Security - Research Notes

The Cloud Puts Your Castle in the Sky – Now Secure It!

The cloud offers an opportunity to expand or move your operating environment to a hosted platform managed by someone else. While the cloud can have many benefits, it can...

Implement Risk-Based Vulnerability Management – Executive Brief

Read our concise Executive Brief to find out why you should design and implement a vulnerability management program, review Info-Tech’s methodology, and understand the...

Identify the Components of Your Cloud Security Architecture – Executive Brief

Read our concise Executive Brief to find out why you should identify the components of your cloud security architecture, review Info-Tech’s methodology, and understand...

Respond to the HAFNIUM-Microsoft Exchange Attack

The HAFNIUM attack on Microsoft Exchange has left organizations reeling, and information sources are somewhat confusing as to the seriousness of the attack, what one...

Achieve Digital Resilience by Managing Digital Risk – Executive Brief

Digital risk exists in many new strategic initiatives and innovative projects, regardless of your industry and location. Through an amalgamation of enterprise, IT, and...

Respond to the SolarWinds Compromise

The extent and sophistication of this attack are staggering, and IT Security must be fully informed and take action immediately.

Build a Security Compliance Program – Executive Brief

Read this executive brief to understand how an information security compliance management program can be cost effective.

Cost-Optimize Your Security Budget – Executive Brief

This executive brief will demonstrate the project methodology and thought model, as well as summarize its outcomes.

Mature Your Identity and Access Management Program – Executive Brief

Read our concise Executive Brief to find out how you improve the organization's Identity and Access Management practices using Info-Tech’s methodology, and understand the...

Secure Your High-Risk Data – Executive Brief

Info-Tech’s Secure your High-Risk Data takes a multi-faceted approach to the challenges around comprehensive data security. This research incorporates foundational...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us