Security Technology & Operations - Tools

Enterprise Anti-Malware Evaluation & RFP Response Tool

For organizations that have issued a formal Request for Proposal (RFP) to evaluate enterprise anti-malware vendors, gathering and scoring the various responses can be...

Endpoint Encryption Evaluation & RFP Response Tool

This tool is pre-built with the essential criteria that should be considered when evaluating RFP responses. Use this tool to put hard numbers behind vendor claims, and...

Security Governance and Management Metrics Tool

This tool will help you build a security metrics program.

Security Governance and Management Target State Framework and Gap Analysis

Use this tool to build your target state information security governance and management framework and conduct a gap analysis.

Security Governance and Management Implementation Roadmap

Use this tool to build a roadmap to help you reach your target state.

Information Security Training Tool

Use this tool to determine your organization’s security training and awareness needs to begin building your training and awareness program.

Internal Controls Prioritization Tool

This tool will give you an assessment of your current control coverage and help you determine the types of controls required to mitigate your risks.

Internal Controls Effectiveness Scorecard

The only way to know if your controls are providing adequate coverage is to measure them over time. This tool will give you insight into the continued relevance of your...

Privileged Access Management (PAM) ROI Calculator

The purpose of the Privileged Access Management (PAM) ROI Calculator is to help organizations get an estimation of the tangible benefits of implementing a PAM solution by...

SIEM Appropriateness Tool

This tool helps the enterprise determine whether a SIEM solution is appropriate for the organization.
GET HELP Contact Us
×
VL Methodology