Data Center Access Policy

The data center access policy will outline the standards for regulating access to the company data center(s).

The Philippines for Outsourced IT Services

IT professionals who are interested in outsourcing application development, maintenance, or helpdesk services offshore have many geographic locations to choose from. The...

Implement Systems Management to Improve Availability and Visibility

This blueprint will help you implement a systems management solution to improve availability and visibility.
  • guided implementation icon

Succession Management Matrix

If you don't have a strategy for replacing those "irreplaceable" people in your IT department, you could be setting yourself up for disaster. A succession management...

Backup Operating Procedures Template

Use this Backup Operating Procedures Template in conjunction with the Optimize Backup Operations with a Recovery Services Plan Storyboard to document operating procedures...

IT Security 101

IT security is often overlooked and misunderstood by enterprises. Many feel that they have nothing worth stealing and any money spent on security is a wasted investment....

Employee Termination Process Checklist – IT Security Example

Use flowcharts and checklists to create effective SOP documents.

DRP Workbook

Record DRP information including document storage and contact/role information.

Disaster Recovery Primary Site Restoration: Home Sweet Home

Establishing operations at the recovery site is only the first half of the work involved in disaster recovery. At some point, services and systems must be returned to...

Quick Wins Save 5% Now!

Do you need to make a difference this week? This month? Take a look at these tactics and tools to build your guerilla plan.
GET HELP Contact Us
×
VL Methodology