TISLA
www.tisla-tool.orgTISLA is a tool to assess the completeness of your technical information security landscape containing a 350+ question survey based on market best practices. The tool is built in Microsoft® Excel and can be downloaded on the tisla-tool.org website. The assessment covers a wide range of different technologies and is divided into 6 main categories in which security techniques are logically grouped. Of course, you do not want anyone who fills in the questionaire to immediately know what the total score is. That is why a separate Excel file has been created for each main group, which can be issued to the subject matter experts for completion. The completed lists can then be easily imported into the tool. Below you’ll find the six main area’s with their respective technologies. The six layers of the technical administration model are: - Application Security - Perimeter Security - Detection & Response - Identity, Access & Privileges - EndPoint Protection - Data Protection All these layers represent a tab in the tool. On top of that there is an additional 7th tab in the tool (not in the model) reserved for: “Gereral Technical Security”. It’s for things that don’t fit in any of the first six layers, but that you might want to consider in the total view. The questions are based on best practices. Most of these best practices are put together by consulting subject matter experts and some of them are put together by studying best practices on the internet and using comon sense.
Read moreTISLA is a tool to assess the completeness of your technical information security landscape containing a 350+ question survey based on market best practices. The tool is built in Microsoft® Excel and can be downloaded on the tisla-tool.org website. The assessment covers a wide range of different technologies and is divided into 6 main categories in which security techniques are logically grouped. Of course, you do not want anyone who fills in the questionaire to immediately know what the total score is. That is why a separate Excel file has been created for each main group, which can be issued to the subject matter experts for completion. The completed lists can then be easily imported into the tool. Below you’ll find the six main area’s with their respective technologies. The six layers of the technical administration model are: - Application Security - Perimeter Security - Detection & Response - Identity, Access & Privileges - EndPoint Protection - Data Protection All these layers represent a tab in the tool. On top of that there is an additional 7th tab in the tool (not in the model) reserved for: “Gereral Technical Security”. It’s for things that don’t fit in any of the first six layers, but that you might want to consider in the total view. The questions are based on best practices. Most of these best practices are put together by consulting subject matter experts and some of them are put together by studying best practices on the internet and using comon sense.
Read moreCountry
City (Headquarters)
Alphen aan den Rijn
Industry
Employees
1-10
Social
Employees statistics
View all employeesPotential Decision Makers
Initiator and Driving Force of the Tisla Initiative
Email ****** @****.comPhone (***) ****-****
Technologies
(6)