Policy Management
Quintillion has developed an information technology and cyber security policy solution called Policy Source™.
Policy Source is the trusted source for information technology and cyber security policies. Our mission is to make policy management easy and affordable. Our solution includes:
IT and Cybersecurity Policy Library
Policies sets aligned with regulatory frameworks [Policy Bundles]
Policy Management as a Service platform [Policy Source Portal]
Policy Library
Policy Source has developed a library of over 40 cybersecurity and information technology policies. All policies purchased are editable so you can customized based on your requirements.
- Acceptable Use
- Access Control
- Application Security
- Asset Management
- Bring Your Own Device [BYOD]
- BC / DR
- Change Management
- Data Backup
- Data Classification
- Data Handling
- End-User Computing
- Incident Management
- Internet Use
- Logging and Monitoring
- Mobile Device Management
- Password
- Physical Security
- Remote Access
- Third Party Management
- Vulnerability Management
- and more...
-
$250 / policy
Policy Bundles
Policy Source has developed policies designed to meet the control requirements of the most prominent global cybersecurity frameworks
Center for Internet Security (CIS) v8
CIS Critical Security Controls are a prioritized set of safeguards to mitigate the most prevalent cyber-security attacks against systems & networks.
Cybersecurity Maturity Model Certification (CMMC)
CMMC is a unified standard for implementing cybersecurity across the defense industrial base [DIB].
Federal Trade Commission (FTC) Safeguards
FTC Safeguards ensure that entities covered by the Rule maintain safeguards to protect the security of customer information.
Health Insurance Portability and Accountability Act (HIPAA)
HIPAA establishes federal standards protecting sensitive health information from disclosure without patient's consent.
International Organization for Standardization (ISO) 27001
ISO 27001 is an information security management system (ISMS) that helps keep consumer data safe.
Service Organization Control (SOC) 2
SOC 2 defines criteria for managing data based on: security, availability, processing integrity, confidentiality and privacy.
National Institute of Standards and Technology (NIST) 800-171
Provides federal agencies and contractors with recommended security requirements for protecting the confidentiality of CUI.
Policy Source Portal
Policy Source Portal is a Policy Management as a Service platform which provides:
Secure hosting for your client's policy framework
Automated workflows to simplify the policy management process
Dashboards to help you keep track of compliance
-
Single repository for managing policy approvals
Secure access with Multi-Factor Authentication
Compliance Tracking
Dynamic Visual Dashboards
End user policy acknowledgement / sign-off
Intuitive client management functionality
Simple navigation
Backend APIs available
-
$50 / month