Security Technology & Operations

Network Printers Represent Serious Security Vulnerability

Most large printers, since 2002, contain physical hard drives used to queue up items to be printed, scanned, copied, faxed and e-mailed by the machine. Ensure that your...

Endpoint Encryption Evaluation & RFP Response Tool

This tool is pre-built with the essential criteria that should be considered when evaluating RFP responses. Use this tool to put hard numbers behind vendor claims, and...

Develop and Deploy Security Policies

Informal, un-rationalized, ad hoc policies are ineffective because they do not explicitly outline responsibilities or compliance requirements, and they are rarely...
  • guided implementation icon

Data Center Access Policy

The data center access policy will outline the standards for regulating access to the company data center(s).

Top Level Domain Authorities Implementing DNSSEC

On May 5, 2010 top level domain authorities, such as ICANN, VeriSign, and others will implement the first phase of a DNSSEC (Domain Name System Security Extensions)...

Quick Wins Save 5% Now!

Do you need to make a difference this week? This month? Take a look at these tactics and tools to build your guerilla plan.

Anti-Virus Policy

The anti-virus policy provides a computing network that is virus-free; this policy provides instructions on measures that must be taken by company employees to help...

Document Retention Policy

The document retention policy ensures that copies of certain documents for legal, regulatory, and/or operations reasons are made, committing companies to good business...

Instant Messaging Usage and Security Policy

The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.

Enterprise Anti-Malware Evaluation & RFP Response Tool

For organizations that have issued a formal Request for Proposal (RFP) to evaluate enterprise anti-malware vendors, gathering and scoring the various responses can be...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us