Security Technology & Operations

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 5: Build a Cloud Security Governance Program

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you build the organizational structure of your cloud security...

Defend Against Suspicious Users With CylancePERSONA

This month, BlackBerry Cylance introduces CylancePERSONA, a user behavior detection and response platform, to address the growing pains of user impersonation and valid...

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 4: Implement Your Secure Cloud Program

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you turn your security requirements into specific tasks and develop...

ADP – Integrating Automation of Human Capital Management With Identity Access Management

Streamlining functionality and workflows of human capital management (HCM) systems while ensuring a rigorous level of security can be challenging. ADP prides itself on...

Proofpoint SOARs Above the Rest With Award-Winning Security Orchestration, Automation, and Response

Proofpoint’s Threat Response has claimed the Cybersecurity Excellent Awards Gold Winner for 2019 in the Incident Response category.

SentinelOne Partners With Automox to Offer Customers Automated Vulnerability Patching

Late last month, SentinelOne, the autonomous endpoint protection company, and Automox, a cloud-based automated patch management and configuration management solution,...

Kaspersky Introduces Endpoint Security Cloud in Two Tiers

Kaspersky has revamped its Endpoint Security Cloud to now offer two versions, Cloud and Cloud Plus. Geared towards small and medium-sized enterprises, this two-tiered...

Build a Vendor Security Assessment Service – Phase 3: Deploy and Monitor Process

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you implement the process and develop metrics to measure effectiveness.

Vendor Security Assessment Inventory

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to inventory vendors and the results of their security assessments.

Vendor Security Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to develop a questionnaire for potential vendors to assess their...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us