The scenarios enable the assessment of different damage scenarios resulting from the loss of protection objectives for a given asset, such as a business process. Possible scenarios include:
Yes, as a modern cloud platform, Leno allows for No-Code configuration.
Yes, as a modern cloud platform, Leno allows for No-Code configuration. The solution is highly scalable and can be flexibly adapted to your internal structures, processes, and permission sets without any programming effort.
Leno eliminates manual errors through high-level automation and integrated AI
Leno eliminates manual errors through high-level automation and integrated AI. Structured workflows and built-in regulatory expertise replace tedious email-based coordination and static lists with a modern, digital process.
Yes, Leno eliminates fragmented data silos by seamlessly linking vendors directly to their corresponding contracts, risks, and mitigation measures.
Yes, Leno eliminates fragmented data silos by seamlessly linking vendors directly to their corresponding contracts, risks, and mitigation measures. This seamless integration prevents redundant data entry and ensures full transparency.
Leno is a modular GRC platform designed to digitalize and automate Governance, Risk & Compliance.
Leno is a modular GRC platform designed to digitalize and automate Governance, Risk & Compliance. It serves as a central hub for Third-Party Risk Management (TPRM), Contract Lifecycle Management (CLM), Information Security (ISM), and BCM.
It determines the protection requirements of information assets, business processes, and applications in context and ensures a consistent assessment across all levels.
Thanks to pre-defined GRC templates and expert onboarding support, you can achieve a rapid "Go-Live".
Thanks to pre-defined GRC templates and expert onboarding support, you can achieve a rapid "Go-Live". We guide you from initial data migration to full production to ensure a smooth transition.
Information assets form the functional foundation. Their protection requirements determine the criticality of the processes and applications that process this information.
Yes, Leno supports English and German as standard.
Yes, Leno supports English and German as standard. Additional languages for international GRC teams can be added upon request to support your global compliance operations.
Security is ensured through Single Sign-On (SSO) and role-based access control (RBAC).
Security is ensured through Single Sign-On (SSO) and role-based access control (RBAC). Leno provides hosting and support directly from Germany, adhering to the highest security standards and architectural requirements.
Protection requirements are inherited from information assets to processes and from there to applications. Adjustments can be made consciously, are traceable, and are fully documented.
Leno TPRM (Third-Party Risk & Outsourcing), Leno CLM (Contract Management), and Leno ISM (Information Security & BCM).
Leno is modular and fully integrated. We offer specialized modules: Leno TPRM (Third-Party Risk & Outsourcing), Leno CLM (Contract Management), and Leno ISM (Information Security & BCM). All modules work together to form a holistic GRC ecosystem.
The protection requirements of applications are determined directly by the responsible process owner, based on the requirements of the underlying processes.
The scenarios enable the assessment of different damage scenarios resulting from the loss of protection objectives for a given asset, such as a business process. Possible scenarios include:
Our TPRM and outsourcing management software enables compliant, transparent, and efficient lifecycle management of outsourcing arrangements, ICT services, and onward outsourcing in accordance with DORA, EBA Guidelines, and MaRisk. AI-driven automation delivers excellent usability, high data quality, and complete audit readiness.
Our AI-powered, user-friendly, and automated software für contract lifecycle management (CLM) provides a dynamic hierarchical representation of all contract documents, continuous compliance with regulatory requirements, and transparent search and filter functions, including approval workflows and deadline monitoring.
Map a complete information ecosystem and connect all assets in real time. Our information security and Business Continuity Management (BCM) software enables you to conduct protection needs analyses, business impact analyses, and risk assessments, forming a fully integrated information risk management and BCM system.