All Research

Organizations Report Higher Satisfaction When Switching to Software With an Info-Tech Award

Thinking about choosing a new software vendor but don't know where to start? Narrow down your shortlist by focusing on software that has received an Info-Tech Research...

Webinar: Lay the Foundations for Project Portfolio Management

Develop foundational practices in each of the following areas: portfolio management, project management, and organizational change management.

University Researchers Use AI to Highlight Zoom’s Privacy Risks

University researchers used artificial intelligence in an experiment to determine the extent of privacy risks that come with the use of this web conferencing tool. Publicly...

Noncompliance in O365 or M365 With Microsoft Is as Easy as Counting From One to Three

With lots of functionality being provisioned/deployed at the tenant level, Microsoft is happy to sit back for now, watch, and start auditing in the future.

Can Box Be Used Instead of SharePoint Online in Microsoft Teams?

Teams is designed for close integration with SharePoint, but the latest Box/Teams integration has organizations wondering if they can use Box instead. This note outlines...

Stackify Changes Pricing Model for Retrace

Stackify has changed the pricing model for its APM tool, Retrace. This change in pricing is in line with usage-based shifts in technology along with changing architectures.

DeviceLock Acquired by Cyberprotection Vendor Acronis

To bolster and broaden its data privacy capabilities for end users, cyber and data protection vendor Acronis has acquired DLP player DeviceLock. The acquisition aligns with...

PARk it Can Make Restaurants POS-Digital in 24 Hours

As COVID-19 swept across the globe, many food and beverage operators were forced to switch to pick-up or delivery methods only. PAR’s novel solution PARk it supplies...

Signal Sciences Shows Off Its Next-Gen WAF and RASP at Black Hat 2019

Signal Sciences showed off its award-winning next-gen web application firewall and runtime application self-protection product at Black Hat 2019. It has become one of the...

Address the Root of Your Vulnerabilities in a Resource-Tight Period

Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike....
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us