How Will Work From Home Change Vulnerability and Patch Management for Businesses in the Future?

COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in...

OneTrust and Integris: Part I – The Acquisition

To further capabilities in the data privacy space, top-tier vendor OneTrust has acquired Integris, another leading vendor within the data discovery and classification...

GTB Technologies Adds Multi-Tenancy to DLP SDK

GTB Technologies, a smaller vendor known for dedicating itself solely to DLP solutions, has introduced a new multi-tenancy feature for its SDK that aims to improve...

Kenna Security Releases Tool for the Custom Benchmarking of Vulnerability Management Programs

On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their...

Data Retention RACI Tool

Complete this RACI matrix to determine your data retention roles and responsibilities.

Build an Effective Data Retention Program – Phases 1-3

Implement data retention and find the data types that carry the most retention-related risk.

Data Retention Schedule and Risk Identification Tool

Use this tool to determine your data retention schedule as well as high-risk data types and repositories

Build an Effective Data Retention Program

This research will help you to determine data retention requirements, create a retention schedule, identify at-risk data, and manage manual data deletion.
  • guided implementation icon

Privacy by Design for Digital Marketing

This research will help you embed privacy by design principles into the digital marketing lifecycle and processes to enable business growth while managing data protection...

Privacy by Design for Digital Marketing Storyboard

This research will help you embed privacy by design principles into the digital marketing lifecycle and processes to enable business growth while managing data protection...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us