Privileged Access Management (PAM) Misconceptions: Starting the Journey

During the first three months of the COVID-19 pandemic, many organizations realized the true value of IT and the role it played in ensuring ongoing business operations....

OneTrust and Integris: Part I – The Acquisition

To further capabilities in the data privacy space, top-tier vendor OneTrust has acquired Integris, another leading vendor within the data discovery and classification...

GTB Technologies Adds Multi-Tenancy to DLP SDK

GTB Technologies, a smaller vendor known for dedicating itself solely to DLP solutions, has introduced a new multi-tenancy feature for its SDK that aims to improve...

Bomgar & BMC Team Up to Speed Trouble-Ticket Resolution

For organizations that experience time-sensitive incidents that must be resolved in the most optimal and efficient manner, Bomgar (Beyond Trust) and BMC Software may have...

LogicGate GRC

LogicGate is a governance, risk and compliance automation platform offered by LogicGate Inc., headquartered in Chicago, that helps organizations to automate their risk...

CyberSaint Interview

In an interview with Allison Furneaux, VP Marketing at CyberSaint Inc., developers of CyberStrong Integrated Risk Management platform in June 2020, Allison indicated that...

Build a Data Privacy Program – Phase 3: Build the Privacy Roadmap

This phase of the blueprint, Build a Data Privacy Program, will help you to prioritize initiatives based on a collective score that takes into account cost, effort,...

Data Protection Policy

Info-Tech's Data Protection Policy template is for internal use and ensures that data privacy best practices are supported and enforced within the organization.

Build a Data Privacy Program

Sell privacy to the business by speaking a language they understand. IT and InfoSec leaders need to see privacy as more than just compliance – as a driver of business...
  • guided implementation icon

Build a Data Privacy Program – Phase 4: Implement and Operationalize

This phase of the blueprint, Build a Data Privacy Program, will help you to make the program functional and operational, through the use and implementation of customized...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us