|
This tool allows enterprises to profile their identity and access management requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors.
|
|
|
A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...
|
|
|
A key component of any evaluation is a request for proposal (RFP). Gathering and scoring the various responses to an RFP can be difficult and time consuming. This tool...
|
|
|
This template is designed to provide IAM vendors with a consistent set of instructions, ensuring an objective comparison of product features – all while evaluating ease of...
|
|
|
This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on phishing.
|
|
|
This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on web usage.
|
|
|
This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on physical computer...
|
|
|
This gamification guide will help you create a gamification strategy for security awareness and training by running through six simple steps.
|
|
|
This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on cyber attacks.
|
|
|
This template is meant to demonstrate how security responsibilities can be incorporated into a job description for any employee in order to build security accountability...
|
|