This worksheet allows enterprises to profile their email security gateway (ESG) requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors....
|
|
Issuing an RFP to vendors is a critical step in your email security gateway solution selection process.
|
|
Allowing vendors to run a product demonstration without your guidance will only highlight their strengths and present a subjective and skewed view of their product offering.
|
|
This is a brief research note for Info-Tech’s members about the Heartbleed bug, i.e. the first security vulnerability with worldwide impact and response. Understand which...
|
|
This template is designed to provide EPP vendors with a consistent set of instructions, ensuring an objective comparison of product features, all while evaluating ease of...
|
|
Use the Data Audit Interview Schedule to ensure you organize interviews with the proper data audit participants.
|
|
Use this template to document the specific security requirements of your potential SaaS vendor.
|
|
This Blueprint will help you establish a well-designed system of internal controls that helps the IT department operate as intended by mitigating its greatest risks.
|
|
This tool will give you an assessment of your current control coverage and help you determine the types of controls required to mitigate your risks.
|
|
The audit log review policy will outline the standards across company systems for the review of audit logs.
|
|