All Research

Vendor Security Process Diagram

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to create a visual representation of your vendor due diligence process.

Build a Vendor Security Assessment Service – Phase 2: Develop Assessment Methodology

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you develop procedures and tools to assess vendor risk.

Service Risk Assessment Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, to assess the risk associated with purchasing a product or service.

Vendor Security Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to develop a questionnaire for potential vendors to assess their...

Vendor Security Assessment Inventory

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to inventory vendors and the results of their security assessments.

Build a Vendor Security Assessment Service – Phase 3: Deploy and Monitor Process

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you implement the process and develop metrics to measure effectiveness.

Vendor Security Requirements Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to provide potential vendors with contractual requirements related...

Prepare for Cognitive Service Management – Executive Brief

Read our concise Executive Brief to find out why you should prepare for cognitive service management, review Info-Tech’s methodology, and understand how we can support...

Prepare for Cognitive Service Management

Natural language processing and machine learning technologies have led to AI-assisted toolsets that promise dramatic IT operations improvements. Don’t fall prey to the...

Prepare for Cognitive Service Management – Storyboard

This blueprint introduces AI tools that affect IT operations, including chatbots and machine learning applications. It is useful for clients exploring these emerging...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us