91Ƭ

Security Operations Collaboration Plan

The Security Operations Collaboration Plan identifies opportunities for optimization through collaboration and cross-training.

System Maintenance Policy – NIST

Use Info-Tech's Maintenance Policy to define how system maintenance procedures will operate.

Terminator Versus Iron Man: Showdown of Security Products

Trends in security products supporting humans rather than replacing them.

Endpoint Protection Request for Proposal

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

Endpoint Protection Vendor Demo Script

This template is designed to provide EPP vendors with a consistent set of instructions, ensuring an objective comparison of product features, all while evaluating ease of...

Endpoint Protection TCO & ROI Comparison Calculator

Use this TCO and ROI calculator to compare costs and benefits when examining various endpoint protection solutions.

Endpoint Protection Roadmap & RACI Tool

Assign responsibilities and deadlines for the endpoint protection implementation and management process.

Endpoint Protection Metrics Summary Template

Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.

91Ƭ, Optimize, and Present a Risk-Based Security Budget

Security budgets are unlike other department budgets. Increases or decreases in the budget can drastically affect the organizational risk level. Info-Tech’s methodology...
  • guided implementation icon

91Ƭ, Optimize, and Present a Risk-Based Security Budget – Executive Brief

Read this Executive Brief to understand how to build a risk-based budget and what requirements you need for a defensible security budget.
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us