Penetration testing has long been a technique used by security teams to find vulnerabilities in their systems and applications, enabling them…
Read MoreResearch
Key Criteria for Evaluating Container Security
Containers have revolutionized the way that IT views servers. While virtual machines (VMs) allowed users to run many logical servers on…
Read MoreGigaOm Radar for Penetration Testing as a Service
Penetration testing has long been a technique used by organizations to find vulnerabilities in their systems and applications, enabling them to…
Read MoreGigaOm Radar for Automated Security Operations Management
Security information and event management (SIEM) solutions have been the main monitoring tools for security operations centers (SOCs). As they observe…
Read MoreHigh-Performance Web Application Firewall Testing
This free one-hour webinar from GigaOm Research features analyst Jake Dolezal and will compares four web application firewall (WAF) security platforms…
Watch NowThe Business Value of Teleport
The nature of business has changed from digitally enabled to digital first, and that has forced businesses to rethink how security…
Read MoreHigh-Performance Web Application Firewall Testing
Data, web, and application security have evolved dramatically over the past few years. Just as new threats abound, the architecture of…
Read MoreGigaOm Radar for Security Orchestration, Automation, and Response
Security orchestration, automation, and response (SOAR) emerged as a product category in the mid-2010s. At that point, SOAR solutions were based…
Read MoreKey Criteria for Evaluating Security Orchestration, Automation, and Response Solutions
Depending on the size of an organization, security information and event management (SIEM) tools can produce tens of thousands of alarms…
Read MoreGigaOm Radar for Endpoint Detection and Response
The endpoint is, in some ways, an unusual problem forced upon organizations and security teams. Endpoints are portals through which sensitive…
Read MoreKey Criteria for Evaluating Security Information and Event Management Solutions
Security information and event management (SIEM) solutions consolidate multiple security data streams under a single roof. Initially, SIEM supported early detection…
Read MoreGigaOm Radar for DDoS Protection
With ransomware getting all the news coverage when it comes to internet threats, it’s easy to lose sight of distributed denial…
Read MoreGigaOm Radar for API Security
APIs are quickly becoming the largest attack surface in applications. API security solutions help an organization improve its security posture by…
Read MoreKey Criteria for Evaluating API Security Solutions
Application programming interfaces (APIs) have been a growing attack surface—and a commensurately growing problem—for more than a decade. There have been…
Read MoreKey Criteria for Evaluating Endpoint Detection and Response Solutions
The endpoint presents, in some ways, an unusual problem forced upon organizations and security teams. Endpoints are portals through which sensitive…
Read MoreKey Criteria for Evaluating Distributed Denial of Service Protection Solutions
Although ransomware is making all the headlines today, it’s not the only kind of attack that businesses should arm themselves against.…
Read MoreGigaOm Radar for Multifactor Authentication
Multifactor authentication (MFA) is a credential verification method that requires the provisioning of two or more verification factors to gain access…
Read MoreGigaOm Radar for Cloud Security Posture Management
Too often security teams struggle to make do with suboptimal, legacy, on-premises architectures. These architectures are filled with bolt-on security solutions…
Read MoreKey Criteria for Evaluating Cloud Security Posture Management Solutions
Too often, security teams struggle to make do with suboptimal, legacy on-premises architectures. These architectures are filled with bolt-on security solutions…
Read MoreGigaOm Radar for Privileged Access Management
Privileged credentials (or administrator rights) are a top target for attackers from outside an organization, and even from among unhappy staff…
Read MoreGigaOm Radar for Data Loss Prevention
Data is at the core of today’s enterprise, and ensuring it’s protected and secure is at the top of every enterprise’s…
Read MoreGigaOm Radar for Continuous Vulnerability Management
Vulnerability management is a mature component of the cybersecurity ecosystem. It has become a commodity function, an expected part of every…
Read MoreKey Criteria for Evaluating Multifactor Authentication Solutions
Multifactor authentication (MFA) addresses one of the most vulnerable elements in cybersecurity—humans. As most attacks are enabled through social engineering, MFA…
Read MoreKey Criteria for Evaluating Continuous Vulnerability Management Solutions
Vulnerability management (VM) is a mature component of the cybersecurity ecosystem. It has become a commodity function, an expected part of…
Read More