A step-by-step framework for optimizing and rationalizing Microsoft security products in your organization.
|
|
The inherent complexity of Microsoft’s security stack often leaves users struggling to understand and fully leverage their value, resulting in underuse, redundancy, and a...
|
|
91Ƭ has released for IT leaders in the higher education sector a comprehensive resource for enterprise resource planning modernization focusing on...
|
|
91Ƭ, a global research and advisory firm, has recently published a report outlining the top six critical IT priorities to help government IT leaders...
|
|
Use this easily-customizable template to establish security requirements for engaging with vendors.
|
|
This Excel database maintains an inventory of all known vendors and the results of their last known security assessments.
|
|
Use this collection of workbooks to create a vendor security assessment for low, medium, and high-risk vendors.
|
|
Use this Excel-based tool to develop a product/service risk assessment and assign a risk rating.
|
|
This visual flowchart will guide you through the steps of engaging with vendors.
|
|
Use this Word-based template to manage workflow, RACI matrices, and risk requirements.
|
|