422 KB | 3 files | PDF, XLS
How much confidence does your organization have in the authenticity of its documents and supporting workflows?
Assessing needs for document security can be a daunting challenge for any IT leader. Use this tool to help gain an understanding of your organization's needs for a document security tool(s). This assessment asks you a series of questions about your:
The foundation for this, or any, solid document security needs assessment is the concept of trust — how much confidence organizations must have in the authenticity of their documents and supporting workflows.
Included in this ZIP file are:
Approximate matching is a promising technology designed to identify similarities between two digital artifacts. This can be very useful for filtering data for security monitoring and digital forensics. ... More >>
Transport Layer Security (TLS) provides mechanisms to protect sensitive data during electronic dissemination across networks. ... More >>
The excerpt from chapter three addresses issues that should be considered before you decide to outsource, including security and privacy impacts and secure communication via telephone, email, mobile and smartphones, instant messaging and traditional mail. ... More >>