Menu Close

Market Spotlight and Insight Reports deliver informed guidance for making better choices and reducing risks

Featured Report

Market Report Center

Application Security Spotlight Report

Application Security Spotlight Report

Application Security In 2019 Research Queue In 2019 Research Queue – Application security is one of the eight digital ecosystems that runs across the entire spectrum of Cyber activities. Key considerations for an effective strategy for AppSec include coverage, extensiveness and the what, when, who, where and why it is used. Vendors covered in this Spotlight report include … About Cyber Source Data About the …
More
Cyber Capability Management Insights Report

Cyber Capability Management Insights Report

Cyber Capability Management In 2019 Research Queue In 2019 Research Queue – Cyber Capability Management is the core planning activity of Cyber, responsible for where the organization will be in 3 months, 6 months and 12 months or more out, what steps are needed to arrive at each destination, and the full set of capabilities needed to achieve operating, risk and financial management objectives for …
More
Cyber Effectiveness Insights Report

Cyber Effectiveness Insights Report

Cyber Effectiveness In 2019 Research Queue In 2019 Research Queue – The range of experience among organizations is from most effective to less than effective across industries and size of organizations. This special Market Insights report covers the salient differences when it comes to Cyber effectiveness. This report uses information from primary research interviews conducted with people and organizations around the world to illustrate differences …
More
Cyber Innovation Management Insights Report

Cyber Innovation Management Insights Report

Cyber Innovation Management In 2019 Research Queue In 2019 Research Queue – Cyber Innovation Management is a core planning activity, one claimed to be of importance by more than half of organizations, but which sees the lowest rate of adoption in practice by most organizations today. It is responsible for driving both opportunity and effectiveness for the organizations that are practicing it today. This special …
More
Cyber Portfolio Management Insights Report

Cyber Portfolio Management Insights Report

Cyber Portfolio Management In 2019 Research Queue In 2019 Research Queue – Cyber Portfolio Management is one of the core governance and management activities responsible for allocating resources to drive and deliver more effective operating results for Cyber. It encompasses the management of people, labor, procedures, activities, workflows, controls and expectations while planning for and implementing change. This special report uses information from primary research …
More
Cyber Spend Management Insights Report

Cyber Spend Management Insights Report

Cyber Spend Management In 2019 Research Queue In 2019 Research Queue – Spanning a wide set of disciplines, Cyber Spend Management includes obvious budgeting and cost management tasks to more exotic decision-making related to financial planning and effectiveness related to involving the management of risk, value, and future-state Cyber operations of the enterprise. This special report uses information from primary research interviews conducted with people …
More
Identity Access Management Spotlight Report

Identity Access Management Spotlight Report

Identity Access Management In 2019 Research Queue In 2019 Research Queue – Identity Access Management consists of two of the Cyber activities and operates up and down the digital ecosystems. Key considerations for a successful IAM strategy include the who, what, when, where and why it is used, it’s extensiveness, and integration capabilities. Vendors covered in the report include … About Cyber Source Data About …
More
Managed Security Services Spotlight Report

Managed Security Services Spotlight Report

Managed Security Services In 2019 Research Queue In 2019 Research Queue – Managed Security Services are – generally – fixed-fee services delivered by a services providers for a specific set of cyber capabilities. These capabilities my address one or more cyber activities and one or more digital ecosystems. Key considerations for an effective strategy for MSS include SLAs, technology updates, upgrades, refresh, and co-savings that …
More

Not yet a Member?