Endpoint Protection Metrics Summary Template

Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.

Cloud Security Communication Deck

Use this template to outline the organization’s security understanding and requirements of the proposed cloud migration.

Information Security Training Tool

Use this tool to determine your organization’s security training and awareness needs to begin building your training and awareness program.

IaaS and PaaS Service Level Agreement Template

Use this template to document the specific security requirements of your potential IaaS or PaaS vendor.

Security Governance and Management Target State Framework and Gap Analysis

Use this tool to build your target state information security governance and management framework and conduct a gap analysis.

The Shadow Brokers – Details on Leaked Cyberintelligence Tools and Vulnerabilities

This Info-Tech briefing will provide a synopsis of what the Shadow Brokers leak might mean for users and organizations, and what actions can be taken in response to this...

APT10 & Operation Cloud Hopper – Exposing a Global Cyberespionage Campaign

Your managed IT service providers may be leaving you vulnerable.

Security Governance and Management Implementation Roadmap

Use this tool to build a roadmap to help you reach your target state.

Tiered Data Center Organization Enhances Security and Performance

Businesses continue to benefit by offering shared access data centers to partners, suppliers, and clients. The issue in this method of organization is ensuring that each...

PDA Usage Policy

The PDA usage policy outlines standards for connecting to company network(s) or related technology resources via any means involving mobile devices that are categorized...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us