Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged requirements

Rss Feed Group items tagged

tech writer

Certified ISO 27001 Lead Implementer and Lead Auditor Combo Course | IT Governance UK - 0 views

  •  
    This 7.5 day combination package offers delegates the chance to attend our high level ISO 27001 ISMS Certified Lead Implementer Class and Certified ISMS Lead Auditor course, at an extra special discounted price. This specialist led course covers all the activities required to plan, implement and audit an ISO 27001-compliant information security management system (ISMS) Learn the skills to plan, execute and report second-party (supplier) and third-party (external and certification) audits. Train without the travel with our self-paced online or classroom/online combination courses giving you all the benefits of classroom study without the hassle, uncertainty and cost of travel. The classroom/online courses offer you the option to attend in person or online, if circumstances change. Successful completion of the course and included exam leads to the ISO 17024-certificated ISO 27001 Certified Lead Implementer (CIS LI) and Lead Auditor (CIS LA) qualifications and 56 CPD/CPE points.
tech writer

Information Security & ISO27001 Staff Awareness E-learning course | IT Governance UK - 0 views

  •  
    Ensure your employees gain a better understanding of information security risks and ISO 27001 compliance requirements with this customisable e-learning course. Educate staff on their responsibilities and current information security threats to mitigate the risk of a breach. Comply with Clause 7.3 and control 7.2.2 of ISO 27001 by raising awareness and encouraging a culture of information security throughout your organisation. Customise the content by adding links to company documents, policies and procedures, and demonstrate compliance with Clause 7.3 and control 7.2.2. Test learner knowledge to prove compliance for auditing purposes. Fast deployment with instant access to the e-learning programme. Reinforce awareness with monthly security updates, which include the latest news and tips.
tech writer

ISO 22301 BCMS Toolkit | IT Governance UK - 0 views

  •  
    Expert written customizable ISO 22301 templates to save you time and money in fulfilling your documentation obligations. Streamline your ISO 22301 compliance project with more than 70 customizable business continuity templates for policies, procedures, work instructions, and records. Achieve ISO 22301 certification fast and stay on track with expert guidance. The toolkit includes all the documents required to implement an effective BCMS (business continuity management system) aligned to your organization's strategic objectives. Guarantee full coverage of the Standard with the comprehensive compliance tools, including the Gap Analysis tool, Business Impact Analysis tool, Risk Register, BCMS performance matrix, and Incident Log.
tech writer

ISO 27001 Toolkit - The Comprehensive Suite | IT Governance UK - 0 views

  •  
    This ISO 27001 2013 Information Security Management System (ISMS) toolkit contains a complete set of tools and materials required for your ISMS to be ISO27001 certified. Align your information security activities with industry best practices, proving to stakeholders that you take information security seriously. Guarantee compliance with this comprehensive suite, which includes all four official ISO 27000 standards, the ISO 27001 Toolkit, and our risk assessment software, vsRisk. Halve your implementation costs and time spent generating your ISO 27001 documentation with more than 140 pre-written, customizable templates, policies, procedures, and documents. Our ISO 27001 Toolkit was developed by the global experts who led the first ISO 27001 certification project, so you can be sure you're on the right track. Meet local and global security laws, such as the GDPR (General Data Protection Regulation). This is an annual subscription product, however, you can cancel at any time. (T&Cs apply)
tech writer

Cyber Essentials Certification | IT Governance UK - 0 views

  •  
    Bolster your organization's commitment to baseline cyber security by achieving Cyber Essentials certification for the first time with our quick and easy solution. Includes cyber insurance, access to our Cyber Security Portal to manage your application, and expert guidance from our cyber security advisers to improve your chances of passing the first time. Work with IT Governance, one of the founding Cyber Essentials certification bodies that remains one of the largest in the UK. We have issued more than 6,000 certifications worldwide. This is an annual subscription service and will renew automatically. Cyber Essentials certificates are valid for 12 months, in line with IASME requirements. You can cancel at any time. (T&Cs apply.)
tech writer

ISO 27001 Internal Audit Service | IT Governance UK - 0 views

  •  
    Remove the guesswork from your ISO 27001 audits with an experienced auditor on your side. Outsource your internal audit to a qualified auditor with deep experience in ISO 27001 and the audit process, and gain the assurance you need to ensure you meet your clients' and stakeholders' demands. This service consists of two separate audit days spread over one year. Please note, that the price quoted is for SMEs with up to 50 employees, based upon a single primary site in the mainland UK. If you have specific requirements, don't hesitate to get in touch with us for a personalized quote.
tech writer

Online Consultancy by the Hour | IT Governance UK - 0 views

  •  
    LiveOnline consultancy service for those needing short, sharp bursts of expert consultancy support on specific issues. Live Online support for those needing short, sharp bursts of expert consultancy on specific issues. Expert, independent view of your risk, compliance, and security frameworks. Cost-effective support delivered by the hour. Purchase the number of hours of consultancy support required in one-hour units.
tech writer

NIS Directive Gap Analysis | IT Governance UK - 0 views

  •  
    Get a true picture of how your current cyber security arrangements measure up against the requirements of the Network and Information Systems Regulations 2018 (NIS Regulations). Applicable to both DSP and OES.
tech writer

Cyber Essentials Plus Certification | IT Governance UK | IT Governance UK - 0 views

  •  
    This service is for organizations that have recently achieved Cyber Essentials certification and now want to achieve Cyber Essentials Plus certification. Upgrade your IASME Cyber Essentials certificate to Cyber Essentials Plus (conditions apply*): An IASME Cyber Essentials Plus certificate and report from one of the founding certification bodies that remains one of the largest in the UK today. An on-site or remote assessment, internal vulnerability scans, and an external vulnerability scan offer a higher level of assurance to your stakeholders that your Cyber Essentials controls are in place. A pre-test call to help you prepare for your assessment. Cyber Essentials certificates are valid for 12 months, in line with IASME requirements. This package is an annual subscription product, but you can cancel at any time. (T&Cs apply.)
tech writer

Cyber Essentials Remote Consultancy Support - 1 Hour | IT Governance UK - 0 views

  •  
    This online consultancy service gives you the right tools to achieve IASME-licenced certifications for Cyber Essentials and Cyber Essentials Plus. IT Governance can help your organization achieve IASME-licensed certifications for both Cyber Essentials and Cyber Essentials Plus. This online consultancy service is for one hour and is ideal for companies not certain about the requirements of the scheme or how to define the scope of the certification, and for help understanding and answering the SAQ (self-assessment questionnaire).
tech writer

Cyber Essentials Plus Vulnerability Scan Additional IPs | IT Governance UK - 0 views

  •  
    Retake or purchase additional external vulnerability scans for continued Cyber Essentials certification. Purchase additional IP addresses for your vulnerability scans (available in bundles of 16 ) in order to meet the requirements of Cyber Essentials Plus certification. Delivered by one of the founding certification bodies that remains one of the largest in the UK.
tech writer

Patch Management Policy Template | IT Governance UK - 0 views

  •  
    Create a patch management policy in minutes with this easy-to-use, customisable template, which can be tailored to your organisation's requirements and processes.
tech writer

Vulnerability Scanning Service | IT Governance UK - 0 views

  •  
    Fast, fully automated external vulnerability scan of your Internet-facing IT assets. Fast, fully automated front-line defence against cyber criminals and nation-state attackers. Low-cost, high-value, on-demand, do-it-yourself solution. Quickly identify exploitable vulnerabilities and misconfigurations in your websites, applications and infrastructure. Find more than 50,000 known vulnerabilities, such as misconfigured firewalls or unpatched software. Rerun scans as required to confirm successful remediation. Run unlimited monthly scans to ensure your infrastructure patches are up to date. Give customers confidence by displaying the 'Scanned by IT Governance' badge on your website. CREST-approved scanning service developed by our CREST-accredited security team. This is a monthly subscription product, but you can cancel at any time. (T&Cs apply)
tech writer

ISO/IEC 27001 2013 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27001 2013 - Information Technology - Security techniques - information security management systems - requirements Standard. The newest (2013) version of the international standard for information security management systems (ISMSs). Looking for the 2017 version? Please be aware that the international standard is still the 2013 version. Some suppliers have republished country-specific versions of ISO/IEC 27001 (labeled ISO/IEC 27001:2017), which include additional corrigenda that were released after the 2013 publication date. These corrigenda are freely available from the ISO website for those who purchased the original version. They are also supplied by IT Governance when you purchase this standard.
tech writer

ISO/IEC 27002 2013 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27002:2013 guides the implementation of controls in Annex A in ISO/IEC 27001. ISO/IEC 27002:2013 - Information Technology - Security Techniques - Code of practice for information security controls Standard. The International Standard supports the implementation of an Information Security Management System (ISMS) based on the requirements of ISO 27001.
tech writer

Microsoft Windows Remote Desktop Services 2012 Device CAL, RDS CAL, Client Access License - 0 views

  •  
    These features form a desktop and application platform required for session virtualization and Virtual Desktop Infrastructure (VDI) to deploy and manage desktops. The remote connection of employees is handled in this way. RDS CALs are purchased in addition to the conventional CALs. As a result, RDS users can access desktops, applications and many other features of Windows Server from any location via the Internet. Multilayer safety technology for reliable work. With the Windows Server 2012 a RDS Device CAL you experience a secure operating system whose resources are always and everywhere available. Microsoft has built in multiple layers of security to detect and thwart attacks. If the attacker overcomes a protective layer, there are other lines of defence. This multi-level defensive technology includes the intrusion protection and Windows Defender. In addition, detectors are included that report successful break-ins and minimize potential damage. Virtual machine encryption and smart solutions for administrators contribute to security. The latter consist, among other things, of the Credential Guard against attacks that aim at login data. With features such as Just Enough Administration and Just-In-Time Administration, privileges can be set quickly and securely. Potentially unsafe applications can be isolated using Hyper-V. The numerous security measures also protect RDS connections.
tech writer

Microsoft Windows Server Remote Desktop Services 2012 Device CAL, RDS CAL, Client Acces... - 0 views

  •  
    These features form a desktop and application platform required for session virtualization and Virtual Desktop Infrastructure (VDI) to deploy and manage desktops. The remote connection of employees is handled in this way. RDS CALs are purchased in addition to conventional CALs. As a result, RDS users can access desktops, applications, and many other features of Windows Server from any location via the Internet. Multilayer safety technology for reliable work. With the Windows Server 2012 RDS Device CAL, you experience a secure operating system whose resources are always and everywhere available. Microsoft has built-in multiple layers of security to detect and thwart attacks. If the attacker overcomes a protective layer, there are other lines of defense. This multi-level defensive technology includes intrusion protection and Windows Defender. In addition, detectors are included that report successful break-ins and minimize potential damage. Virtual machine encryption and smart solutions for administrators contribute to security. The latter consists, among other things, of the Credential Guard against attacks that aim at login data. With features such as Just Enough Administration and Just-In-Time Administration, privileges can be set quickly and securely. Potentially unsafe applications can be isolated using Hyper-V. The numerous security measures also protect RDS connections.
tech writer

Windows Server 2012 R2 User CAL - 0 views

  •  
    Whoever orders the Windows Server 2012 R2 User CAL receives the product key, which is necessary to activate the respective server operating system. Depending on the affinity, the owners of the Windows Server 2012 R2 User CAL can then decide how to distribute the accesses so that the employees can then also benefit from full access to the server. Cals are required for this purpose, i.e. they are licenses that enable the user, or several users, to log into the system properly. The so-called Client Access Licenses (CALs) make it possible that the respective users can be linked to the server. Industries are as diverse as the demands and needs of the PC users themselves, so it is more than convenient that the Windows Server 2012 R2 User CAL provides a multi-purpose solution for every industry. No matter whether it's the software industry, household shop, or online store, for every business it is indispensable to execute the administrative and computational processes on the PC. This gives bosses, management positions, and employees a clear overview, which also makes work on the PC much easier. This in turn leads to increased productivity and optimizes various business processes.
tech writer

Microsoft Exchange Server 2019 Standard, 1 Device CAL - 0 views

  •  
    Microsoft Exchange is Microsoft's high-performance and reliable mail and groupware server. In addition to the actual server license, which is required to operate the Exchange server, you need so-called Client Access Licenses. Microsoft's licensing model provides that these CALs can be purchased either for each device (Device CAL) or each user (User CAL) that will access the server. Microsoft Exchange Server 2019 Standard Device CAL can be purchased at blitzhandel24 at best conditions. This means competent advice, excellent prices, and above all the fastest possible delivery of the license keys by mail or post.
tech writer

Microsoft Exchange Server 2016 Standard, 1 Device CAL - 0 views

  •  
    Exchange requires a CAL for each user or device accessing the server software. There are two CAL variants here : Standard CAL: Enables any user to work productively across virtually any platform, browser, and mobile device.
« First ‹ Previous 81 - 100 of 108 Next ›
Showing 20 items per page