91Ƭ

Security Technology & Operations - Tools

IAM Use-Case Fit Assessment Tool

This tool asks a series of targeted questions that will help you determine the use-case scenarios that align with your organization's specific requirements for identity and...

IAM Vendor Shortlist & Detailed Feature Analysis Tool

This tool allows enterprises to profile their identity and access management requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors.

SIEM Appropriateness Tool

This tool helps the enterprise determine whether a SIEM solution is appropriate for the organization.

Internal Controls Effectiveness Scorecard

The only way to know if your controls are providing adequate coverage is to measure them over time. This tool will give you insight into the continued relevance of your...

Internal Controls Prioritization Tool

This tool will give you an assessment of your current control coverage and help you determine the types of controls required to mitigate your risks.

Information Security Training Tool

Use this tool to determine your organization’s security training and awareness needs to begin building your training and awareness program.

Security Governance and Management Implementation Roadmap

Use this tool to build a roadmap to help you reach your target state.

Security Governance and Management Target State Framework and Gap Analysis

Use this tool to build your target state information security governance and management framework and conduct a gap analysis.

Security Governance and Management Metrics Tool

This tool will help you build a security metrics program.

Endpoint Encryption Evaluation & RFP Response Tool

This tool is pre-built with the essential criteria that should be considered when evaluating RFP responses. Use this tool to put hard numbers behind vendor claims, and keep...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us