Security Technology & Operations

Simplify Identity and Access Management – Phases 1-4

This storyboard will help you lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. Simplify your identity...

IAM Procurement Project Charter Template

Ensure proper project management and stakeholder support from the start of your project by properly planning and scoping your identity and access management solution.

IAM Use-Case Fit Assessment Tool

This tool asks a series of targeted questions that will help you determine the use-case scenarios that align with your organization's specific requirements for identity...

IAM Vendor Shortlist & Detailed Feature Analysis Tool

This tool allows enterprises to profile their identity and access management requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors.

IAM System Evaluation and RFP Scoring Tool

A key component of any evaluation is a request for proposal (RFP). Gathering and scoring the various responses to an RFP can be difficult and time consuming. This tool...

IAM Vendor Demo Script Template

This template is designed to provide IAM vendors with a consistent set of instructions, ensuring an objective comparison of product features – all while evaluating ease...

Security Incident Management Runbook: Distributed Denial of Service

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.ni

Integrate Threat Intelligence Into Your Security Operations – Executive Brief

Read our concise Executive Brief to find out why you should implement a threat intelligence program, review Info-Tech’s methodology, and understand the four ways we can...

Integrate Threat Intelligence Into Your Security Operations – Phases 1-4

Intelligence-driven computer network defense is a risk management strategy that addresses the threat component of risk, incorporating analysis of adversaries, their...

Integrate Threat Intelligence Into Your Security Operations – Phase 1: Plan for a Threat Intelligence Program

Assess your organization's unique threat landscape, current capabilities, and define an ideal target state.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us