Our documents are based on successfully executed projects which save you time and money.
application , compliances , security

Sample Partial – Disaster Recovery Plan

March 21, 2012

A disaster recovery plan consists of information and procedures required to make a rapid recovery from an occurrence which would disable Corporate Services for more than 24 hours such as a tornado, earthquake, fire, or act of sabotage or terrorism. Successful recovery of operations is dependent upon a complete...

Img
application , compliances , security , web-services

Sample – Disaster Recovery Record Salvage Procedures

March 21, 2012

If a disaster strikes and records are damaged, knowing the correct salvage procedures can minimize lost data.  Magnetic, photographic and paper media can require different techniques.  The chart on the following pages indicates the appropriate initial and follow-up action for each media.  Prompt restorative action can minimize or prevent...

Img
application , projects

Sample Word – User Acceptance Test Plan

March 18, 2012

Free Word document download Template document: User Acceptance Test Plan www.bestitdocuments.com

Img
application , business , compliances , visio-stencils

Sample Visio – Business Applications Framework

March 17, 2012

Free – Visio Document download Simple Sample Drawing. Business Applications Framework www.bestitdocuments.com

Img
application , compliances , policies

Sample Word – WINXML Query Interface Standards

March 17, 2012

Free Word document download  Sample WINXML Query Interface Standards

Img
application , business , compliances , networking , security , visio-stencils , web-services

Sample Visio – High Level Hyperion Topology Drawing

March 14, 2012

Free – Visio Document download Sample High Level Hyperion www.bestitdocuments.com

Img
application , web-services

Sample Word – Quick Reference – Useful SQL queries

March 9, 2012

Free Word document download Useful SQL queries for popular SQL servers www.bestitdocuments.com

Img
application , compliances , web-services

Sample Word – SQL Service Response Time Considerations

March 8, 2012

Great information for a Storage Analyst or DBA analyst. SQL dba performance considerations. We would appreciate any backlinks you can create. Free Word document download SQL Service Response Time Considerations www.bestitdocuments.com

Img
application , compliances , o-s , policies , security , web-services

IT Operations and Maintenance and NIST standards that apply

March 7, 2012

IT Operations and Maintenance Review Operational Readiness SP 800-70 SP 800-53A Perform Configuration Management SP 800-53A SP 800-100 Conducting Continuous Monitoring SP 800-53A SP 800-100 Conduct Re-Authorization SP 800-37 SP 800-53A Engineering and Development Controls SP 800-53 FIPS-200 www.bestitdocuments.com

Img
application , compliances , policies , security , web-services

Assessment descriptions and NIST standards that apply

March 7, 2012

Integrate Security into Established Environments SP 800-64 Certify System Security SP 800-37 SP 800-53A Test and Assess Security Controls SP 800-37 SP 800-53A Accredit System Security SP 800-37 Operation and Maintenance Readiness SP 800-70 SP 800-53A Perform Configuration Management SP 800-100 SP 800-53A Conduct Continuous Monitoring SP 800-100 SP...

Img
application , compliances , policies , security , web-services

SDLC Descriptions and NIST Standards that apply

March 6, 2012

SDLC Activity and supporting NIST publications NIST SP 800-64 Project Initiation – Security Planning SP 800-64 SP 800-100 SP 800-37 SP 800-53 Categorize Security for the System SP 800-60 FIPS-199 Assess Risk to a System SP 800-30 Analyze Risk Requirements SP 800-53 Assess Business Impact SP 800-34 Assess Policy...

Img
application , compliances , web-services

Sample of Application Support Management Services

March 4, 2012

When considering an Application Service Provider consider the understand that changes that are inevitable in any IT environment. Changes can happen in a business environment for many reasons; some key reasons are listed below: 1. Application Consolidation 2. Application Decommissioning etc. 3. Acquisitions 4. Divestiture 5. Down sizing Considering an Application Service Provider...

Img
application , business , visio-stencils

Sample Visio – High Level – Outlook 200x Overview

March 3, 2012

Show your appreciation with a backlink? Free – Visio Document download High Level – Visio Sample Outlook 200x Overview www.bestitdocuments.com

Img
application , compliances , security

Compliance – Audit Reporting Requirements (SOX, HIPAA, GLBA and PCI)

March 2, 2012

SOX, HIPAA, GLBA and PCI requirements: SOX Audit Reports User Logons Sec 302(a)(4)(C) and 302(a)(4)(D) require user accesses to the system, be recorded and monitored for possible abuse. User Logoffs Sec 302(a)(4)(C) and 302(a)(4)(D) require user accesses to the system, be recorded and monitored for possible abuse. Logon Failures...

Img
application , compliances , networking

Great reference: NAT & Private IP Address Ranges

February 18, 2012

Great reference: NAT & Private IP Address Ranges

Img
application , business , visio-stencils

Sample Visio – ERP Service Portal Drawing

February 18, 2012

High level ERP Service Portal. Free – Visio Document download ERP Service Portal Drawing

Img
application , visio-stencils , web-services

Sample Visio – Software Parametric Estimations considerations

February 18, 2012

High Level – Software Parametric Estimations Free – Visio Document download Software Parametric Estimations

Img
application , visio-stencils , web-services

Sample Visio – IIS6 / 7 – Apache Policy Architecture

February 18, 2012

High Level Siteminder architecture drawing. Free – Document download IIS6 / 7 – Apache Policy Architecture

Img
application , projects , visio-stencils

Sample Visio – Simple Application upstream / downstream flow and interactions

February 17, 2012

This Sample drawing demonstrates how IT Applications should be documented. Systems, Databases flows and dependencies are important for Testing, Development, Support, reliability and auditing. Free – Visio Document download Application and flows www.bestitdocuments.com

Img
application , compliances , security

What is Data Retention Compliance?

February 11, 2012

The ability to stipulate specific life cycle for different types of corporate IT documents. 1) Data usability and accessibility, the document must be in a useful form, e.g. viewable / reusable. The retrieval must meet the business process requirements. 2) Data security, the document must be held so as to...

Img
application , business , o-s , security

OS Patch Management Challenges Today

February 6, 2012

Patch Management Challenges Today, all of the assets that have to be analyzed for risk, prioritized and approach. www.bestitdocuments.com

Img
application , business , compliances , security

OSI 7498-2 Security Reference Model Function Layers

February 4, 2012

OSI Layers OSI 7498-1 Network Model Description OSI 7498-2 Security Service 1 The Physical Layer contains the data represented as electronic bits. Data travels over a physical medium using specific transmission devices and media. Connection Confidentiality, Traffic Flow Confidentiality 2 The Data Link Layer organizes electronic bits into logical...

Img
application , business , compliances , networking , o-s , security

Audit is Managing Client Expectations

February 4, 2012

There are 6 basic entry points into any network: Through a firewall / DMZ Usually a single IP address or perhaps a couple but it is not too difficult to launch an audit against these targets. Most audits reveal issues related to the OS, Services running, and Web Servers...

Img
application , compliances , security

ISO 27002 – Information Security Controls

February 1, 2012

Introduction Today, generally Corporate Information Security Controls, use the international standard ISO/IEC 27002:2005, Information technology – Security techniques – Code of practice for information security management as an organizational framework to map security controls to and from the Corporate Policy, Standards and procedure documents. Each of the Corporate Enterprise...

Img
application , security

Sample Word – DRM – Livelink Evaluation Summary

January 25, 2012

Free document download Livelink Evaluation Summary

Img
application , sample-it-spreadsheets

Sample Excel – DRM – Complete Livelink Research Excel Spreadsheet

January 25, 2012

Free Excel document download Complete Livelink Research Spreadsheet

Img
application , security

Sample Word – DRM – ECM Documentum Evaluation Summary

January 24, 2012

Free Word document download DRM – ECM Documentum Evaluation Summary

Img
application , security

Sample Word – DRM – Smart Plant Evaluation Summary

January 23, 2012

Free Word document download DRM – Smart Plant Evaluation Summary

Img
application , security

Sample Word – DRM – IBM Filenet Evaluation Summary

January 22, 2012

Free Word document download IBM Filenet Evaluation Summary

Img
application , security

Sample Word – DRM – Open Text Evaluation Summary

January 22, 2012

Free document download Open Text Evaluation Summary

Img
application , security

Sample Word – DRM – Liquid Machines Evaluation Summary

January 22, 2012

Free document download Liquid Machines Evaluation Summary

Img