| Services | About | News | Research Store | Contact |


  Securing your IT department - Enterprise Edition  
Step by Step guide to securing your IT department  

from our partners at InfoTech


Add to shopping cart


    SUMMARY ATA research   Contents

When the success of a project is critical, you need some insurance that it will be done right. The Best Practice Methodologies provide that insurance – they are step-by-step guides for specific IT projects, highlighting industry best practices, created by subject matter experts.

Highlights of the Security Enterprise Methodology:

  • Geared towards IT departments with more than 10 staff, mid- to large-sized organizations, and/or organizations with more complex systems
  • Robust, all-encompassing methodology to secure the IT environment of a mid- to large-sized organization
  • Comprehensive asset inventorying tools and procedures
  • Project management documents to facilitate the entire process 28 policies specifically geared towards implementing security governance
  • Security awareness programs for training end users (presentation tools and test)
  • Modular system that allows for easy task delegation
  • Entire section devoted to monitoring regulatory compliance

Step-by-step guide and auditing tools, “Securing Your IT Environment”, can help you successfully tackle your security challenges. This do-it-yourself resource will help you:

  • Access prescriptive auditing tools
  • Justify your security expenditures
  • Gain c-level compliance
  • Advance towards compliance



50 Templates - Word and Excel formats


Download Abstract


Add to shopping cart
Add to shopping cart

or order offline