Info-Tech's Security Policy templates allow you to easily develop new policy documents.
|
|
This template is designed to provide EPP vendors with a consistent set of instructions, ensuring an objective comparison of product features, all while evaluating ease of...
|
|
Use this template to document the specific security requirements of your potential SaaS vendor.
|
|
Internal controls are only as effective as their level of adoption. Use this template to ensure that users are aware and compliant with internal controls.
|
|
Use this template as the one document where your metrics and their definitions live, and update it as needed.
|
|
Looking for a vulnerability scanning tool? Use this Request for Proposal (RFP) template to get you started.
|
|
Use this template to thoroughly outline details of the data classification program, including classification levels, data handling requirements, and disclaimers.
|
|
Use this template to take a lean approach to scoping initiatives during planning stages and tracking its progress during its execution.
|
|
Ensure proper project management and stakeholder support from the start of your project by properly planning and scoping your identity and access management solution.
|
|
This template is designed to provide IAM vendors with a consistent set of instructions, ensuring an objective comparison of product features – all while evaluating ease of...
|
|