TISLA

www.tisla-tool.org

TISLA is a tool to assess the completeness of your technical information security landscape containing a 350+ question survey based on market best practices. The tool is built in Microsoft® Excel and can be downloaded on the tisla-tool.org website. The assessment covers a wide range of different technologies and is divided into 6 main categories in which security techniques are logically grouped. Of course, you do not want anyone who fills in the questionaire to immediately know what the total score is. That is why a separate Excel file has been created for each main group, which can be issued to the subject matter experts for completion. The completed lists can then be easily imported into the tool. Below you’ll find the six main area’s with their respective technologies. The six layers of the technical administration model are: - Application Security - Perimeter Security - Detection & Response - Identity, Access & Privileges - EndPoint Protection - Data Protection All these layers represent a tab in the tool. On top of that there is an additional 7th tab in the tool (not in the model) reserved for: “Gereral Technical Security”. It’s for things that don’t fit in any of the first six layers, but that you might want to consider in the total view. The questions are based on best practices. Most of these best practices are put together by consulting subject matter experts and some of them are put together by studying best practices on the internet and using comon sense.

Read more

Reach decision makers at TISLA

Lusha Magic

Free credit every month!

TISLA is a tool to assess the completeness of your technical information security landscape containing a 350+ question survey based on market best practices. The tool is built in Microsoft® Excel and can be downloaded on the tisla-tool.org website. The assessment covers a wide range of different technologies and is divided into 6 main categories in which security techniques are logically grouped. Of course, you do not want anyone who fills in the questionaire to immediately know what the total score is. That is why a separate Excel file has been created for each main group, which can be issued to the subject matter experts for completion. The completed lists can then be easily imported into the tool. Below you’ll find the six main area’s with their respective technologies. The six layers of the technical administration model are: - Application Security - Perimeter Security - Detection & Response - Identity, Access & Privileges - EndPoint Protection - Data Protection All these layers represent a tab in the tool. On top of that there is an additional 7th tab in the tool (not in the model) reserved for: “Gereral Technical Security”. It’s for things that don’t fit in any of the first six layers, but that you might want to consider in the total view. The questions are based on best practices. Most of these best practices are put together by consulting subject matter experts and some of them are put together by studying best practices on the internet and using comon sense.

Read more
icon

Country

icon

City (Headquarters)

Alphen aan den Rijn

icon

Employees

1-10

icon

Social

  • icon

Employees statistics

View all employees

Potential Decision Makers

  • Initiator and Driving Force of the Tisla Initiative

    Email ****** @****.com
    Phone (***) ****-****

Technologies

(6)

Reach decision makers at TISLA

Free credits every month!

My account

TISLA FAQ

Sign up now to uncover all the contact details