Security Technology & Operations

Cloud Security Strategy Template

This template, part of the blueprint Build a Cloud Security Strategy, will serve as a repository of information about your approach to securing the cloud.

Morpheus Leads the Shift from Cloud Management Platform to Hybrid Cloud Application Orchestration with Its 5.0 Release

The Morpheus cloud management platform (CMP) has moved beyond its original focus on DevOps automation and self-service. Morpheus provides a management control plane to...

Chronicle Expands Its North American Presence by Partnering With Herjavec Group

Chronicle, Alphabet’s enterprise security company, expands its North American partner base with Herjavec Group, its first Canadian partner. Herjavec Group is the first...

Mature Your Identity and Access Management Program

Weak identity and access management (IAM) practices result in considerable risk to the organization because IAM plays a role in most things in IT. Info-Tech provides a...
  • guided implementation icon

Mature Your Identity and Access Management Program – Executive Brief

Read our concise Executive Brief to find out how you improve the organization's Identity and Access Management practices using Info-Tech’s methodology, and understand the...

Mature Your Identity and Access Management Program – Phases 1-3

This storyboard will help you improve the organization's identity and access management practices by using the Identity Lifecycle as a framework.

Threat Landscape Briefing – May 2023

This monthly report covers topics such as cyberthreat and regulatory trends, nation states, cybercriminals, hacktivists campaigns, data breaches, control strategies, and...

Email Security Checklist

This tool provides a checklist for implementing controls to strengthen your organization's email security posture.

Improve Email Security Storyboard

This research provides guidelines on best practices for securing your organization's email.

My Firewall Is Smarter Than Your Firewall

Next-generation firewalls were smarter than previous firewalls, able to deeply analyze traffic and integrate with complementary security solutions. Today our needs are...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us