Virtual desktop infrastructure (VDI) is of particular interest today, as working from home has become the new normal during (and most…
Read MoreResearch
GigaOm Sonar for VMware Global Clouds
The largest global public cloud providers all have services that provide customers with a vSphere cluster inside the provider’s data center.…
Read MoreGigaOm Radar for Hyperconverged Infrastructure Solutions: SMB Deployments
Hyperconvergence has quickly become a popular option for IT infrastructures, no matter the size of the company or the industry in…
Read MoreGigaOm Radar for Hyperconverged Infrastructure Solutions: Edge Deployments
Edge deployments are among the most dispersed HCI environments, with small clusters at many locations and usually without technical staff readily…
Read MoreGigaOm Radar for Hyperconverged Infrastructures: Enterprise Deployments
Hyperconvergence for the enterprise market is both mature and consolidated. VMware Cloud Foundation (VCF) holds the lion’s share of the market…
Read MoreKey Criteria for Evaluating Hyperconverged Infrastructure Solutions
Traditional infrastructures are too complex, too difficult to manage, too slow to adapt to changes, and too expensive to adequately respond…
Read MoreGigaOm Radar for Disaster Recovery as a Service (DRaaS)
Very few organizations see disaster recovery (DR) for their IT systems as a business differentiator, so they often prefer to outsource…
Read MoreGigaOm Radar for DDoS Protection
With ransomware getting all the news coverage when it comes to internet threats, it is easy to lose sight of distributed…
Read MoreKey Criteria for Evaluating a Distributed Denial of Service (DDoS) Solution
Although ransomware is making all the headlines today, it’s not the only kind of attack that can intrude between you and…
Read MoreKey Criteria for Evaluating Disaster Recovery as a Service (DRaaS)
Disaster Recovery (DR) provides rapid restoration of one or more applications or systems when the data center where they reside is,…
Read MoreGigaOm Radar for Privileged Access Management
Privileged credentials (administrator rights) are a top target for attackers from outside the organization, or even from among unhappy staff within,…
Read MoreKey Criteria for Evaluating Privileged Access Management
Privileged Access Management (PAM) enables administrative access to critical IT systems while minimizing the chances of security compromises through monitoring, policy…
Read More