Security - Tools

Control Framework Mapping Tool

This tool provides an easy cross-reference from Info-Tech's control framework to multiple NIST standard control frameworks.

Control Framework Mapping Reporting Tool

This tool generates reports based on mapping Info-Tech's control framework to multiple NIST standard control frameworks.

IAM Vendor Shortlist & Detailed Feature Analysis Tool

This tool allows enterprises to profile their identity and access management requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors.

IAM System Evaluation and RFP Scoring Tool

A key component of any evaluation is a request for proposal (RFP). Gathering and scoring the various responses to an RFP can be difficult and time consuming. This tool...

SIEM Use-Case Fit Assessment

Use this tool to identify the functional use cases that align with your business' future SIEM suite.

Information Security Requirements Gathering Tool

Align your security projects properly by clearly defining business needs, and customer/compliance obligations, as well as documenting scope, boundaries, and risk tolerance.

Information Security Pressure Analysis Tool

Security pressure posture analysis helps your organization assess your real security context and enables you to invest in the right security functions while balancing the...

Incident Response Maturity Assessment Tool

The Incident Response Maturity Assessment Tool will help you systematically understand your current security state. Based on Info-Tech's maturity model, evaluate the...

Service Risk Assessment Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, to assess the risk associated with purchasing a product or service.

Security Operations Preliminary Maturity Assessment Tool

At a high level, assess your organization’s operational maturity in each of the threat collaboration environment functions. Determine whether the foundational processes...
GET HELP Contact Us
×
VL Methodology