Executive View
SAP Enterprise Threat Detection
In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and ope...
Executive View
IBM QRadar Advisor with Watson
QRadar Advisor with Watson integrates the QRadar Security Analytics Platform with Watson’s cognitive AI to perform fully automated forensic investigations of security incidents, dr...
Analyst Advice
Business Resilience Management (Crisis Roadmap for Beginners...
Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.
Advisory Note
Business Continuity in the age of Cyber Attacks
Business continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organizations to alter...
Executive View
RSA NetWitness® Suite
RSA NetWitness Suite is a security monitoring solution that combines log and network traffic analysis with endpoint-based visibility and automated threat intelligence to detect and...
Executive View
Saviynt Security Manager for Enterprise IGA
Saviynt offers a comprehensive compliance-as-a-service platform providing Identity Governance and Management, Application Risk and Governance, Cloud Security, and Cloud PAM functio...
Executive View
F-Secure Rapid Detection & Response
Rapid Detection & Response is F-Secure’s Endpoint Detection & Response (EDR) solution. It runs on Windows and Mac clients, collecting and analyzing information to help security ana...
Executive View
Symantec Advanced Threat Protection
Symantec Advanced Threat Protection is a unified platform for uncovering and remediating advanced cyber-attacks across endpoints, network and email, which augments existing Symante...
Advisory Note
Understanding and Countering Ransomware
Ransomware is a top security threat and continuously on the rise. Financial organizations, healthcare institutions, and manufacturing industries are the most vulnerable groups; how...
Leadership Brief
Penetration Testing Done Right
Penetration Testing should be a key part of any business's assurance process, providing a level on independent testing that they are not wide open to hackers or other malicious act...
Executive View
Radiflow SCADA Security Suite
Radiflow SCADA Security Suite is a comprehensive set of hardware products, software solutions, and managed services offering risk-based insights into ICS/SCADA networks, intelligen...
Executive View
VeriClouds Identity Threat Protection Platform
Securely authenticating users remains a difficult problem. VeriClouds offers an Identity Threat Protection Platform that can provide a useful additional level of assurance against...
Leadership Compass
Cloud-based MFA Solutions
This report provides an overview of the market for Cloud-based Multi-Factor Authentication (MFA) Solutions and provides you with a compass to help you to find the service that best...