91Ƭ

Security Technology & Operations

Devolutions Vs. the Goliaths: How Affordability & Ease of Use Challenge the PAM Status Quo

In this tech note I take a closer look at Devolutions, a partial stack Privileged Access Management (PAM) vendor, exploring its history, market positioning, core features,...

Threat Landscape Briefing – July 2024

This monthly recording covers topics such as cyberthreat trends, nation-states, cybercriminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

Threat Landscape Briefing – June 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure...

Zoho: Simplifying Enterprise Security Through a Unified Approach

This article explores Zoho's security suite, examining the interplay between its various products and the benefits it collectively brings to enterprise security.

Beyond Legacy Systems: How Verkada's Cloud Architecture Revolutionizes Physical Security

We examine Verkada's history, market position, and core offerings, providing an expert’s perspective informed by three decades of security architecture experience.

Custom Vendor Landscape: XDR Solutions

XDR is empowering organizations to not only prevent cyberattacks, but to also ensure they have efficient and effective security processes in place. By providing visibility...

Threat Landscape Briefing – May 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure...

The Rise of Human-Centric Data Loss Prevention: A Deep Dive Into Proofpoint’s Approach

With evolving threats and regulations, traditional DLP solutions are struggling to keep pace. Proofpoint is addressing these challenges with its Information Protection...

Your Employees Are the Target: Proofpoint’s Human-Centric Answer

Proofpoint, an innovator in the cybersecurity industry, has earned its reputation as a leader in email security and DLP. As the threat landscape evolves, Proofpoint has...

Beyond IGA: SailPoint's Identity Security Cloud for the Modern Enterprise

Identity governance and administration (IGA) platforms have become essential for robust security strategies in modern enterprises. SailPoint, at the forefront of IGA...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us