Mature Your Identity and Access Management Program – Phases 1-3

This storyboard will help you improve the organization's identity and access management practices by using the Identity Lifecycle as a framework.

Identity Security RACI Chart

A best-of-breed template to help you document roles and responsibilities related to identity security.

Assess and Govern Identity Security – Phases 1-2

A step-by-step document that walks you through how to properly inventory your identity types, repositories, threats, and mitigations.

Assess and Govern Identity Security

Security leaders view modernizing identity security as too daunting and prefer to focus on narrower technology challenges. This limited focus is reactive and, in the long...
  • guided implementation icon

IAM Initiative Tool

This tool will allow you to identify, document, prioritize, and roadmap initiatives for improving the organization's identity and access management practices.

Mature Your Identity and Access Management Program

Weak identity and access management (IAM) practices result in considerable risk to the organization because IAM plays a role in most things in IT. Info-Tech provides a...
  • guided implementation icon

Project Zero Extends Its Vulnerability Disclosure Agreement to 90 Days, Changes to Follow

Project Zero is changing its vulnerability disclosure policy to give software developers more time to patch vulnerabilities. The policy is now shifted to a stringent...

Okta Partners With VMware Carbon Black, CrowdStrike, and Tanium

Okta announces its new partnerships with endpoint security vendors VMware Carbon Black, CrowdStrike, and Tanium. Integrating endpoint protection management analysis with...

Identity Security Architecture Tool

A structured tool to help you inventory identity types, threats, and mitigations using the MITRE ATT&CK® framework.

Mature Your Identity and Access Management Program – Executive Brief

Read our concise Executive Brief to find out how you improve the organization's Identity and Access Management practices using Info-Tech’s methodology, and understand the...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us