This report documents the GigaOm Field Test Lab Setup instructions to evaluate Aporeto’s zero trust cloud security solution. This report corresponds…
Read MoreResearch
Public Key Infrastructure
The role of the CIO has evolved and encompasses more than managing servers, data centers, and the applications that run on…
Read MoreFinancial Services: Document Productivity and the Digital Experience
Documents have always been part of the financial services industry. The ability to represent agreements or processes with documents is key…
Read MoreDevSecOps
To ensure data and services are protected against attack, DevOps is evolving to incorporate cybersecurity practices across the lifecycle. Organizations need…
Read MoreDeception Technology
Deception technology is designed to detect the presence of adversaries on an enterprise network by using decoy systems as bait and…
Read MoreBug Bounty and Penetration Testing
Bug bounties and penetration testing (pen-testing) are powerful techniques that uncover flaws in controls, applications, and hardware. They enable enterprises to…
Read MoreKey Criteria for Evaluating Enterprise HCI
IT organizations of all sizes are facing several infrastructure challenges. On one hand, they repeatedly receive pressing requirements coming from the…
Read MoreLeveling Up DevOps Security
Cybersecurity and innovation are not the most comfortable of bedfellows. While every CIO will say security is a top priority, innovation…
Read MoreAdvanced Behavioral Analytics and Threat Detection: Next-Gen Info Security and Network Defense
The ability to detect events and determine their intent — good versus bad — is crucial to information security and network…
Read MoreData Protection and Data Management Vendor Review of Veeam: Customer-Focused, Future Forward, Feet on the Ground
Last week I attended VeeamON 2019, in Miami, and I had the chance to get a better idea about the status…
Read MoreEnterprise-Level Mobile and IoT Security
Mobile devices have become ubiquitous within the enterprise over the last decade moving from shadow implementations to mainstream for extended communications,…
Read MoreHow IBM is Rethinking its Data Protection Line-Up
Following up on my take on the evolution of product and strategy of companies like Cohesity and NetApp, today I’d like…
Read MoreThe New Ecosystem of Identity Access Management
The saying goes, “Identity is the new security perimeter.” This changes the traditional way we think about granting users access to…
Read MoreFrom Data Protection to Data Management and Beyond
Just three weeks into 2019, Veeam announced a $500M funding round. The company is privately held, profitable and with a pretty…
Read MorePhishing Prevention and Detection
Information security touches every aspect of our digital lives in unpredictable and often unintuitive ways. We are all expert in understanding…
Read MoreCIO Report: Enterprise Data Protection
The enterprise data protection market still leverages a traditional approach to solving the increasingly complicated enterprise requirements. Solutions range from on-premises…
Read More