Security - Tools

IAM Use-Case Fit Assessment Tool

This tool asks a series of targeted questions that will help you determine the use-case scenarios that align with your organization's specific requirements for identity...

IAM Vendor Shortlist & Detailed Feature Analysis Tool

This tool allows enterprises to profile their identity and access management requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors.

IAM System Evaluation and RFP Scoring Tool

A key component of any evaluation is a request for proposal (RFP). Gathering and scoring the various responses to an RFP can be difficult and time consuming. This tool...

Security Compliance Translator Tool

This tool will allow you to review the security compliance requirements of HIPAA and SOX, and identify where there are existing gaps.

Security Compliance Roadmap Tool

To close any existing security compliance gaps, focus on prioritizing gap initiatives and then creating a formal roadmap to ensure responsibility and timelines are...

Risk Register Tool

This is a dynamic tool that captures identified risks, assesses their severity based on your organization's risk appetite, and documents risk response actions. Use this...

Risk Costing Tool

It’s impossible to make intelligent decisions about risks without knowing what they’re worth. Use Info-Tech’s Risk Costing Tool to calculate the expected cost of IT’s...

Vulnerability Tracking Tool

This tool will allow you to track vulnerabilities from when they are identified to when they are fully remediated. This is a straightforward documentation tool meant for...

CISO Core Competency Evaluation Tool

Use this tool to identify which competencies are most important to your organization, and what your current proficiency is in each competency.

Security Process and Technology Assessment Tool

Use this tool to create a comprehensive, high-level view of your information security process and technology maturity.
GET HELP Contact Us
×
VL Methodology