Research Notes

Respond to the HAFNIUM-Microsoft Exchange Attack

The HAFNIUM attack on Microsoft Exchange has left organizations reeling, and information sources are somewhat confusing as to the seriousness of the attack, what one...

During Business Continuity Preparation Talk to Your MSP

Use this checklist to evaluate what solutions your MSP can provide during your business continuity plan execution or COVID-19 pandemic response.

Custom Vendor Landscape: Permit Systems

MPM platforms allow municipalities to intake permit submissions and associated documentation, triage them internally for review and assessment, set a disposition and...

Custom Vendor Landscape: CRM for Higher Education – Admissions

CRM solutions for higher education provide the ability to track the student experience from end-to-end. These platforms also typically provide augmented capabilities for...

Improve Your Statements of Work to Hold Your Vendors Accountable – Executive Brief

Read our concise Executive Brief to find out why you should employ a systematic process for reviewing SOWs, review Info-Tech’s methodology, and understand the four ways...

Custom Vendor Landscape: Third-Party Risk Management Solutions

Third-party risk management (TPRM) solutions identify, manage, and mitigate risks related to third parties, including vendors, suppliers, partners, contractors, and...

Cloud Strategy and Action Plan – Executive Brief

Read this Executive Brief to understand why a written strategy is required to realize the full benefits of the cloud.

Custom Vendor Landscape: Contact Tracing Tools

Contact Tracing and Location Tracking solutions leverage a hardware proximity monitor that can be issued to employees (or in some instances, the employee’s mobile device)...

Control Theory: Where All the Roads Meet

Biology is the exquisite result of trial-and-error survivorship testing over breathtaking lengths of time, while technology is the product of the human brain. These...

Custom Vendor Landscape: Third-Party Risk Management Solutions Second Edition

Info-Tech defines Third-Party Risk Management as a solution that evaluates and monitors of risk of third-party vendors, contractors and consultants.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us