Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
sample-it-spreadsheets , security

PowerPoint – Internet Security Program

October 31, 2012

Free PowerPoint document download Really really nice file. Sample Internet Security PowerPoint

Img
data-center-soc-noc

What to expect with a – Cloud Computing Vendor

October 31, 2012

If your going to consider cloud computing solution, then you better set the bar way high.

Img
projects , sample-it-spreadsheets

PowerPoint – IT Requirements Capture Process

October 29, 2012

Free PowerPoint document download Really really nice file. Sample Enterprise Data Strategy

Img
data-center-soc-noc , information-rights-management , sample-it-spreadsheets , security

PowerPoint – Enterprise Data Strategy

October 28, 2012

Free PowerPoint document download Really really nice file. Sample Enterprise Data Strategy

Img
networking

Network – Latency vs. Bandwidth Fundamentals

October 27, 2012

Latency is the amount of time it takes for a packet to traverse the network Latency vs. Bandwidth Why is it important?  If it takes a single packet 100 ms to travel from location A to location B, adding bandwidth will not make it any faster. Application considerations for latency: Application turns...

Img
itil , visio-stencils

Sample Visio – SAS / ITIL Framework

October 26, 2012

Free document download Sample – S A S / ITIL Framework

Img
email , policies , security

Sample Word – Security Sendmail Standard

October 25, 2012

Free Word email (Sendmail) Standard document download Sample – Security Sendmail Standards

Img
security

Sample Word – Enterprise Web Service Recommendations

October 24, 2012

Free Word document download. Sample – Enterprise Web Service Recommendations

Img
security

Cloud Architecture Risk Program Considerations

October 24, 2012

Information Systems Risk Management Program Purpose Policy Statement Responsibilities Information Security Risk Management Program Risk Assessment Process Description of Preventative Measures Description of Detection Measures Incident Response Plan Recovery Procedures Logging and Reporting Assessment of Risks, Controls, and Response Priorities Incident Response Team plan (Included) Information Security Program Introduction...

Img
security

Sample Word – MSP Contractor Requirements

October 23, 2012

Free Word document download Sample – MSP Contractor Requirements

Img
mindmap

Sample MindMap – Security Control Cycle

October 23, 2012

Free document download Sample – MindMap Computer Security Policy

Img
itil , security , visio-stencils

Sample Visio – ITIL to ISO 200xx Service Processes

October 22, 2012

Free document download Sample – ITIL to ISO 200xx Service Processes

Img
security

Sample – Email Analysis Management

October 22, 2012

Overall Rating: Objective:  This project is intended to ensure comprehensive administrative and user policies and procedures for management, use and monitoring of [Clients] email systems. Gap Department Action Tracking Policy and Procedures RMD / IT RMD / IT Develop policies and procedures to guide email systems management. Expand user...

Img
security

Sample Word – Consulting Customer Evaluation Form

October 22, 2012

Free Word document download Sample – Consulting Customer Evaluation Form

Img
compliances , o-s , policies , security

Sample Word – Citrix – VMWare Desktop Optimized – Windows 7 Information Security Standard

October 22, 2012

Free – Word document download Windows 7 Information Security Standard

Img
security

Sample – Suggested Technical Design Documentation Format

October 22, 2012

I.    Meaning of Protection Describe how the system provides trust and specify the protection mechanisms contained within the system (i.e., discretionary access controls and identification and authentication). II. Translating of Protection into the System This section shall: a. Describe the boundaries of the system; and b.Describe the parts...

Img
mindmap

Sample MindMap – ITIL Operational Risk

October 21, 2012

Free document download Sample – MindMap ITIL Operational Risk

Img
policies , security

Sample – Security Risk Management Procedures

October 21, 2012

Sample – Security Risk Management Procedures Summary or Purpose:  Explain the purpose of the following procedures or requirements. For Vulnerability Management, the summary would explain that the procedures are provided to guide identification, analysis and remediation of known vulnerabilities. The procedures include processes relating to Risk Management and Information...

Img
compliances , sample-it-spreadsheets , security

PowerPoint – Roadmap to Maturity – FISMA and ISO 2700x

October 21, 2012

Free – PowerPoint – Fisma (ISO2700xx, ISF, GAISP, OCTAVE, SysTrust, COSO, COCO) document download Roadmap to Maturity – FISMA and ISO 2700x

Img
security , visio-stencils

Sample Visio – FISMA – Risk Management Frameworks

October 21, 2012

FISMA – Risk Management Frameworks (ISO2700xx, ISF, GAISP, OCTAVE, SysTrust, COSO, COCO, NIST, CIS, FFIEC, SSE-CMM, SAS70, SSAG) Free Visio Document Download  Sample – FISMA – Risk Management Frameworks Sample MindMap FISMA Risk Management Framework

Img
security

Sample Word – External Security Assessment Methodology

October 21, 2012

Free Word document download Sample – External Security Assessment Methodology

Img
security

Sample – Vendor Security and Risk Management Review Matrix

October 21, 2012

Sample – Vendor Security and Risk Management  Review Matrix Vendor: Name of Vendor with address and contact information Vendor Owner: Name the owner or owners of the relationship Review Date: Report Date: Date contract received Final report date Applicable Vendors, Partners and Affiliates: Name any pass through vendor relationships...

Img
mindmap

Sample – MindMap – Anatomy of an Attack

October 20, 2012

Free document download Sample MindMap Anatomy of an Attack

Img
mindmap

Sample – MindMap – Technology Risk Assessment

October 20, 2012

Free document download Sample MindMap Technology Risk Assessment

Img
mindmap

Sample MindMap – Assigning Responsibility for Compliance Sample

October 20, 2012

Free document download MindMap Assigning Responsibility for Compliance Sample

Img
business , security

Sample Word – Assessment Catagorized Risk Representation

October 19, 2012

A security assessment is a comprehensive risk assessment of I.T. vulnerabilities throughout an organization.  This includes network infrastructure components such as data servers, workstations, networks, firewalls and routers.   Most sites do not have enough skilled resources as it is to complete day-to-day I.T. tasks, and few employ full-time security personnel.   Even...

Img
mindmap

Sample Mindmap – Computer Security Policy

October 19, 2012

Free document download Sample – MindMap Computer Security Policy

Img
security

Sample Word – Risk Glossary of Terms

October 19, 2012

Free Word document download Sample – Risk Glossary of Terms

Img
security

Sample Word – Risk Management Department 3 Year Plan

October 19, 2012

Free Word document download  Risk Management Department 3 Year Plan

Img
security

Sample Word – Type of Questions collected during a Security Assessment

October 19, 2012

Free Word document download Type of Questions collected during a Security Assessment

Img
compliances , security

Sample Word – Penetration Test Consulting Overview

October 19, 2012

Free Word document download Penetration Test Consulting Overview

Img