Security Technology & Operations

APT10 & Operation Cloud Hopper – Exposing a Global Cyberespionage Campaign

Your managed IT service providers may be leaving you vulnerable.

The Shadow Brokers – Details on Leaked Cyberintelligence Tools and Vulnerabilities

This Info-Tech briefing will provide a synopsis of what the Shadow Brokers leak might mean for users and organizations, and what actions can be taken in response to this...

WikiLeaks – Vault 7 Releases

What do the Vault 7 releases mean for you? (And what do they NOT mean.)

Blowing up the status quo: Brexit will impact IT in the UK and beyond

The Brexit vote says Leave. UK-based IT leaders must start to plan for a potentially new era of trans-border data flow and the availability of IT staff. Those in the rest...

Leverage Threat Intelligence for Your Organization in Five Steps

These five steps will take you through what you need to know to use threat intelligence to improve your organization’s overall security, no matter what your level of...

IAM Procurement Project Charter Template

Ensure proper project management and stakeholder support from the start of your project by properly planning and scoping your identity and access management solution.

IAM Use-Case Fit Assessment Tool

This tool asks a series of targeted questions that will help you determine the use-case scenarios that align with your organization's specific requirements for identity...

IAM Vendor Shortlist & Detailed Feature Analysis Tool

This tool allows enterprises to profile their identity and access management requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors.

IAM System RFP Template

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

IAM System Evaluation and RFP Scoring Tool

A key component of any evaluation is a request for proposal (RFP). Gathering and scoring the various responses to an RFP can be difficult and time consuming. This tool...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us