|
This phase of the blueprint, Build a Vendor Security Assessment Service, will help you implement the process and develop metrics to measure effectiveness.
|
|
|
This Excel database maintains an inventory of all known vendors and the results of their last known security assessments.
|
|
|
Use this collection of workbooks to create a vendor security assessment for low, medium, and high-risk vendors.
|
|
|
Use this Excel-based tool to develop a product/service risk assessment and assign a risk rating.
|
|
|
This phase of the blueprint, Build a Vendor Security Assessment Service, will help you develop procedures and tools to assess vendor risk.
|
|
|
This phase of the blueprint, Build a Vendor Security Assessment Service, will help you determine your business requirements and build your process to meet them.
|
|
|
This storyboard will help you define and plan your journey to implementing a right-sized vendor security assessment process.
|
|
|
Read this Executive Brief to understand why vendor security risk management is becoming an increasing concern for companies and regulators, and what you can do about it.
|
|
|
Use this TCO and ROI calculator to compare costs and benefits when examining various endpoint protection solutions.
|
|
|
Looking for a vulnerability scanning tool? Use this Request for Proposal (RFP) template to get you started.
|
|