Security Technology & Operations

SAP Facilitates Better Customer Experiences by Adding B2B Functionality to CIAM Solutions

SAP SE announced on April 30, 2019, that business-to-business (B2B) functionality has come to its customer identity and access management (CIAM) solutions.

Develop and Implement a Security Incident Management Program – Executive Brief

Effective and efficient management of incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident...

Be More Secure Without Passwords: Microsoft Embraces Passwordless Authentication and FIDO2

Microsoft is working to usher in the era of passwordless multi-factor authentication as passwordless API becomes an official W3C standard. Strong authentication using...

Google’s Backstory SIEM Offers Unprecedented (but Potentially Risky) Data Collection Capabilities

Chronicle’s Backstory marks Google’s first foray into the SIEM industry by introducing a SIEM that claims full data retention “forever.” Organizations must weigh the...

Debunk Machine Learning Endpoint Security Solutions

Traditional legacy anti-virus solutions are unable to keep up with the sheer volume of new and sophisticated endpoint attacks. As a potential solution to combat this...
  • guided implementation icon

A More Versatile SIEM Could See Market Growth Up to $3.23 Billion

Analysis by Frost & Sullivan recently claimed that the Security Information and Event Management (SIEM) market will grow to $3.23 billion by 2023 as a result of recent...

Penetration Test RFP Template

Looking to engage a vendor for a Penetration Test? Use this Request for Proposal (RFP) template to get you started.

Security Operations MSSP RFP Template

An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements.

Cloud Security Roadmap Tool

Use this tool to help prioritize your security requirement actions and to develop an action plan.

Orchestration Tool Makers Set Sights on Security and Compliance

Orchestration tool makers have set their sights on security and compliance. IT professionals should remember that “compliance as code” isn’t the easy button they might...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us