Security Governance and Management Implementation Roadmap

Use this tool to build a roadmap to help you reach your target state.

Security Governance and Management Target State Framework and Gap Analysis

Use this tool to build your target state information security governance and management framework and conduct a gap analysis.

The Shadow Brokers – Details on Leaked Cyberintelligence Tools and Vulnerabilities

This Info-Tech briefing will provide a synopsis of what the Shadow Brokers leak might mean for users and organizations, and what actions can be taken in response to this...

APT10 & Operation Cloud Hopper – Exposing a Global Cyberespionage Campaign

Your managed IT service providers may be leaving you vulnerable.

Information Security Training Tool

Use this tool to determine your organization’s security training and awareness needs to begin building your training and awareness program.

Mobile Device Remote Wipe Waiver Template

Having the ability to remote wipe is one of the most basic tools in IT's arsenal for securing mobile devices. Use this remote wipe waiver template to create a document...

Don’t Be Shellshocked - Eliminate the Security Risks of Shellshock Quickly

Eliminate the security risks of Shellshock quickly. A brief research note for Info-Tech’s members.

Security Governance and Management Metrics Tool

This tool will help you build a security metrics program.

Endpoint Protection Request for Proposal

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

Splashtop Remote Support Partners With Bitdefender

Splashtop integrates its Remote Support with Bitdefender’s antivirus software to offer enhanced security to its customer endpoints from the Splashtop console.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us