Security Risk, Strategy & Governance

Information Security Service Catalog

Use this Security Service Catalog Template to help you track the various services being offered by your security program.

Policy Exception Tracker

Use this tool to help you track ongoing exceptions to your security policies.

Information Security Policy Exception Request Form

Use this template as a means to request and approve proposed exceptions to your security policies.

Security Policy Exception Approval Workflow

Use this workflow to help you formalize and document your policy exception approval process.

Business Goal Metrics Tracking Tool

Use this tool to help track and demonstrate the organizational goals your security program supports.

Titus’ Timely Release of Illuminate 2020 Pushes Privacy Angle

In early March, Titus released Titus Illuminate 2020, which was the company’s answer to the question of analyzing data at rest. This latest version of Illuminate...

Varonis Moves Beyond Simple Data Classification to Provide a Privacy Perspective

In the data discovery and classification sphere, Varonis has long been associated with impressive features and a user-friendly approach to platform integration. The...

Spirion Supports Shift to Remote Work with Data Security Offering

A leader in the data security and privacy industry, Spirion presents its swift response to the changing landscape of COVID-19 through a no-cost offering of data security...

Egnyte Protect Platform Provides Unique and Effective Cloud-Based Approach to Data Classification and Security

Egynte, a player in the cloud enterprise content management space since 2007, has recently emerged as a multi-faceted Software as a Service (SaaS) offering, now providing...

Zecurion DLP 10 New Features: User Behavior Analytics

Among the full set of features available in Zecurion’s new DLP product is the ability to perform user behavior analytics to help spot data loss events before they occur.
GET HELP Contact Us
×
VL Methodology