Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged policy

Rss Feed Group items tagged

tech writer

ISO 27001 Toolkit | IT Governance | IT Governance UK - 0 views

  •  
    Expertly written customizable ISO 27001 templates to save you time and money in fulfilling your documentation obligations. Simplify your ISO 27001 documentation and speed up the certification process with more than 140 pre-written, customizable templates. Developed by the experts who led the first ISO 27001 certification project, this documentation toolkit contains all the mandatory documents you need to achieve ISO 27001 compliance, including: Statement of Applicability (SOA). Access Control Policy. Scope Statement. Secure Development Policy. Information Security Policy. Risk Assessment Procedure.
tech writer

Patch Management Policy Template | IT Governance UK - 0 views

  •  
    Create a patch management policy in minutes with this easy-to-use, customisable template, which can be tailored to your organisation's requirements and processes.
tech writer

ESET Endpoint Encryption Pro from 1 user, 1 Year - 0 views

  •  
    Simple and powerful encryption for businesses of all sizes Secure encryption of hard disks, removable media, files and email FIPS 140-2 validated 256-bit AES encryption for absolute security Hybrid, cloud-based management server for complete remote control of endpoint encryption keys and security policies Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT. How ESET encryption helps your business: Meet data security obligations by enforcing encryption policies without impacting productivity. Companies large and small benefit from low help desk costs and short deployment cycles. No other product comes close to ESET Endpoint Encryption in terms of flexibility or ease of use. The client side requires minimal user intervention and improves the compliance and security of our enterprise data from a single MSI package. The server side makes user and workstation management easy. It extends the protection of your business beyond the perimeter of your network.
tech writer

ISO 27001 Information Security Policy Template | IT Governance UK - 0 views

  •  
    Create an ISO 27001-compliant information security policy in minutes with our easy-to-use and customizable high-level template, developed by our expert ISO 27001 practitioners.
tech writer

EU General Data Protection Regulation (GDPR) Documentation Toolkit | IT Governance USA - 0 views

  •  
    Created by lawyers and practitioners, the GDPR Toolkit gives you the documentation and templates you need to achieve fast, cost-effective compliance. The GDPR toolkit you can trust - created by lawyers and practitioners so you can rely on the content. Pre-filled GDPR documentation pack so you can meet GDPR requirements quickly and avoid expensive consultancy fees. 80+ GDPR templates, including policies, procedures, and checklists, so you know everything is covered - easily demonstrate GDPR compliance while reducing implementation costs. Over 3,000 other customers - so you know you're in good company. The GDPR Toolkit can also be used for a CCPA compliance project! The GDPR and CCPA share many requirements, which means that you can tackle both compliance projects at the same time. The GDPR toolkit will help you put together the necessary privacy policies and procedures you need to tackle CCPA compliance much faster and more cost-effectively than starting from scratch.
tech writer

Designing and Implementing Cloud-Native Applications Using Microsoft Azure Cosmos DB (D... - 0 views

  •  
    Designing and Implementing Cloud-Native Applications Using Microsoft Azure Cosmos DB (DP-420) | Learning Tree - This course teaches developers how to create application using the SQL API and SDK for Azure Cosmos DB. Students will learn how to write efficient queries, create indexing policies, manage and provisioned resources, and perform common operations with the SDK.
tech writer

NordVPN | Online security starts with a click - 0 views

  •  
    Enjoy the leading VPN service on the planet. Block malware, ads, and trackers. Generate and keep strong passwords. Protect files in an encrypted cloud. Online VPN service that encrypts your internet traffic and hides your IP with your physical location. Upgrade your privacy and security now. NordVPN is a trusted online security solution, used by over 1 million Internet users worldwide. Military-grade encryption - NordVPN protects your Internet traffic with cutting-edge security technologies, ensuring strong and reliable encryption between your device and a VPN server. By default, NordVPN apps use the OpenVPN and IKEv2/IPSec protocols to guarantee the ultimate protection of your sensitive data. CyberSec - The CyberSec feature automatically blocks suspicious websites so that no malware or other cyber threats can infect your device. It also secures your device from participating in DDoS attacks even if malware has already infected it. In addition, CyberSec prevents intrusive online ads from loading and slowing down your browser. Secure streaming - NordVPN offers more than 4863 ultra-fast servers in 62 countries so that you can enjoy your streaming experience on any device, at any place, and at any time. With NordVPN, you don't have to choose between entertainment and online security - you can have both at the same time. Strict no-logs policy - NordVPN is based away from the EU and US jurisdictions and is not required to collect your data and information. That means nothing is recorded, monitored, stored, logged, or passed to third parties.
tech writer

Cyber Resilience Staff Awareness Suite - LMS SCORM Package | IT Governance UK - 0 views

  •  
    Educate employees on cyber security, cyber resilience, and data protection best practices and ensure everyone receives the same level and quality of training. SCORM-compliant cyber resilience staff awareness e-learning courses that you can upload to your LMS (learning management system). Ensure staff can adhere to cyber security (including phishing and ransomware), cyber resilience, and GDPR (General Data Protection Regulation) best practices. Test learner knowledge to prove compliance for auditing purposes. Train staff under one, manageable contract with these cost-effective, annual licenses. Developed by industry experts, our programs are updated every three months to ensure the content remains relevant. Customize the courses by adding links to company documents, policies, and procedures. Fast deployment with instant access to all the courses. Reinforce awareness with monthly security updates, which include the latest news and tips.
tech writer

Cloud Security Toolkit - ISO 27017 & ISO 27018 | IT Governance UK - 0 views

  •  
    Start the journey to ISO 27017 and ISO 27018 compliance for Cloud services security with customizable templates, documents, policies, and records. Designed to integrate with our ISO 27001 DocumentKits toolkit to ensure you have complete control over the security of your Cloud services. Get professional guidance and become an expert in securing your Cloud services, putting you fully in control of managing your information security. Guarantee full coverage of ISO 27017 and ISO 27018 with comprehensive documentation covering topics including backup and restoration, compliance checking, information security planning, and risk assessments. Reduce your implementation costs and time spent generating your documentation.
tech writer

Cyber Security Governance & Risk Management Toolkit | IT Governance UK - 0 views

  •  
    Fully up-to-date with ISO27001: 2013, this toolkit helps you to implement a robust cyber secure framework. Ensure you're better prepared for the evolving cyber threat landscape with international best practices from ISO 27001, ISO 27032, PAS 555, and the Cloud Security Alliance's Cloud Controls Matrix. Strengthen your cyber security with more than 150 pre-written, customizable templates, documents, policies, and procedures. Developed by experienced management system consultants, so you can be sure you're on the right track. Implement a robust cyber security framework and ensure information assets are adequately protected.
tech writer

Cyber Security Complete E-Learning Suite | IT Governance UK - 0 views

  •  
    Access all four of IT Governance cyber security staff awareness e-learning courses and a game to train staff on best-practice approaches. Ensure staff can spot and respond to cyber security and privacy risks. Test learner knowledge to prove compliance for auditing purposes. Train staff under one, manageable contract with these cost-effective, annual licenses. Developed by industry experts, our programs are updated every three months to ensure the content remains relevant. Customize the courses by adding links to company documents, policies, and procedures. Fast deployment with instant access to all courses. Reinforce awareness with monthly security updates, which include the latest news and tips.
tech writer

ISO 9001 Documentation Toolkit | IT Governance | IT Governance UK - 0 views

  •  
    Expert-written ISO 9001:2015-compliant templates that are proven to save you time and money in fulfilling your documentation obligations. Simplify your ISO 9001 implementation with more than 80 pre-written ISO 9001 policies, procedures, work instructions, and records. The toolkit follows the ISO 9001 standard structure to help you map the documents to each clause for ease of use and simple implementation. Developed by ISO 9001 auditors and enhanced by 20 years of customer feedback, you can be sure you're on the right track. Developed by ISO 9001 auditors so you can be sure you are on the right track with all the documents needed to achieve demonstrable compliance and implement an effective QMS (quality management system). Ensure full coverage of the Standard with the comprehensive compliance tools, including the ISO 9001 Gap Analysis tool, Conversion tool, Roles and Responsibilities Matrix and Project Plan template.
tech writer

Complete Staff Awareness E-learning Suite | IT Governance UK - 0 views

  •  
    IT Governance's complete staff awareness e-learning suite is a cost-effective way of organizing all of your staff awareness training under one, manageable contract. Access all 11 of our staff awareness e-learning programs and two challenge games to train staff on best practice processes. Ensure staff can spot and respond to cyber security and privacy risks. Comply with data protection and information security legislation and standards. Test learner knowledge to prove compliance for auditing purposes. Train staff under one, manageable contract with these cost-effective, annual licenses. Developed by industry experts our programs are updated every three months to ensure the content remains relevant. Gain access to any new content we release throughout your year-long contract. Customize the courses by adding links to company documents, policies, and procedures. Fast deployment with instant access to all of the courses. Reinforce awareness with monthly security updates, which include the latest news and tips.
tech writer

ESET Small Business Security Pack - 0 views

  •  
    ESET Endpoint Security provides comprehensive online and offline protection for your business endpoints with proven antivirus, personal firewall, web control, client antispam and other security features. mobile security - Your tablet and smartphone fleet safely in use. Thanks to the call filter, you have both incoming and outgoing communication and thus the telephone bill under full control. The integrated Anti-Theft function allows you to locate missing devices and lock or delete data stored on them. File Security - Multiple award-winning technologies developed further for your server environment. ESET's protection modules offer first-class protection for your corporate communications and data while optimizing server performance. mail security - Developed on proven NOD32 technology, ESET protects your business-critical mail servers and ensures secure and smooth system operation. Thanks to the integrated anti-spam engine, your mailboxes remain clean down to the pores. remote administration Network security without high IT expenditure. With ESET Remote Administrator, you can easily manage, scan, report, and enforce corporate policies on thousands of endpoints from a single console.
tech writer

Business Continuity Staff Awareness - LMS SCORM Package | IT Governance UK - 0 views

  •  
    Prepare your employees to respond to workplace disruptions with our SCORM-compliant course that can be uploaded to your LMS. SCORM-compliant business continuity course that you can upload to your own LMS (learning management system). Prepare your employees to respond to workplace disruptions with our interactive business continuity e-learning course. Teach your staff what business continuity is, how it is applied in your organization, and the key role they play in responding to disruptions. Embed your business continuity program and policy so you can return to business as usual as soon as possible following a disruption.
tech writer

Business Continuity Staff Awareness E-learning Course | IT Governance UK - 0 views

  •  
    Prepare your employees to respond to workplace disruptions with our interactive business continuity e-learning course. Prepare your employees to respond to workplace disruptions with our interactive business continuity e-learning course. Teach your staff what business continuity is, how it is applied in your organization and the key role they play. Embed your business continuity program and policy so you can return to business as usual as soon as possible following a disruption.
tech writer

GDPR Toolkit - GDPR Compliance | IT Governance UK - 0 views

  •  
    The most up-to-date GDPR documentation templates that can be accessed anywhere, any time: our expertise, your peace of mind. Accelerate your GDPR (General Data Protection Regulation) compliance project with 55 customizable GDPR documentation templates, policies, procedures, and work instructions. Aligned with the ICO's (Information Commissioner's Office) and DPA (Data Protection Act) 2018 requirements. Includes the GDPR Gap Analysis Tool, the Risk Treatment Plan, the DPIA (data protection impact assessment) Tool and procedure, data breach and incident response procedures, and remote working documentation. The templates have been developed by lawyers and privacy experts to ensure your compliance. Get expert advice on complying with the GDPR with notes and guidance for each customizable free-text section. Save time and money with instant access to the Cloud-based DocumentKits platform for up to ten users per year. Tried and tested by more than 3,500 organizations worldwide. This GDPR compliance toolkit is an annual subscription product; however, you can cancel at any time. (T&Cs apply)
tech writer

ISO 27001 do-it-yourself package | IT Governance UK - 0 views

  •  
    This ISO 27001 do-it-yourself package provides organisations with all the essential resources required to achieve ISO27001 certification. An affordable DIY package to help you achieve ISO 27001 compliance featuring: Copies of the three essential standards in the ISO 27001 family of standards; Our flagship ISO 27001 policies and procedures toolkit; vsRisk risk assessment software - Annual license; ISO 27001 staff awareness e-learning (add as many users as you need); and Two best-selling ISO 27001 implementation guides.
tech writer

Microsoft Exchange Server 2010 Standard - 0 views

  •  
    Microsoft Exchange 2010 is the latest version of Microsoft's top enterprise messaging and collaboration solution and the cornerstone of Microsoft's vision for unified communications. With the widest range of deployment options, amazing ease of use, and built-in information gap prevention and policy compliance capabilities, Exchange 2010 helps you achieve new levels of reliability and performance.
tech writer

Cyber Resilience Staff Awareness E-learning Suite | IT Governance UK - 0 views

  •  
    Educate employees on cyber security, cyber resilience, and data protection best practices and ensure everyone receives the same level and quality of training. Access all of our cyber resilience staff awareness e-learning courses to train staff on best-practice approaches. Ensure staff can adhere to cyber security (including phishing and ransomware), cyber resilience, and GDPR (General Data Protection Regulation) best practices. Test learner knowledge to prove compliance for auditing purposes. Train staff under one, manageable contract with these cost-effective, annual licenses. Developed by industry experts, our programs are updated every three months to ensure the content remains relevant. Customize the courses by adding links to company documents, policies, and procedures. Fast deployment with instant access to all the courses. Reinforce awareness with monthly security updates, which include the latest news and tips.
1 - 20 of 31 Next ›
Showing 20 items per page