Acquaint yourself with the ISO 17799 / BS7799 standard and address key information security issues using Callio Toolkit 17799. This toolkit is comprised of a series of documents, tools, and other items brought together with the sole purpose of helping you understand the standard and enabling you to meet its basic requirements.
Callio Toolkit 17799 contains the following essential elements:
-introduction and ISO 17799 / BS 7799-2 implementation methodology
-both parts of the BS 7799 / ISO 17799 standard
risk treatment module: In order to treat risk, Callio Toolkit 17799 helps you select appropriate controls. This Web application allows you to consult selected controls and to generate and manage security policies using the Policy Generator.
-an audit kit: Callio Toolkit 17799 includes an ISMS compliance diagnostic tool and allows you to create and modify the statement of applicability leading to BS 7799-2 certification. In addition, the software includes an assessment and audit grid for the internal auditor, information on how a typical audit proceeds and an audit grid for the external auditor.
-a policy generator: Rapidly create your security policy using the wide range of policies and guidelines suggested in the Callio Secura 17799 (35 policies and more than 500 guidelines covering the ten points of the ISO 17799 standard).
-implementation templates: Use the templates and working documents, which include models, checklists, examples, additional information and utilities, in order to implement your ISMS. You will find more than 100 documents covering the ten sections of the standard, including asset inventory and classification templates, confidentiality agreements, employee recruitment forms, layouts for secure computer centers, as well as contingency plans.
Requirements:
IBM PC Compatible Microsoft Windows 98/ME/2000/XP
Microsoft Access 2002/XP
Toolkit 17799: BS7799 / ISO 17799 compliance software
Easy File Cloak a powerful privacy protection application used to encrypt and hide files within image files. Files hidden with Cloak are secure and completely undetectable. Cloak uses advanced technology to protect files.
AdRem sfConsole Encrypted, Web and eDirectory-enabled remote/local access to the NetWare console; access rights management; emergency connection and file transfer; user activity audit; ability to open multiple server and program screens; low footprint
Stealth Folder Hider Stealth Folder comes with a Folder Hider, Clear Tracks utility and File Eradicator.With Stealth Folder, folders and files can't be deleted, viewed, modified, or run.Stealth Folder Hider can be run in Normal Mode or in Stealth Mode.In stealth mode.
Previous:
Anetto Password Saver Anetto Password Saver is personal password manager that allows you to store all your passwords, logins and IDs neatly and securely on your computer.
LSDTech PrivateDisk PrivateDisk protects your private data by making them invisible and encrypted. You place your files and folders into PrivateDisk virtual disk image file and no one can't even see what them. To get access to actual data a password is required.
got password? Lightweight, feature-rich password manager, combining security and convenience, simplicity and flexibility in one package. Takes a minimum of effort to set up and use and securely gives you access to your credentials with just a couple of key taps.
File size: 2,302 K Platforms: Windows XP/ME/NT/2000/98/95 Downloads: 17
This toolkit is comprised of a series of documents, tools, and other items brought together with the sole purpose of helping you understand the standard and enabling you to meet basic requirements for ISO 17799 / BS7799.