Vendor Management

Hardware Sanitization Policy

The hardware sanitization policy protects the intellectual property of an organization’s confidentiality and personal information.

Data Center Access Policy

The data center access policy will outline the standards for regulating access to the company data center(s).

Quick Wins Save 5% Now!

Do you need to make a difference this week? This month? Take a look at these tactics and tools to build your guerilla plan.

Top Level Domain Authorities Implementing DNSSEC

On May 5, 2010 top level domain authorities, such as ICANN, VeriSign, and others will implement the first phase of a DNSSEC (Domain Name System Security Extensions)...

Electronic Document Management ROI Calculator

Return on Investment (ROI) calculations are an important part of any Electronic Document Management (EDM) deployment strategy. Pre-deployment ROI calculations outline...

IP Video Security Projects Put the Onus on IT

IP-based video surveillance offers a number of operational advantages over legacy Closed Circuit TV (CCTV) monitoring systems and has become the basis for most new...

Endpoint Encryption Evaluation & RFP Response Tool

This tool is pre-built with the essential criteria that should be considered when evaluating RFP responses. Use this tool to put hard numbers behind vendor claims, and...

Office 365 Product and Functionality Landscape for 2017

IT shops in small and medium-sized businesses must be aware of new product features and capabilities. Staying conscious of changes is essential to evaluating their degree...

User Experience Lead

The User Experience Lead will be responsible for overseeing and contributing to the end-to-end user experience solution designs, ensuring that the user experience vision...

Video: Software Asset Management

Implement Software Asset Management to reduce costs and improve processes.
GET HELP Contact Us
×
VL Methodology