Security - Tools

Endpoint Protection Roadmap & RACI Tool

Assign responsibilities and deadlines for the endpoint protection implementation and management process.

Email Security Gateway Vendor Shortlist & Detailed Feature Analysis Tool

This worksheet allows enterprises to profile their email security gateway (ESG) requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors....

Control Framework Mapping Tool

This tool provides an easy cross-reference from Info-Tech's control framework to multiple NIST standard control frameworks.

IAM System Evaluation and RFP Scoring Tool

A key component of any evaluation is a request for proposal (RFP). Gathering and scoring the various responses to an RFP can be difficult and time consuming. This tool...

SIEM Use-Case Fit Assessment

Use this tool to identify the functional use cases that align with your business' future SIEM suite.

RBAC Implementation Workbook

Use this tool to build a role-based access control model for your organization. This tool also provides version control and metrics tabs to assist with long-term maintenance.

IAM Task Prioritization Tool

Use this tool to document and prioritize the tasks required to complete and implement the role-based access control model.

Information Security Requirements Gathering Tool

Align your security projects properly by clearly defining business needs, and customer/compliance obligations, as well as documenting scope, boundaries, and risk tolerance.

Security Architecture Recommendation Tool

This tool guides organizations in evaluating the complexity of their IT environment, their operational maturity, and the perceived value of security architecture. It then...

Mitigation Effectiveness Assessment Tool

To ensure that your security controls are right-sized to your threat landscape and the data you are protecting, perform a detailed and accurate analysis that can guide...
GET HELP Contact Us
×
VL Methodology