Security Technology & Operations

Simplify Identity and Access Management – Phase 4: Consider an IAM Vendor

This phase of the blueprint Simplify Identity and Access Management will help you select and implement an IAM solution. Several tools are available to assist you with...

Orchestration Tool Makers Set Sights on Security and Compliance

Orchestration tool makers have set their sights on security and compliance. IT professionals should remember that “compliance as code” isn’t the easy button they might...

Understanding Regulation With Blockchain Technology – Phase 2: Build and Evaluate an Inventory of Use Cases

Envision how blockchain can enhance your organization’s key capabilities, determine whether blockchain aligns with your enterprise, and communication your findings to...

Understanding Regulation With Blockchain Technology – Phase 1: How Blockchain Can Disrupt Data Reporting

Understand blockchain through a business-centric definition and discover use cases of blockchain across industries.

Understanding Regulation With Blockchain Technology – Phases 1-2

Understand the implications of blockchain from a usage and forensic perspective, as well as the potential unique issues of this transformative technology.

Understanding Regulation With Blockchain Technology – Executive Brief

Read our concise Executive Brief to find out why you should understand regulation with blockchain technology and understand how Info-Tech can support you in completing...

A More Versatile SIEM Could See Market Growth Up to $3.23 Billion

Analysis by Frost & Sullivan recently claimed that the Security Information and Event Management (SIEM) market will grow to $3.23 billion by 2023 as a result of recent...

SAP Facilitates Better Customer Experiences by Adding B2B Functionality to CIAM Solutions

SAP SE announced on April 30, 2019, that business-to-business (B2B) functionality has come to its customer identity and access management (CIAM) solutions.

Threat Landscape Briefing – May 2019

This monthly recording covers topics such as cyber threat and regulatory trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies,...

Security Metrics KPX Dashboard

This tool will help you track and present your key performance indexes for security metrics.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
Contact Us