All Research

Master Data Mapping Tool

This tool helps your team create a comprehensive document of all the data elements involved in your master data records.

Crucial IT Process Areas and the Pit of Despair: Lessons from Leaders and Laggards

Leading IT organizations put more emphasis on IT processes such as asset management, cost optimization, and business value. But there’s a surprise. They put less emphasis...

Master Contract Review and Negotiation for Software Agreements

Review your software contracts to leverage your unique position during negotiations and find substantial cost savings.
  • guided implementation icon

Security Incident Management Plan

Formalize the security incident management program by defining a central, high-level guide to describe goals, roles, and responsibilities, as well as the process that...

EUC Strategy and Roadmap Template

Use this template to document your end-user computing strategy in detail.

EUC Strategy Communications Template

Use this template as a starting point for external communications regarding your end-user computing strategy.

Business Process Improvement Workbook

Use this template to document and collect the data outputs from the Create a Winning BPI Playbook blueprint.

Process Mapping Guide

Use this step-by-step guide to understand the best practices surrounding process mapping.

Threat Intelligence Policy Template

The purpose of this policy is to set the requirements for proper facilitation and operation of the threat intelligence program.

Threat Intelligence Malware Runbook Template

Threats can be categorized into runbooks for which a standardized response process can be defined, eliminating inconsistency and ambiguity while increasing operational...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us