Our documents are based on successfully executed projects which save you time and money.
o-s , policies , security , visio-stencils

Mainframe ID Security Guideline

April 28, 2021

Document download Mainframe ID Security Guideline.doc

Tags: , , Img
o-s , policies , security , visio-stencils

Mainframe RACF UserID Standards

April 27, 2021

Document download Mainframe RACF UserID Standards.docx

Tags: , , Img
o-s , policies , security , visio-stencils

Sample RACF – Mainframe – Root Causes Security Gap Analysis

April 26, 2021

Document download Sample RACF – Mainframe – Root Causes Security Gap Analysis.doc

Tags: , , Img
o-s , policies , security , visio-stencils

Mainframe – Data Space Request Procedure

April 25, 2021

Document download Mainframe – Data Space Request Procedure.doc

Tags: , , Img
o-s , policies , security , visio-stencils

P7 Server Pre – Post Migration Build Checklist

April 24, 2021

Document download P7 Server Pre – Post Migration Build Checklist.doc

Tags: , , Img
o-s , policies , security , visio-stencils

Mainframe – Resource Access Control Facility

April 23, 2021

Document download Mainframe – Resource Access Control Facility.doc

Tags: , , Img
o-s , policies , security , visio-stencils

Mainframe RACF Security Guideline

April 22, 2021

Document download Mainframe RACF Security Guideline.doc

Tags: , , Img
policies , sample-it-spreadsheets , security , visio-stencils

Sample QRadar Network Hierarchy

April 10, 2021

Document download Sample QRadar Network Hierarchy.xlsx

Tags: , , , Img
policies , sample-it-spreadsheets , security , visio-stencils

Threat Intelligence Handbook and other great reads

April 9, 2021

PDF download Blob bestitdocuments.com/Samples Threat Intelligence Handbook.pdf Dark Web.pdf Cyber Threat Intelligence Buyers-guide.pdf Dark Web Monitoring (recordedfuture.com)

Tags: , , , Img
visio-stencils

QRadar – Elements of a rule

April 8, 2021

Document download QRadar – Elements of a rule

Tags: , , , Img
sample-it-spreadsheets , security , visio-stencils

QRadar Security Strategy

April 7, 2021

Document download QRadar Security Strategy.ppt

Tags: , , , Img
sample-it-spreadsheets , security , visio-stencils

QRadar IBM Security Intelligence

April 6, 2021

Document download QRadar IBM Security Intelligence.pptx

Tags: , , , Img
policies , sample-it-spreadsheets , security , visio-stencils

Sample QRadar WinCollect Inventory

April 5, 2021

Document download Sample QRadar WinCollect Inventory.xlsx

Tags: , , , Img
policies , sample-it-spreadsheets , security , visio-stencils

What is network activity in QRadar

April 4, 2021

Source What is network activity in QRadar? – Theburningofrome.com What is network activity in QRadar? In IBM® QRadar® SIEM you can investigate the communication sessions between two hosts. If the content capture option is enabled, the Network Activity tab displays information about how network traffic is communicated and what...

Tags: , , , Img
policies , sample-it-spreadsheets , security , visio-stencils

Sample QRadar Group Inventory

April 4, 2021

Document download Sample QRadar Group Inventory.xlsx

Tags: , , , Img
policies , sample-it-spreadsheets , security , visio-stencils

IBM Cloud Discovery QRadar

April 3, 2021

Document download IBM Cloud Discovery QRadar.pdf

Tags: , , , Img
policies , sample-it-spreadsheets , security , visio-stencils

CrowdStrike Falcon EndPoint QRadar Integration

April 2, 2021

Document download CrowdStrike Falcon EndPoint QRadar Integration App Installation User Guide

Tags: , , , Img
policies , sample-it-spreadsheets , security , visio-stencils

QRadar SIEM Sample use case monitoring / response rule sets

April 1, 2021

Botnet: Local host on Botnet CandC List (DST)Botnet: Local Host on Botnet CandC List (SRC)Botnet: Potential Botnet Events Become OffensesBotnet: Potential Connection to a Known Botnet CandCBotnet: Successful Inbound Connection from a Known Botnet CandCDDoS: DDoS Attack DetectedDDoS: Potential DDoS Against Single Host (TCP)DoS: Local Flood (TCP)DoS: Network DoS...

Tags: , , , Img
policies , sample-it-spreadsheets , security , visio-stencils

Threat Investigation and Response

February 20, 2021

Word Document download Threat Investigation and Response.docx

Tags: , , Img
compliances , data-center-soc-noc , health-care-hipaa-hitech-hitech , information-rights-management , policies , sample-it-spreadsheets , security , visio-stencils

Complete Security Risk Heatmap

March 1, 2020

Sample excel download Complete Security Risk Heatmap Send us an email if you want a Microsoft Excel Version.

Tags: , Img
compliances , data-center-soc-noc , networking , o-s , policies , security , visio-stencils

MS Word – NSM Troubleshooting Guide

October 17, 2019

Download MS Word NSM Troubleshooting Guide

Tags: , Img
policies , security , visio-stencils , web-services

Sample – Cloud Zoning Architecture

August 10, 2017

Zones are defined by the sequences of protective measures employed at their perimeters. Zones that do not allow direct connections from outside the organization are considered further inside the organization than zones that allow connections from the outside. Zones that do not allow any traffic (inbound or outbound) to...

Tags: , Img
compliances , policies , security

Sample – Education Project Summary

August 2, 2016

Education Outcomes For relevant parts of the community the outcomes of a successful project would include some or all of the following:   Stakeholder Analysis Stakeholder Interest / stake Importance Representatives and participants The materials they produce and the materials they use. Their relationships to each other and their...

Tags: , , Img
compliances , policies , security

Intellectual Property Research

August 1, 2016

Intellectual Property Rights (IPR) currently presents considerable difficulties to the development and uptake of digital repositories of information objects. This project seeks to create practical DRM systems for digital repositories of information objects. The work of the project will be focusing on the real-world issues that people are encountering...

Tags: , , Img
health-care-hipaa-hitech-hitech , information-rights-management

IT Security Guideline – Emergency Access Controls and Password Use

August 2, 2015

This procedure is to ensure that access controls do not interfere with critical and timely access to patient information. This is to be accomplished by the following: Prepare 2 packets of sealed envelopes with full access information and store it in a secure area. The accesses included in each...

Tags: Img
compliances , health-care-hipaa-hitech-hitech

Admission / Registrations Applications – IT Security Applications Group Manager Roles

August 1, 2015

Revenue Cycle – Admission/Registrations Applications This position will manage implementation and support of admissions/registration applications.  This will include but not be limited to applications from Meditech and McKesson.  Other applications which are used in the admissions processes and facilitate revenue cycle such as insurance verification, scheduling, authorization and referral management will fall in this area.  In addition...

Tags: Img
compliances , health-care-hipaa-hitech-hitech

Cerner – IT Security Applications Group Manager Roles

July 31, 2015

CERNER Clinical CERNER Clinical – LIS Manage team responsible for the development, implementation and support of the Cerner Millennium PathNet applications used in the laboratory environment, which includes Anatomic Pathology, Blood Bank, General Laboratory, Outreach Services, Specimen Management and the integration with Medical Device Interfaces (MDIs). CERNER Clinical –...

Tags: Img
compliances , health-care-hipaa-hitech-hitech

MEDITECH – IT Security Applications Group Manager Roles

July 30, 2015

MEDITECH Clinical Applications MEDITECH Clinical – LIS Manage team responsible for the development, implementation and support of the Meditech LIS applications used in the laboratory environment, which include General Laboratory, Microbiology, Anatomical Pathology, BloodBanking and outreach services. Must have strong understanding of laboratory workflow processes. MEDITECH Clinical – Pharmacy...

Tags: Img
compliances , health-care-hipaa-hitech-hitech

Ambulatory Physician Services – IT Security Applications Group Manager Roles

July 29, 2015

Ambulatory Physician Services – Ambulatory EMR Manages team responsible for development, implementation and support of ambulatory electronic medical record across Corporate facilities to include Allscripts and eClinical Works as the Corporate standards as well as legacy ambulatory systems currently in place. Experience in support of an ambulatory clinical environment  and process flows required....

Tags: Img
compliances , health-care-hipaa-hitech-hitech

Ancillary Services – IT Security Applications Group Manager Roles

July 28, 2015

Ancillary Services – Diagnostic Imaging (PACS/CVPACS)  Manage team responsible for development, implementation and support of diagnostic imaging applications.  This will include General PACS as well as Cardiac PACS applications.  Assist director in design and implementation of Corp standard application migration path.  Manage migration teams.  Must have strong understanding of...

Tags: Img
compliances , health-care-hipaa-hitech-hitech , policies , security

McKesson Information Solutions

July 20, 2015

McKesson produces many Healthcare applications including Series 2000, STAR, Care Manager and Image Manager. There are many more applications in their portfolio, but these are the prime applications that we find at healthcare facilities when we present eTrust Single Sign-on and Admin. Each of these applications incorporates their own...

Tags: Img