thanks to pre-defined GRC templates and expert onboarding support, you can achieve a rapid "Go-Live". We guide you from initial data migration to full production to ensure a smooth transition.
Informationsobjekte bilden die fachliche Grundlage. Ihr Schutzbedarf bestimmt die Kritikalität der Prozesse und Anwendungen, die diese Informationen verarbeiten.
Information assets form the functional foundation. Their protection requirements determine the criticality of the processes and applications that process this information.
Yes, Leno supports English and German as standard.
Yes, Leno supports English and German as standard. Additional languages for international GRC teams can be added upon request to support your global compliance operations.
Security is ensured through Single Sign-On (SSO) and role-based access control (RBAC).
Security is ensured through Single Sign-On (SSO) and role-based access control (RBAC). Leno provides hosting and support directly from Germany, adhering to the highest security standards and architectural requirements.
Der Schutzbedarf wird von Informationsobjekten auf Prozesse und von dort auf Anwendungen vererbt. Anpassungen sind bewusst, nachvollziehbar und dokumentiert möglich.
Protection requirements are inherited from information assets to processes and from there to applications. Adjustments can be made consciously, are traceable, and are fully documented.
Leno TPRM (Third-Party Risk & Outsourcing), Leno CLM (Contract Management), and Leno ISM (Information Security & BCM).
Leno is modular and fully integrated. We offer specialized modules: Leno Third-Parties, Leno Contacts, and Leno Security & Resilience. All modules work together to form a holistic GRC ecosystem.
Der Schutzbedarf von Anwendungen wird direkt durch den verantwortlichen Prozesseigentümer bestimmt - auf Basis der Prozessanforderungen.
The protection requirements of applications are determined directly by the responsible process owner, based on the requirements of the underlying processes.
Schadensszenarien beschreiben mögliche negative Auswirkungen, die entstehen, wenn Schutzziele wie Verfügbarkeit, Vertraulichkeit oder Integrität von Informationen verletzt werden.
The scenarios enable the assessment of different damage scenarios resulting from the loss of protection objectives for a given asset, such as a business process. Possible scenarios include:
Our TPRM and outsourcing management software enables compliant, transparent, and efficient lifecycle management of outsourcing arrangements, ICT services, and onward outsourcing in accordance with DORA, EBA Guidelines, and MaRisk. AI-driven automation delivers excellent usability, high data quality, and complete audit readiness.
Our AI-powered, user-friendly, and automated software für contract lifecycle management (CLM) provides a dynamic hierarchical representation of all contract documents, continuous compliance with regulatory requirements, and transparent search and filter functions, including approval workflows and deadline monitoring.
Map a complete information ecosystem and connect all assets in real time. Our information security and Business Continuity Management (BCM) software enables you to conduct protection needs analyses, business impact analyses, and risk assessments, forming a fully integrated information risk management and BCM system.