Data is at the core of today’s enterprise, and ensuring it’s protected and secure is at the top of its agenda.…
Read MoreResearch
GigaOm Radar for Comprehensive Anti-Phishing Solutions
In February 2020, GigaOm published its first analysis of the phishing detection and prevention market, “Key Criteria for Evaluating Phishing Protection…
Read MoreGigaOm Radar for Cloud Access Security Broker
An ever-increasing number of organizations are moving data and applications to the cloud; however, concerns regarding this approach remain—in particular, the…
Read MoreGigaOm Solution Profile: Sumo Logic
Sumo Logic Cloud SOAR is a comprehensive security orchestration, automation, and response platform that leverages AI and ML technologies for intelligent…
Read MoreGigaOm Radar for Enterprise Password Management
It’s critical for enterprises to manage how their resources (data, accounts, corporate controlled assets) are accessed—whether resources are local or remote.…
Read MoreKey Criteria for Evaluating Comprehensive Anti-Phishing Solutions
In February 2020, GigaOm published its first analysis of the phishing detection and prevention market, “Key Criteria for Evaluating Phishing Protection…
Read MoreKey Criteria for Evaluating Cloud Access Security Broker Solutions
The migration of IT support and IT business systems to the cloud is becoming the new way of doing business. Common…
Read MoreJamal Bihya
Jamal Bihya is a creative technology leader with over 30 years of experience delivering innovative, critical, and operational solutions for organizations…
Learn MorePragmatic view of Zero Trust
Traditionally we have taken the approach that we trust everything in the network and everything in the enterprise and put our…
Read MoreGigaOm Radar for Threat Intelligence Solutions
Risk-based cyber defense strategies and secure infrastructures require validated and actionable threat intelligence (TI). The adoption of intelligence-based approaches for enterprise…
Read MoreGigaOm Radar for Secure Service Access
Secure service access (SSA) represents a significant shift in the way organizations consume network security. Replacing multiple point products with a…
Read MoreKey Criteria for Evaluating Threat Intelligence Solutions
Effective risk-based cyber-defense strategies and infrastructures rely on validated and actionable threat intelligence (TI). Comprehensive solutions collect or procure threat intelligence…
Read MoreBrenton Bowen
Based in Basque Country, Brenton is an experienced IT and cybersecurity practitioner. He has worked for IT and cybersecurity organizations across…
Learn MoreGigaOm Radar for Identity as a Service
Identity is at the core of the modern business environment. It’s the control plane for how users, partners, and customers interact…
Read MoreKey Criteria for Evaluating Enterprise Password Management Solutions
Every enterprise has employees, perhaps hundreds or thousands, all of whom are buried in dozens of username and password combinations. How…
Read MoreKey Criteria for Evaluating Secure Service Access
Secure service access (SSA) represents a significant shift in the way network security is consumed. With the IT security arena flooded…
Read MoreKey Criteria for Evaluating Privileged Access Management Solutions
Privileged access management (PAM) enables administrative access to critical IT systems while minimizing the chances of security compromises through monitoring, policy…
Read MoreThe Increasing Value of E-Signatures for Driving Automation and Compliance
This free one-hour webinar from GigaOm Research brings together experts in e-zignatures, featuring GigaOm analyst Bill Witter and special guest from…
Watch NowKey Criteria for Evaluating Identity as a Service Solutions
User access management, or identity and access management (IAM), is a critical part of enterprise IT. It has long allowed organizations…
Read MoreGigaOm Radar for Zero-Trust Network Access (ZTNA)
Virtual private networks (VPNs) have long been the default method of securing remote access. VPNs provided a way to prevent exposing…
Read MoreGigaOm Radar for Extended Detection and Response (XDR) Solutions
Enterprise cybersecurity is typically composed of multiple security solutions from various vendors combined with a security information and event management (SIEM)…
Read MoreKey Criteria for Evaluating XDR Solutions
Enterprise cybersecurity is typically composed of multiple solutions from various vendors, combined with a security information and event management (SIEM) and/or…
Read MoreRansomware: Why It’s Time to Think of it as a Data Management Problem
Over the last couple of years, ransomware has taken center stage in data protection, but very few people realize it is…
Read MoreKey Criteria for Evaluating Intelligent Fraud Detection in Financial Transactions
The banking and financial services industry—and any large organization processing payments—faces a challenge with fraudulent activity. The move of many businesses…
Read More