Zscaler Looks to Solidify Its Entry Into the CASB Market With the Acquisition of Cloudneeti

Zscaler has announced its intent to buy cloud security posture management (CSPM) vendor Cloudneeti. The move suggests that Zscaler is serious about entering the CASB market.

CASB Vendors Up Their Threat Protection Game With Big-Name Threat Intelligence Collaborations

CASB vendors CipherCloud and Bitglass have both recently announced partnerships with big-name cyber threat intelligence (CTI) providers to improve the threat protection...

Cloud Security Roadmap Tool

Use this tool to help prioritize your security requirement actions and to develop an action plan.

Azure Sentinel: What is it, What are the Four Key Security Fundamentals, and Why You Should Know About It

Microsoft’s cloud Security Incident Event Management (SIEM) solution leverages modern day enhancements such as Security Orchestration Automated Response (SOAR), Machine...

Transactional Email Service Gives Retarus a Leg Up on the Competition

Retarus, a managed service cloud-based email security platform, is a growing company to watch out for. Since its initiation in 1992, it has quickly expanded its services...

Build a Cloud Security Strategy – Executive Brief

Read our concise Executive Brief to find out why you should build a cloud security strategy, review Info-Tech’s methodology, and understand the four ways we can support...

Email Security Checklist

This tool provides a checklist for implementing controls to strengthen your organization's email security posture.

Improve Email Security Storyboard

This research provides guidelines on best practices for securing your organization's email.

Improve Email Security

With the organization’s email constantly under threat, proactive measures need to be put in place to ensure the communication, users, and data are protected. This...

Appdome: How to Shift Left Security and Build Secure Mobile Apps From the Start

It’s simply not enough today to pit your traditional application security toolkit against today’s advanced threats, especially those attacks that target APIs or mobile...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us