Security Risk, Strategy & Governance

DR Team Build Sheet

Recovering from a disaster cannot occur without having key people in place to bring system, equipment, and services back online. Use this worksheet to identify team...

Peer Survey Results Overview April 2011

Info-Tech recently conducted several surveys for our research projects. This document is a high level summary of those results and an introduction to the resulting research.

Endpoint Encryption Solution RFP Template

Issuing RFPs is a critical step in your vendor selection process. This RFP template comes populated with important elements you don't want to forget. A detailed RFP saves...

Endpoint Encryption Evaluation & RFP Response Tool

This tool is pre-built with the essential criteria that should be considered when evaluating RFP responses. Use this tool to put hard numbers behind vendor claims, and...

Enterprise Anti-Malware Evaluation & RFP Response Tool

For organizations that have issued a formal Request for Proposal (RFP) to evaluate enterprise anti-malware vendors, gathering and scoring the various responses can be...

Select an E-mail Archiving Solution with Confidence

The e-mail archiving market is a confusing mixture of storage vendors, compliance and e-discovery vendors, security vendors, and e-mail platform vendors. To complicate...

Quick Wins Save 5% Now!

Do you need to make a difference this week? This month? Take a look at these tactics and tools to build your guerilla plan.

Top Level Domain Authorities Implementing DNSSEC

On May 5, 2010 top level domain authorities, such as ICANN, VeriSign, and others will implement the first phase of a DNSSEC (Domain Name System Security Extensions)...

Network Printers Represent Serious Security Vulnerability

Most large printers, since 2002, contain physical hard drives used to queue up items to be printed, scanned, copied, faxed and e-mailed by the machine. Ensure that your...

IP Video Security Projects Put the Onus on IT

IP-based video surveillance offers a number of operational advantages over legacy Closed Circuit TV (CCTV) monitoring systems and has become the basis for most new...
GET HELP Contact Us
×
VL Methodology