An Evaluation of Gurucul's Identity Security Analytics Platform

From the outset, Gurucul positioned itself as a pioneer in what would later be known as user and entity behavior analytics (UEBA). This early focus allowed Gurucul to...

Identity and Access Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

AKA Identity: Revolutionizing Identity Management With Intelligent Data-Driven Insights

For many cybersecurity leaders, identity governance remains a critical yet challenging area. Traditional solutions are complex, costly, and prone to fail. Meet AKA...

Delinea’s Identity Security Platform: A Deep Dive Into Privileged Access Management

Delinea’s identity security solution integrates privileged access management with other critical security components to provide a robust solution for identity and access...

Securing Digital Identities: Exploring LastPass' Features, Security, and Market Strategy

As digital threats evolve, LastPass' proactive security measures will continue to gain momentum and improve their market strategy, positioning them well to serve their...

Securing the Identity Perimeter: An In-Depth Look at SpecterOps and BloodHound Enterprise

I speak to many cybersecurity vendors, some are good, some are not memorable, but others excel. Recently, one company I briefed with stood out to me for its innovative...

Employee Onboarding Process

Use this template to document the current- or target-state IAM processes related to onboarding new employees.

IAM RACI

Use this tool to document the roles and responsibilities associated with managing identities and access in your organization.

IAM Program Requirements Gathering Tool

Use this tool to document the overall business, security, and privacy requirements related to your identity and access management program.

Develop a Comprehensive IAM Improvement Strategy

Define a clear IAM strategy that aligns with your organization’s security objectives and regulatory requirements; outlines the goals, roadmap, and desired outcomes of the...
  • guided implementation icon
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us