Threat and Vulnerability Management (TVM)

Use a risk-based model for effective prioritization of vulnerability remediation using an industry recognized framework.


Login

Threat and Vulnerability Management (TVM)

Define and implement a process for tracking and reporting vulnerability identification and remediation activities that includes stakeholder notification.


Login

Threat and Vulnerability Management (TVM)

Establish, monitor and report metrics for vulnerability identification and remediation at defined intervals.


Login

Universal Endpoint Management (UEM)

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for all endpoints. Review and update the policies and procedures at least annually.


Login

Universal Endpoint Management (UEM)

Define, document, apply and evaluate a list of approved services, applications and sources of applications (stores) acceptable for use by endpoints when accessing or storing organization-managed data.


Login

Universal Endpoint Management (UEM)

Level N/A

Define and implement a process for the validation of the endpoint device's compatibility with operating systems and applications.


Login

Universal Endpoint Management (UEM)

Level N/A

Maintain an inventory of all endpoints used to store and access company data.


Login

Universal Endpoint Management (UEM)

Define, implement and evaluate processes, procedures and technical measures to enforce policies and controls for all endpoints permitted to access systems and/or store, transmit, or process organizational data.


Login

Universal Endpoint Management (UEM)

Configure all relevant interactive-use endpoints to require an automatic lock screen.


Login

Universal Endpoint Management (UEM)

Level N/A

Manage changes to endpoint operating systems, patch levels, and/or applications through the company's change management processes.


Login