Security Risk, Strategy & Governance

Enterprise Anti-Malware Evaluation & RFP Response Tool

For organizations that have issued a formal Request for Proposal (RFP) to evaluate enterprise anti-malware vendors, gathering and scoring the various responses can be...

Data Center Access Policy

The data center access policy will outline the standards for regulating access to the company data center(s).

Quick Wins Save 5% Now!

Do you need to make a difference this week? This month? Take a look at these tactics and tools to build your guerilla plan.

Data Audit Stakeholder Interview Guide

Data owners, data stewards, and end users are the ones who use the data on a day-to-day basis and will be able to provide the best information regarding ongoing data...

Top Level Domain Authorities Implementing DNSSEC

On May 5, 2010 top level domain authorities, such as ICANN, VeriSign, and others will implement the first phase of a DNSSEC (Domain Name System Security Extensions)...

IP Video Security Projects Put the Onus on IT

IP-based video surveillance offers a number of operational advantages over legacy Closed Circuit TV (CCTV) monitoring systems and has become the basis for most new...

Network Printers Represent Serious Security Vulnerability

Most large printers, since 2002, contain physical hard drives used to queue up items to be printed, scanned, copied, faxed and e-mailed by the machine. Ensure that your...

Develop and Deploy Security Policies

Comprehensively developed and effectively deployed security policies enable IT professionals to work pro-actively rather than reactively, benefitting the entire...
  • guided implementation icon

Backup Operating Procedures Template

Use this Backup Operating Procedures Template in conjunction with the Optimize Backup Operations with a Recovery Services Plan Storyboard to document operating procedures...

IT Security 101

IT security is often overlooked and misunderstood by enterprises. Many feel that they have nothing worth stealing and any money spent on security is a wasted investment....
GET HELP Contact Us
×
VL Methodology