Security Technology & Operations

Privacy Regulation Roundup

This Privacy Regulation Roundup summarizes the latest major global privacy regulatory developments, announcements, and changes. This report is updated on a monthly basis.

Hornetsecurity: Redefining Email Security With AI and Global Insights

Hornetsecurity has distinguished itself in our integrated cloud email security (ICES) quadrant with its advanced email security platform. My discussions with numerous...

IRONSCALES: Revolutionizing Integrated Cloud Email Security With AI and User-Centric Design

In our email security SoftwareReviews quadrant, IRONSCALES stands out as a leader with its integrated cloud email security (ICES) solution, now often called integrated...

Custom Vendor Landscape: Patch Management Software

Vulnerability and Patch Management Software is an essential tool in bolstering an organization’s cybersecurity. Vulnerability Management consists of the complete process...

Custom Vendor Landscape: Enterprise Browsers

Enterprise Browser software is a growing industry, catering to the increasing focus on cybersecurity and zero trust network access.

Threat Landscape Briefing – November 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and...

Threat Landscape Briefing – October 2024

This monthly recording covers topics such as cyberthreat trends, nation states, cybercriminal and hacktivist campaigns, data breaches, control strategies, and exposure to...

Securing the Identity Perimeter: An In-Depth Look at SpecterOps and BloodHound Enterprise

I speak to many cybersecurity vendors, some are good, some are not memorable, but others excel. Recently, one company I briefed with stood out to me for its innovative...

Pioneering Network Automation and Infrastructure Integrity: A Technical Overview of BackBox

BackBox represents the next generation in network automation, establishing itself as a network infrastructure integrity platform. Its robust IntelliChecks capabilities...

Develop a Comprehensive IAM Improvement Strategy – Phases 1-4

Use this research to improve the governance and operations of identity and access management at the organization. This blueprint uses the identity lifecycle as a...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us