Security - Research Notes

Custom Vendor Landscape: Brand Protection Software

Brand protection software assists organizations with guarding against fraudulent use of product listings, websites, and other aspects that infringe intellectual property....

Custom Vendor Landscape: Third-Party Risk Management Solutions

Third-party risk management (TPRM) solutions identify, manage, and mitigate risks related to third parties, including vendors, suppliers, partners, contractors, and...

Satisfy Customer Requirements for Information Security – Executive Brief

Read this Executive Brief to understand why you need to develop a strategy for managing customer expectations for information security, and consider whether a security...

Meltdown/Spectre Overview

What you need to know about the recent Meltdown and Spectre vulnerabilities existing on most modern processors.

Identify Opportunities to Mature the Security Architecture – Executive Brief

Discover why every organization needs an appropriate security architecture. Review how this blueprint will assist with the development of a right-sized security...

WPA2 KRACK Attack Zero-Day: Threat Information Deck

Wi-Fi Protected Access II (WPA2) is the nearly ubiquitous standard protocol used to encrypt Wi-Fi traffic and secure wireless connections – and one of its vulnerabilities...

Build a Data Privacy Program – Executive Brief

Read this Executive Brief to understand why Info-Tech's approach to Data Privacy is unique and how applying a quantitative lens to an often qualitative subject will help...

“It’s basically AES-256 encryption on steroids”: SecurityFirst Enthusiastic About DataKeep 2.3

Do you like the security encryption provides? Are you running an NFS or AIX system? If you said yes, you may be interested in recent updates to SecurityFirst’s signature...

Orchestration Tool Makers Set Sights on Security and Compliance

Orchestration tool makers have set their sights on security and compliance. IT professionals should remember that “compliance as code” isn’t the easy button they might...

Leverage Threat Intelligence for Your Organization in Five Steps

These five steps will take you through what you need to know to use threat intelligence to improve your organization’s overall security, no matter what your level of...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us