Security Technology & Operations

Threat Landscape Briefing – October 2020

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control...

Mature Your Identity and Access Management Program

Weak identity and access management practices result in considerable risk to the organization because it plays a role in most things in IT. Info-Tech provides a...
  • guided implementation icon

Mature Your Identity and Access Management Program – Executive Brief

Read our concise Executive Brief to find out how you improve the organization's Identity and Access Management practices using Info-Tech’s methodology, and understand the...

Mature Your Identity and Access Management Program – Phases 1-3

This storyboard will help you improve the organization's Identity and Access Management practices by using the Identity Lifecycle as a framework.

IAM Initiative Tool

This tool will allow you to identify, document, prioritize, and roadmap initiatives for improving the organization's Identity and Access Management practices.

Privacy Regulation Roundup

This Privacy Regulation Roundup summarizes the latest major global privacy regulatory development, announcements, and changes. This report is updated on a monthly basis.

Chronicle Expands Its North American Presence by Partnering With Herjavec Group

Chronicle, Alphabet’s enterprise security company, expands its North American partner base with Herjavec Group, its first Canadian partner. Herjavec Group is the first...

Threat Landscape Briefing – September 2020

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control...

Morpheus Leads the Shift from Cloud Management Platform to Hybrid Cloud Application Orchestration with Its 5.0 Release

The Morpheus cloud management platform (CMP) has moved beyond its original focus on DevOps automation and self-service. Morpheus provides a management control plane to...

Build a Cloud Security Strategy

Info-Tech has developed an approach to cloud security that is built on the strong foundations of our security strategy model that has been successfully implemented across...
  • guided implementation icon
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology