Thousands of Policies delivered to satisfied customers.

"The only way to get Security Policies customized for you in an hour, guaranteed."

Our experts, with over two decades of experience in the IT Security industry, have developed a groundbreaking solution for businesses needing a custom IT security policy.  We don't send you a thousand policies and force you to find and customize the ones that apply to you.  Instead, our innovative policy creation WIZARD asks you questions in plain English to determine your security policy needs, and then generates a set of security policies to meet those needs. Your security policies are emailed to you as soon as they are created.

You can literally have a set of custom security policies in ten minutes.  Better yet, the policies are easily editable in all major word processing programs, allowing you to tweak them to fit your needs exactly.  Visit the products page for more information about the policies we provide, which include the following:

Acceptable Use Policy Password Policy
Backup PolicyNetwork Access Policy
Incident Response PolicyRemote Access Policy
Virtual Private Network (VPN) PolicyGuest Access Policy
Wireless PolicyThird Party Connection Policy
Network Security PolicyEncryption Policy
Confidential Data PolicyData Classification Policy
Mobile Device PolicyRetention Policy
Outsourcing PolicyPhysical Security Policy
Email Policy

In addition, with our most popular product (Gold), you also receive all the standard forms you would need to implement your security policies, including:

  • Policy Acknowledgement Form
  • Security Incident Report
  • Notice of Policy Noncompliance
  • Account Setup Request
  • Guest Access Request
  • Request for Policy Exemption
  • And more!

Visit our Samples page for screenshots of policies and the application, or set up a trial account to generate a free sample policy customized to your company.

Since policies generated at are customized to your company, you can immediately use your policies to:

  • General Data Protection Regulation (GDPR)
  • The PCI Data Security Standard (DSS) 3.2
  • Formalise your Data Security Policies
  • Develop and document a solid security strategy
  • Satisfy audit requirements
  • Assist in your compliance efforts with:
  • BS7799
  • The ISO 27000 series of standards
  • The HMG Security Policy Framework
  • ISO/IEC 17799 information technology - code of practice for information technology management
  • Adhere to COBIT best practices
  • Mitigate risk from a security incident
  • Educate users on sound security practices
  • Reduce legal risk
  • Appease partners or customers
  • Assist with ISO/IEC 17799

In order to meet security standards such as PCI, BS7799 and the ISO/IEC 27000 series of standards, your Information Security Management Systems (ISMS) must meet certain criteria.  Our security policies were written based on a cohesive and integrated approach using security best practices stemming from the C-I-A triad of confidentiality, integrity, and availability.  If compliance is your goal, the Gold product will be invaluable to your efforts.

Our security experts have successfully provided consultative security solutions for companies and organisations with five employees to fifty-thousand employees.  We are so confident you will find our security policies to be useful that we offer a money-back guarantee if you are not satisfied.  Please visit the FAQ or Contact Us page if you have any questions at all.

Free Trial