Sit up straight! Shoulders back, chest out! We all heard these wise words about the importance of physical posture growing up.…
Read MoreResearch
GigaOm Radar for Data Security Posture Management (DSPM)
Data security posture management (DSPM) solutions provide visibility into where sensitive data is, who has access to it, and how it…
Read MoreSSE vs. SASE: Which One is Right for Your Business?
Security service edge (SSE) and secure access service edge (SASE) are designed to cater to the evolving needs of modern enterprises…
Read MoreThere’s Nothing Micro About Microsegmentation
I began my exploration of the microsegmentation space by semantically deconstructing the title. The result? Microsegmentation solutions help define network segments…
Read MoreGigaOm Radar for Security Service Edge (SSE)
Designed to address the evolving needs of modern enterprises as they navigate the complexities of cloud adoption, remote work, and digital…
Read MoreThe Quest for Extended Detection and Response (XDR): Unraveling Cybersecurity’s Next Generation
Embarking on an exploration of the extended detection and response (XDR) sector wasn’t just another research project for me; it was…
Read MoreGigaOm Key Criteria for Evaluating Identity Threat Detection and Response (ITDR) Solutions
Identity management is an essential part of any organization’s IT infrastructure because it serves as the means to control access to…
Read MoreGigaOm Radar for Extended Detection and Response (XDR)
Enterprise cybersecurity comprises multiple security solutions from various vendors. Solutions are typically combined with a security information and event management (SIEM)…
Read MoreGigaOm Key Criteria for Evaluating Data Security Posture Management (DSPM) Solutions
Data is core to all organizations and should be treated as an essential asset. As the data landscape continues to evolve,…
Read MoreCxO Decision Brief: Elevate Cyber Resilience with Commvault Cloud Cleanroom Recovery
This GigaOm CxO Decision Brief commissioned by Commvault. Commvault® Cloud Cleanroom™ Recovery has emerged as a pivotal solution for organizations and…
Read MoreCxO Decision Brief: Advancing Data Governance with Commvault Cloud Cleanroom Recovery
This GigaOm CxO Decision Brief was commissioned by Commvault. Data executives are primarily concerned with data management, emphasizing the governance, quality,…
Read MoreCxO Decision Brief: Enhancing Cyber Resilience with Commvault Cloud Cleanroom Recovery
This GigaOm CxO Decision Brief commissioned by Commvault. Let’s be clear: It’s not a matter of if or when your organization…
Read MoreNavigating the SEC Cybersecurity Ruling
The latest SEC ruling on cybersecurity will almost certainly have an impact on risk management and post-incident disclosure, and CISOs will…
Read MoreGigaOm Radar for Microsegmentation
Microsegmentation solutions define and enforce per-entity communications policies. In this context, an entity can be any information technology (IT) or operational…
Read MoreGigaOm Key Criteria for Evaluating Extended Detection and Response (XDR) Solutions
Enterprise cybersecurity is composed of multiple security solutions from various vendors combined with a security information and event management (SIEM) and/or…
Read MoreGigaOm Key Criteria for Evaluating Microsegmentation Solutions
Microsegmentation solutions isolate single entities on networks by restricting inbound traffic, minimizing a malicious actor’s potential for lateral movement. A more…
Read MoreThe Time is Right to Review Your Enterprise Firewalls
Firewalls, we all have one. It’s a well-established market, full of vendors with mature stacks of technology. Firewalls do a number…
Read MoreCIEM: Bridging the Gap Between IAM and Cloud Security
The cloud-first strategy is no longer in its infancy. This wave of change has impacted and continues to disrupt the entire…
Read MoreSpringing the Trap: Snagging Rogue Insiders with Deceptive Tactics
Insider threats pose a serious cybersecurity challenge for organizations across all industries. When trusted employees, contractors, or partners abuse their privileges…
Read MoreThe Evolution of Application and API Security (AAS)
AAS Today Application and API security (AAS) has been around as a unified security toolset for several years now, and it…
Read MoreGigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM)
Cloud infrastructure and endpoint management (CIEM) solutions enable organizations to efficiently manage and secure their cloud infrastructure as well as the…
Read MoreDNS Security: The Forgotten Hero of Your Cybersecurity Strategy
Cybersecurity continues to dominate business IT discussions in response to constantly evolving threats from ever more organized and professional adversaries. The…
Read MoreBest Practices for Implementing an ASM Solution
In the ever-changing realm of digital technology, organizations are witnessing an unprecedented expansion of their digital footprints. This expansion is not…
Read MoreGigaOm Radar for Enterprise Firewalls
Firewalls have been a staple of network security for decades, sitting at the perimeter of an organization’s network and using stateful…
Read More