Tagged - identity security

Assess and Govern Identity Security

Security leaders view modernizing identity security as too daunting and prefer to focus on narrower technology challenges. This limited focus is reactive and, in the long...
  • guided implementation icon

Assess and Govern Identity Security – Phases 1-2

A step-by-step document that walks you through how to properly inventory your identity types, repositories, threats, and mitigations.

Identity Security RACI Chart

A best-of-breed template to help you document roles and responsibilities related to identity security.

Identity Security Architecture Tool

A structured tool to help you inventory identity types, threats, and mitigations using the MITRE ATT&CK® framework.

Determine Your Zero Trust Readiness

Traditionally, IT security was typified by perimeter security, like you would see in a castle and moat, where if you could get through the front gates, you were trusted...
  • guided implementation icon

Determine Your Zero Trust Readiness – Executive Brief

Read our concise Executive Brief to find out why you should determine your zero trust readiness, review Info-Tech’s methodology, and understand the ways we can support...

Determine Your Zero Trust Readiness – Phases 1-2

IT security was typified by perimeter security. However, the way the world does business has mandated a change to IT security. In response, zero trust is a set of...

Zero Trust Security Benefit Assessment Tool

This tool helps an organization identify the major benefits and drivers for adopting a zero trust security strategy.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us