A functional ISMS is the basis for your security management – we find the right support for you

  • Price-performance ratio
  • References
  • Competence of the tester
  • Temporal and technical scope

A selection of our 100+ providers

Out value add:

We find the right provider for you in four steps – for free!



Specify requirements



Anonymous tender under Bosch brand



Transparent comparison of top 3 providers



Provider pitches and customer decision


1. We help you to specify your requirements

  • Requirement specification
  • E2E Tendering process
  • Provider validation

Start specification

2. CyberCompare tenders your requirements anonymously

  • Pre-selection based on our market insights
  • Leveraging the CyberCompare database
  • Identification of 5-6 relevant vendor
  • Tendering along the defined criteria

Understand our selection process

3. We provide you with an objective comparison of provider offerings

  • Consolidation of vendor information and preparation of a report with clear recommendations
  • Result presentation of the report
  • Pre-selection of 1-2 favours by customers

View example

4. You make the last decision with our support

  • Favourite providers present themselves in person to the customer
  • Customer makes his final decision
  • Accompaniment of interactions between customer and provider

Book an appointment

Perspective from one of our experts

Two issues are fundamental for an ISMS implementation. 1. The management 100% support the implementation; the success of an ISMS stands and falls with this. 2. Feasibility – start lean and optimize step by step.

Read the full interview

Denis Schorr

Managing Director GORISCON GmbH


Make an appointment and compare providers for ISMS – especially for your case!

Contact our expert


Simeon Mussler

COO Bosch CyberCompare

+49 (0)711 811-19893


A security organization forms the foundation for the next steps

“GRC stands for ‘Governance Risk & Compliance’ and is therefore an overarching tool for effectively recording and tracking corporate risks and for managing important governance topics such as regulations and internal standards and implementing compliance requirements. Information security is a relevant topic, but not the only one.
An ISMS is a system that focuses specifically on information security management. It serves the CISO or CIO in tracking risks and measures.
Reasons for an implementation can be manifold, e.g. triggered by certifications according to ISO27001, or by external customer requirements such as TISAX.”