In most cases, using a phased implementation approach for Security Policy allows enterprises to begin to reap policy benefits quickly without causing the massive culture shift associated with an en masse deployment. Determining which Policies to implement in what order becomes key to the success of such a deployment.

Info-Tech's Security Policy Implementation tool will help you determine that order based on:

  • The magnitude of the impact of the policy on enterprise security.
  • The magnitude of the impact of the policy on day-to-day user activity.
  • The relative cost in terms of time and dollars.

Use this tool to plan for the deployment of the enterprise Security Policy in a way that maximizes benefits and minimizes pain.

Related Content


  • Missing comment
    Tommy Pryor | 06-15-2010

    Great stuff!!

  • Missing comment
    Ron Winacott | 02-13-2012

    Great stuff. One problem, the link to the "Security Infrastructure Policy template" points at the "Systems Monitoring & Auditing Policy template". But a quick search found the right one:

    • 524813cde9e31b150885f5506a5f3e1e comment
      Info-Tech Research Group | 02-13-2012

      Thanks for your feedback; we appreciate you letting us know. The link in the tool has now been updated.


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019