Data Center Access Policy

The data center access policy will outline the standards for regulating access to the company data center(s).

Instant Messaging Usage and Security Policy

The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.

PDA Usage Policy

The PDA usage policy outlines standards for connecting to company network(s) or related technology resources via any means involving mobile devices that are categorized...

Removable Media Acceptable Use Policy

The removable media acceptable use policy defines the standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable...

Document Retention Policy

The document retention policy ensures that copies of certain documents for legal, regulatory, and/or operations reasons are made, committing companies to good business...

SIEM Vendor Demo Script

This template is designed to provide Security Information & Event Management (SIEM) vendors with a consistent set of instructions to ensure an objective comparison of...

SIEM Appropriateness Tool

This tool helps the enterprise determine whether a SIEM solution is appropriate for the organization.

Lenovo, Superfish, MITM attacks, and SSL Interception: the Bigger Picture

Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.

Data Audit Scorecard

The Data Audit Scorecard identifies the areas in which the health of your data can be modified for improvement. Use this template to see where you fall short so you can...

Don’t Be Shellshocked - Eliminate the Security Risks of Shellshock Quickly

Eliminate the security risks of Shellshock quickly. A brief research note for Info-Tech’s members.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us