Internet Acceptable Use Policy

Internet usage is both a necessary tool and a potential distraction and security risk. With capabilities of the Internet and users advancing daily, it is important for...

SIEM RFP Template

Use this template to help create a request for proposal (RFP) for a Security Information & Event Management (SIEM) solution according to your enterprise requirements.

Firewall Policy

Use this policy template to define and support your organization's firewall operations management.

Server Backup Policy

The server backup policy protects data from loss or destruction in IT departments within companies. Without a server backup policy, a company’s assets are not as safe as...

Email Acceptable Use Policy

The email acceptable use policy outlines the standards for appropriate use of corporate email accounts.

SIEM Vendor Shortlist and Detailed Analysis Tool

This tool allows enterprises to generate a customized shortlist of Security Information & Event Management (SIEM) vendors based on required capabilities and future...

Server Configuration Policy

The server configuration policy establishes the standards, procedures, and restrictions for new servers being installed within the company.

Blowing up the status quo: Brexit will impact IT in the UK and beyond

The Brexit vote says Leave. UK-based IT leaders must start to plan for a potentially new era of trans-border data flow and the availability of IT staff. Those in the rest...

SIEM Vendor Demo Script

This template is designed to provide Security Information & Event Management (SIEM) vendors with a consistent set of instructions to ensure an objective comparison of...

Data Source Inventory Tool

The Data Source Inventory Tool will help you document relevant information pertaining to each data source to act as a point of reference document.
GET HELP Contact Us
×
VL Methodology