Additional information
Source: Supplier's web siteThe project has been delivered on schedule
The budget has not been exceeded
Functionality complies with task
The project has been delivered on schedule
The budget has not been exceeded
Functionality complies with task
Reduce Costs
Ensure Security and Business Continuity
Manage Risks
Risk or Leaks of confidential information
Malware infection via Internet, email, storage devices
Risk of attacks by hackers
Risk of data loss or damage
Risk of lost access to data and IT systems
Non-compliant with IT security requirements
Insufficient risk management