Select GTP Document to provide feedback on.
<Please Select...>
0 Other Document (Not in this list, please type the name of doc in next field)
2020 Planning Guide for Security and Risk Management
2021 Planning Guide for Security and Risk Management
2022 Security and Risk Management Planning Guide
A Comparison of Remote Network Access Options for Enterprise Endpoints
A Comparison of UEBA Technologies and Solutions by Anton Chuvakin
A Guidance Framework for Developing and Implementing Vulnerability Management
A Guidance Framework for Prioritizing AWS Native Security Tools
A Guide to Data Security Concepts
A Step-by-Step Guide to Becoming a CISO - Patrick Hevesi
Address Security-Related Business Risk While Transitioning to Cloud Services
Advance and Improve Your Mobile Security Strategy
Assessing the Security Capabilities of Salesforce Sales Cloud
Best Practices on securely deploying Microsoft Teams
Cloud Security: FAQs From Gartner Clients
Comparing Products for Microsegmentation in Virtualized Data Centers by Joerg Fritsch
Comparison of Mobile Threat Defense Solutions - Patrick Hevesi
Containers: 11 threats and how to control them
Data Loss Prevention; Comparing Architecture Options
Demystifying Security Analytics: Sources, Methods and Use Cases by Anton Chuvakin
Designing and Implementing a Ransomware Defense Architecture
Essential Skills for Cloud Security Architects
Guidance Framework for Security Kubernetes
Guide to Application Security Concepts
Guide to Cloud Security Concepts
Guide to Endpoint Security Concepts
Guide to Infrastructure Security Concepts
Guide to Network Security Concepts
How to Build an Effective Email Security Architecture
How to Develop and Maintain Security Monitoring Use Cases
How to Hunt for Security Threats by Anton Chuvakin
How to Implement Enterprise Digital Rights Management to Control Unstructured Data
How to Plan, Design, Operate and Evolve a SOC by Anton Chuvakin
How to protect your clouds with CSPM, CWPP, CNAPP and CASB
How to Work With an MSSP to Improve Security
Manage your Machine Identities Including Secrets, Keys and Certificates
Mobile Device Security: A Comparison of Platforms - Patrick Hevesi
Preparing Your Security Operations for Orchestration and Automation Tools
Scorecard CASB: Microsoft Cloud App Security (MCAS)
Solution Comparison for Cloud Access Security Brokers
Solution Comparison for Cloud MFA Services
Solution Comparison of CASB
Solution Comparison of the Native Security Capabilities within Alibaba Cloud, AWS, Azure, GCP, IBM cloud and OCI
Solution Criteria for Cloud Access Security Brokers
Solution Criteria for Secure Email Gateways
Solution Path for API Security Strategy
Solution Path for Security in the Public Cloud
Solution Scorecard EPP:Microsoft Defender for Endpoint (MDE)
Top Trends in Customer IAM Solution Design
Understanding and Implementing Security in Google Cloud Platform
Understanding and Implementing Security in Microsoft 365: Office 365 (Exchange Online, SharePoint Online, OneDrive for Business, Teams), EMS and Microsoft Defender ATP
Understanding and Implementing Security in Office 365: Exchange Online, SharePoint Online and OneDrive for Business - Patrick Hevesi
Using Classification to Improve Unstructured Data Security
Using cloud native policy-as-code to secure deployments at scale
Using Penetration Testing and Red Teams to Assess and Improve Security by Augusto Barros
Work from home in the new age
Enter other GTP Document title and Author. (Only use this if document was not in question 1 list)
Rate the Overall document quality (1 - 5, Lowest to Highest)
Clear
How effective was the Guidance/Recommendations? (1 - 5, Lowest to Highest)
Clear
How effective were the graphics/tables/videos? (1 - 5, Lowest to Highest)
Clear
What was missing, do you have any suggestions of content to add or questions to be answered in a future version of this document?
Any other comments?
Are you willing to be contacted for follow up? Please provide email