Security Technology & Operations

Cloud Security Strategy Template

This template, part of the blueprint Build a Cloud Security Strategy, will serve as a repository of information about your approach to securing the cloud.

Morpheus Leads the Shift from Cloud Management Platform to Hybrid Cloud Application Orchestration with Its 5.0 Release

The Morpheus cloud management platform (CMP) has moved beyond its original focus on DevOps automation and self-service. Morpheus provides a management control plane to...

Chronicle Expands Its North American Presence by Partnering With Herjavec Group

Chronicle, Alphabet’s enterprise security company, expands its North American partner base with Herjavec Group, its first Canadian partner. Herjavec Group is the first...

Mature Your Identity and Access Management Program – Executive Brief

Read our concise Executive Brief to find out how you improve the organization's Identity and Access Management practices using Info-Tech’s methodology, and understand the...

Develop a Comprehensive IAM Improvement Strategy – Phases 1-4

Use this research to improve the governance and operations of identity and access management at the organization. This blueprint uses the identity lifecycle as a framework...

Threat Landscape Briefing – October 2020

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control strategies,...

Respond to the SolarWinds Compromise

The extent and sophistication of this attack are staggering, and IT Security must be fully informed and take action immediately.

Ransomware Tabletop Planning Results – Example

Leverage tabletop planning to develop an effective and practical response plan that captures the steps staff in your organization would need to execute to prevent and...

Ransomware Response Runbook Template

Use this example as a starting point to document detailed ransomware response steps, from detection to recovery.

Ransomware Response Workflow Template

This template provides a visual at-a-glance summary of the key steps and stakeholders in a sample ransomware incident response.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us