Article No. / Date
Articles
lb80209

Leadership Brief

Responding to Cyber Incidents

The overwhelming majority of organizations now depend upon online services to support their business and this exposes them to cyber security risks. While most have security protec...

lb80195

Leadership Brief

Access Reviews Done Right

Access reviews are considered important risk management controls in many organizations. They are intended to ensure that each user, process and system has always only the minimum...

ev80077

Executive View

Ideiio IGA

Identity Governance and Administration (IGA) is an important security and risk management discipline that builds the necessary foundation of any organization’s IT security portfoli...

ev79074

Executive View

Exostar Supplier Risk Management

Exostar Supplier Risk Management delivers advanced capabilities for identifying and managing risk and compliance with cybersecurity and other best practices and standards, along th...

ev70370

Executive View

Saviynt Identity Governance and Administration (IGA)

Saviynt provides a comprehensive platform for Identity Lifecycle Governance and Administration combined with Application GRC, IaaS Governance, Data Governance, and Privileged User...

ev79066

Executive View

IBM Security Access Manager (ISAM)

As IAM is continuing to evolve based on the growing list of IT security requirements, so is IBM Security Access Manager (ISAM). Not only does ISAM provide the essentials of access...

an72582

Advisory Note

GRC Reference Architecture

GRC covers the areas of Governance, Risk and Compliance and this report refers to GRC in the context of delivering IT services to meet organizational goals. GRC is concerned with s...

ev70362

Executive View

TechDemocracy Intellicta

A software platform designed to achieve a holistic assessment of an organization’s cybersecurity, compliance, risk and governance status by establishing risk governance, resilience...

ev79054

Executive View

Semperis Directory Services Protector for Active Directory

Active Directory provides critical identify infrastructure for the enterprise. Semperis offers Active Directory change monitoring and forest recovery products. The Semperis DS-Prot...

an72565

Advisory Note

Big Data Security, Governance, Stewardship

An ever-increasing number of devices, sensors and people are connected to the global internet and generate data. The analysis of this data can help organizations to improve their e...

ev79056

Executive View

Deep Secure Content Threat Removal Platform

The Content Threat Removal Platform by Deep Secure operates at the network boundary, intercepts and analyzes incoming data, extracts only the useful business information while elim...

an72564

Advisory Note

Security Organization, Governance, and the Cloud

The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost. This document provides an overvi...

lb70222

Leadership Brief

A Practical Approach to Enterprise Security Architecture (ES...

An enterprise security architecture (ESA) is a critical component to an enterprise architecture (EA) that describes how IT services, processes, and technologies should be protected...

top