When first launched, COBRA introduced a revolution to the risk management arena. It is a self contained software product which is designed to measure risk and identify appropriate solutions right across the IT service board.
The key principles of COBRA are ease of use, flixibility and top class reporting. These qualities ensure that the product can be installed and used without specialist security training.
More information on COBRA, including a downloadable evaluation copy, can be found here
Security policies are the foundation, the bottom line, of information security within an organization. Whereas risk analysis strives to ensure that security matches need, policies define the baseline - the minimum acceptable security level.
Return To Main ITIL Page
With such a fundamental role within the organization, it is essential to ensure that the security policies are comprehensive, complete, up to date and of course of the highest quality.
The RUsecure Information Security Policies meet all these demands. They were created by experienced security consultants, and importantly, are fully compliant with published standards, like ISO17799.
More information on these policies, including a downloadable evaluation copy, can be found here
Any organization concerned about its short and long term well being will have assigned responsibility for security to one or more suitable individuals.... often given the title of Information Security Officer or Security Manager. This is of course an extremely demanding role, whether taken on full time or part time.
The role, like many others, can be made easier via the provision of the right supporting tools. The Information Security Officer's Online Manual is a prime example.
The ISO Interactive Manual gives practical advice on how to establish a formal Information Security process. It discusses the responsibilities of the Information Security Officer, and how to manage and administrate security properly. It can be navigated (online) with ease, and provides guidence and reference for the security professional and the novice.
As with the other tools in this segment, it is designed to make security management far easier and indeed, far more effective.
More information on this guide, including a downloadable evaluation copy, can be found here