Information security management

Protects the organisation's information, ensuring its confidentiality, integrity, and availability.

Where This Practice Delivers Impact

Establishing policies to protect customer data from breaches.

Atlassian Access Checkmarx CrowdStrike Falcon Micro Focus Palo Alto Networks Prisma Cloud Qualys

Practice FAQs

Protects the organisation's information, ensuring its confidentiality, integrity, and availability.

Establishing policies to protect customer data from breaches.

Featured partners include Atlassian Access, Checkmarx, CrowdStrike Falcon, Micro Focus, Palo Alto Networks Prisma Cloud, Qualys.

Partner Ecosystem

Browse all solutions
Atlassian Access logo

Atlassian Access

Provides enterprise-grade security and centralised administration for Atlassian cloud products.

Identify information security risks Implement security controls
Visit vendor
Checkmarx logo

Checkmarx

Provides a static code analysis tool to identify and fix security vulnerabilities in the code, enhancing software security.

Identify information security risks Implement security controls
Visit vendor
CrowdStrike Falcon logo

CrowdStrike Falcon

Delivers next-gen endpoint protection by combining antivirus, EDR, and managed hunting in a single lightweight agent.

Identify information security risks Implement security controls
Visit vendor
Micro Focus logo

Micro Focus

Offers a comprehensive portfolio of enterprise software solutions that help organisations innovate faster and with lower risk.

Identify information security risks Implement security controls
Visit vendor
Palo Alto Networks Prisma Cloud logo

Palo Alto Networks Prisma Cloud

A comprehensive cloud security platform that provides visibility, compliance, and threat protection across hybrid and multi-cloud environments.

Identify information security risks Implement security controls
Visit vendor
Qualys logo

Qualys

A cloud-based security and compliance platform that helps organisations identify and manage vulnerabilities and security risks.

Identify information security risks Implement security controls
Visit vendor
Sonatype logo

Sonatype

Provides open-source governance and software supply chain automation solutions to help organisations ensure the quality and security of their software components.

Identify information security risks Implement security controls
Visit vendor
Veracode logo

Veracode

Provides application security solutions that help organisations identify and fix security vulnerabilities in their software.

Identify information security risks Implement security controls
Visit vendor