Security

Security Research Center

Research Center

A holistic approach to building an agile, robust security program.

The Security Research Center by Info-Tech Research Group offers a holistic approach to building an agile and robust security program. The center's featured research highlights the importance of starting with a security strategy and solid foundations, enabling security operations through mature security governance, managing security risks.

SecurityHQ

SoftwareReviews: Software Product

SecurityHQ is a Global MSSP that monitors networks 24/7, to ensure complete visibility and protection against your cyber threats. Which means that the right combination of tools, skills, people and processes are essential, to proactively and effectively manage, detect and defend your environment from all malicious activity. ...nagement &.

Integrate Physical Security and Information Security

Blueprint: Security

Facing ever-increasing security threats, many organizations are unifying physical, cyber, and information security systems to gain the long-term overall benefits a consolidated security strategy provides.

Securing information security, physical security, or personnel security in silos may secure nothing.

Facing ever-increasing security threats, many organizations are unifying physical, cyber, and information security systems to gain the long-term overall benefits a consolidated security strategy provides. Securing information security, physical security, or personnel security in silos may secure nothing.

NowSecure

SoftwareReviews: Software Product

All-in-one solution for continuous automated mobile appsec for apps you build and use. Organizations are mobilizing faster and at greater scale than ever before. With 6 million mobile apps and growing across Google Play™ and the Apple App Store™ and millions more developed for internal use, mobile application security testing has never been more.

BeSECURE

SoftwareReviews: Software Product

beSecure is a flexible, accurate, low maintenance Vulnerability Assessment and Management solution that delivers solid security improvements.

senhasegura

SoftwareReviews: Software Product

Segura® (formerly senhasegura) delivers identity security through Privileged Access Management (PAM), helping global organizations control privileged access across hybrid and cloud environments. Use cases include vaulting, session monitoring, least privilege, and secrets management.

Xygeni Security

SoftwareReviews: Software Product

Enhance Security Intelligence. Provides exceptional visibility across source control, CI/CD pipelines, registries, and cloud environments, protecting applications from development to deployment.

HashiCorp Vault

SoftwareReviews: Software Product

Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API.

WithSecure Elements

SoftwareReviews: Software Product

WithSecure's comprehensive all-in-one security Elements Cloud platform seamlessly integrates software, services, and all essential security capabilities into a single unified solution. Through their flexible Elements modules made of cutting-edge software and high-quality services, customers can find the optimal solution for their needs. Together,.

Wing Security

SoftwareReviews: Software Product

... companies to leverage SaaS without compromising their security posture by detecting and auto-remediating against threats that originate from SaaS applications and ShaWithin minutes of onboarding, Wing non-intrusively discovers all SaaS apps used within the organization, classifies those apps based on known risks and threats, and then provides.

Security Priorities 2025

Blueprint: Security

AI has transformed the security landscape, and in 2025, IT leaders will need to protect against increasingly savvy threat actors. From dealing with typical attack vectors, such as phishing and credential capture attacks, to limitless possibilities for new vectors such as deepfakes and quantum...

Safeguard your organization by preparing for growing cybersecurity challenges.

AI has transformed the security landscape, and in 2025, IT leaders will need to ... From dealing with typical attack vectors, such as phishing and credential capture attacks, to limitless possibilities for new vectors such as deepfakes and quantum computing, IT leaders will have to move far past reactive security. The Security Priorities 2025.

Assess and Manage Security Risks

Blueprint: Security

A mature security risk management practice is a critical component of a comprehensive and risk-aware information security program. Use this blueprint to effectively implement a dynamic approach to assess and manage security risks.

Accelerate your security threat and risk assessments with AI.

A mature security risk management practice is a critical component of a comprehensive and risk-aware information security program. Use this blueprint to effectively implement a dynamic approach to assess and manage security risks. Accelerate your security threat and risk assessments with AI.

Securiti DSPM

SoftwareReviews: Software Product

Securiti’s Data Security Posture Management (DSPM) solution enables organizations to reduce data breach risk, secure data sharing, and improve data privacy and compliance while reducing cost and complexity of building data controls. ...assets across public clouds, data clouds, SaaS, and on-premises envir leverages AI to accurately classify.

Build an Information Security Strategy

Blueprint: Security

Build a business-aligned, risk-aware, holistic security strategy: gather business requirements to prioritize improvements; assess risks, stakeholder expectations, and risk appetite to set meaningful targets; conduct a comprehensive gap analysis to identify improvements; and build a flexible...

Align the information security strategy to organizational goals and risks to create value.

Build a business-aligned, risk-aware, holistic security strategy: gather business requirements to prioritize improvements; assess risks, stakeholder expectations, and risk appetite to set meaningful targets; conduct a comprehensive gap analysis to identify improvements; and build a flexible roadmap to set the program on the right footing. Align.

LIVE 2024 Lightning Round Presentations

Blueprint: CIO

LIVE 2024’s lightning round presentations offered attendees brief but incisive looks into the most critical topics impacting IT today – guided by some of the best thinkers and researchers in the field.

Exponential IT in Motion

Security strategy is about the choices we make to prioritize what we do to better protect our data. A comprehensive and flexible security strategy that mitigates risk is one that is well-defined, holistic, risk-aware, and aligned with the goals of the organization. Learn more in this Info-Tech LIVE 2024 Lightning Round Presentation. Secu... A.

Security Strategy: Mature Your Security Practice With Strategy

Note: Security

Security strategy is about the choices we make to prioritize what we do to better protect our data. A comprehensive and flexible security strategy that mitigates risk is one that is well-defined, holistic, risk-aware, and aligned with the goals of the organization. Learn more in this Info-Tech...

Securiti

SoftwareReviews: Software Product

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance.

Abnormal Security

SoftwareReviews: Software Product

The Abnormal Security platform protects enterprises from targeted email attacks. Abnormal Behavior Technology (ABX) models the identity of both employees and external senders, profiles relationships and analyzes email content to stop attacks that lead to account takeover, financial damage and organizational mistrust. Though one-click, API-based.

How to choose the right security training provider for your team

In The News:

How to choose the right security training provider for your team

How to choose the right security training provider for your team. Your enterprise's security team is entrusted with a critical mission: protecting systems, resources and users from phishing, ransomware, denial-of-service attacks, data theft, malware infection and assorted other attacks. Staying on top of emerging and evolving threats requires.

Hornet Security

SoftwareReviews: Software Product

Safeguard your email communications and protect your inbox from unwanted messages. In the simplest possible way without having to give up control.

Protegrity Cloud Security Gateway

SoftwareReviews: Software Product

Protegrity Cloud Security Gateway protects your data before it gets to the cloud, giving you the freedom to use cloud services without the risk of exposure. Easily leverage tokenization, encryption and activity monitoring with leading cloud providers without breaking any existing functionality.

Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171