Security Technology & Operations

Kaspersky Introduces Endpoint Security Cloud in Two Tiers

Kaspersky has revamped its Endpoint Security Cloud to now offer two versions, Cloud and Cloud Plus. Geared towards small and medium-sized enterprises, this two-tiered...

SentinelOne Partners With Automox to Offer Customers Automated Vulnerability Patching

Late last month, SentinelOne, the autonomous endpoint protection company, and Automox, a cloud-based automated patch management and configuration management solution,...

Splashtop Remote Support Partners With Bitdefender

Splashtop integrates its Remote Support with Bitdefender’s antivirus software to offer enhanced security to its customer endpoints from the Splashtop console.

Cloud Security Governance Program Template

Use this template to ensure the continued maintenance of your cloud program's security.

Build a Cloud Security Strategy – Phase 2: Prioritize Initiatives and Construct a Roadmap

This phase of the blueprint Build an Cloud Security Strategy will help you prioritize and roadmap action items to better secure the cloud.

Ransomware Project Roadmap Tool – Example

Identify specific tasks and projects to address gaps and improve your ability to prevent and respond to ransomware attacks.

Cybersecurity Priorities Checklist Tool

This tool will help you filter out controls from a predefined list of primary, secondary, and tertiary priority domains and help you visualize a final list of initiatives...

Security Incident Management Runbook: Data Breach

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Third-Party Incident

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 4: Implement Your Secure Cloud Program

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you turn your security requirements into specific tasks and develop...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us