i2ACT 800 Products

Overview of i2ACT 800 Cybersecurity Assessment Software Tools


i2ACT Product Overview

Imprimis Assessment and Compliance Tools


Imprimis started the development of the Imprimis Inc. (i2) Assessment and Compliance Tool (ACT) for the NIST (SP) 800 standards in 2010 and the tool has gone through a number of releases and continues to evolve.  The tool is named  i2 ACT-800 (Imprimis Inc. Assessment and Compliance Tool) where the 800 refers to the NIST 800 special publication series of standards.


** The current release is version 3.6.2, and version 4.0 is under development and will include

the mandated DoD CMMC requirements scheduled for release in early Q2 of 2020. **


There are multiple versions of the i2ACT-800:

  • The i2 ACT-800 Pro Tool contains all the controls from the NIST 800-53 catalog of controls, NIST 800-171, DAAPM, and CNSSI 1253, and  contains over 50 preconfigured baselines. 
  • The second tool is the i2 ACT-800s which is dedicated to the NIST 800-171 standard required by the DFARS 204.73 regulations. 
  • Imprimis also developed an i2ACT 800 Rollup Tool to allow the viewing and analysis of up to 100 separate assessments at any time.
The tools easily operate on laptops or desktops.  The tool is built on Microsoft Access but can run with SQL server if required.  The runtime version is used where possible so that no special software requirements are imposed on the use.  In addition, the tool is available in 2016 MSI (Microsoft Installer) 32 bit and 64-bit versions, and 2019 and Office 365 CTR (Microsoft Click to Run) in both 32- and 64-bit versions.


What are the Major Advantages of the i2ACT-800?

Originally, the i2ACT-800 was developed as a productivity tool to reduce the time required for assessments.  It was very successful at streamlining the process and minimizing labor.  But the tool has evolved resulting in three major benefits:


  1. Productivity Enhancement: The tool speeds the process and allows collaboration with multiple staff members, so assessments take a fraction of the time they previously did;
  2. Learning and Training: The tool contains many references and explanations of the cybersecurity requirements which allows first-time assessors to spin up in much less time and work with far greater accuracy, and allows experienced assessors to increase the depth of their knowledge; and
  3. Document Management System: Assessing and demonstrating compliance requires a great deal of record keeping from policies and procedures to screen shots of settings, scans, logs, and other sources of information that demonstrate compliance. All such documents are contained permanently in the database in a logical easily access file system for auditor, future assessments and training.