Security Technology & Operations - Tools

SIEM Vendor Shortlist and Detailed Analysis Tool

This tool allows enterprises to generate a customized shortlist of Security Information & Event Management (SIEM) vendors based on required capabilities and future...

Enterprise Anti-Malware Evaluation & RFP Response Tool

For organizations that have issued a formal Request for Proposal (RFP) to evaluate enterprise anti-malware vendors, gathering and scoring the various responses can be...

Endpoint Encryption Evaluation & RFP Response Tool

This tool is pre-built with the essential criteria that should be considered when evaluating RFP responses. Use this tool to put hard numbers behind vendor claims, and...

Security Governance and Management Implementation Roadmap

Use this tool to build a roadmap to help you reach your target state.

Security Governance and Management Target State Framework and Gap Analysis

Use this tool to build your target state information security governance and management framework and conduct a gap analysis.

Security Risk Register Tool

This tool will allow you to collect, analyze, and combine individual risks and view the aggregate level of risk within the organization, including how it compares to your...

Security Incident Metrics Tool

Identify relevant metrics to assist in evaluating the success of your organization's incident response processes.

Security Policy Prioritization Tool

The Security Policy Prioritization Tool helps your organization prioritize your policy suite based on Importance, Ease to Implement and Ease to Enforce.

Security Pressure Posture Analysis Tool

Security pressure posture analysis helps your organization assess your real security context and enables your organization to invest in the right security functions while...

Privileged Access Management (PAM) ROI Calculator

The purpose of the Privileged Access Management (PAM) ROI Calculator is to help organizations get an estimation of the tangible benefits of implementing a PAM solution by...
GET HELP Contact Us
×
VL Methodology