This worksheet allows enterprises to profile their email security gateway (ESG) requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors....
|
1
|
This tool will give you an assessment of your current control coverage and help you determine the types of controls required to mitigate your risks.
|
1
|
The only way to know if your controls are providing adequate coverage is to measure them over time. This tool will give you insight into the continued relevance of your...
|
1
|
The Data Audit Scorecard identifies the areas in which the health of your data can be modified for improvement. Use this template to see where you fall short so you can...
|
1
|
Use this tool to identify the functional use cases that align with your business' future SIEM suite.
|
1
|
Use this tool to identify which competencies are most important to your organization, and what your current proficiency is in each competency.
|
1
|
Use this tool to create a comprehensive, high-level view of your information security process and technology maturity.
|
1
|
It’s impossible to make intelligent decisions about risks without knowing what they’re worth. Use Info-Tech’s Risk Costing Tool to calculate the expected cost of IT’s...
|
1
|
This tool asks a series of targeted questions that will help you determine the use-case scenarios that align with your organization's specific requirements for identity...
|
1
|
This tool allows enterprises to profile their identity and access management requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors.
|
1
|