Security Technology & Operations

Darktrace Antigena Expands Its Network Radius

Darktrace launches new modules to its autonomous response product, Darktrace Antigena, to expand its network coverage to cloud (AWS and Azure), email (Office 365), and...

Defend Against Suspicious Users With CylancePERSONA

This month, BlackBerry Cylance introduces CylancePERSONA, a user behavior detection and response platform, to address the growing pains of user impersonation and valid...

OneTrust Launches Vendorpedia, a Combined Security and Privacy Third-Party Risk Exchange

At the 2019 RSA Conference, OneTrust announced Vendorpedia, billed as the only security and privacy third-party risk exchange. However, it will need to increase its...

CrowdStrike Introduces CrowdStrike Store to Third-Party Applications

Falcon clients have the opportunity to optimize their security stack through pre-built and trusted third-party applications. This significantly alleviates the...

Vendor Security Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to develop a questionnaire for potential vendors to assess their...

Build a Vendor Security Assessment Service – Phase 2: Develop Assessment Methodology

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you develop procedures and tools to assess vendor risk.

Service Risk Assessment Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, to assess the risk associated with purchasing a product or service.

Build a Vendor Security Assessment Service – Phase 1: Define Governance and Process

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you determine your business requirements and build your process to meet them.

Vendor Security Assessment Inventory

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to inventory vendors and the results of their security assessments.

Build a Vendor Security Assessment Service – Phase 3: Deploy and Monitor Process

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you implement the process and develop metrics to measure effectiveness.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us