91ÖÆÆ¬³§

Tagged - asset management

Asset Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Kenna Security Releases Tool for the Custom Benchmarking of Vulnerability Management Programs

On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their...

Rapid7 Penetration Tests Show That Businesses Are Getting Better at Network Security

We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at...

Responsibly Resume IT Operations in the Office – Phase 5: Prioritize Your Tasks and 91ÖÆÆ¬³§ the Roadmap

Once you've identified IT's supporting tasks, it's time to prioritize. This phase walks through the activity of prioritizing based on cost/effort, alignment to business,...

Qualys VMDR Is Now Live: Increasing Security Threats Requires Strong Vulnerability Management Software

Qualys VMDR has hit the live market. Originally unveiled in February 2020 at Qualys Security Conference, VMDR is now publicly available as of April 16, 2020. Partnering...

Qualys Unveils Its New Vulnerability Management, Detection, and Response Matrix

Qualys’ newest product, VMDR (Vulnerability Management, Detection, and Response), will be available in March and will provide an all-in-one cloud-based solution for...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us