The unification of operational technology (OT) and information technology (IT) brings a range of benefits to sophisticated technology systems in industries…
Read MoreResearch
Key Criteria for Evaluating Distributed Denial of Service (DDoS) Protection Solutions
According to the Cybersecurity and Infrastructure Security Agency (CISA), distributed denial of service (DDoS) attacks are a growing threat to organizations.…
Read MoreKey Criteria for Evaluating Operational Technology (OT) Security Solutions
The unification of operational technology (OT) and informational technology (IT) brings a range of benefits to sophisticated technology systems in industries…
Read MoreGigaOm Radar for Zero-Trust Network Access (ZTNA)
Secure remote access is a critical component of an organization’s ability to maintain business operations. Before COVID, many saw remote access…
Read MoreCxO Decision Brief: Managed Security Service Providers (MSSP)
This GigaOm CxO Decision Brief report was commissioned by OTAVA. Managed security service providers (MSSP) fill a critical need for businesses…
Read MoreGigaOm Radar for Extended Detection and Response (XDR)
Enterprise cybersecurity comprises multiple security solutions from various vendors. Solutions are paired with a security information and event management (SIEM) and/or…
Read MoreKey Criteria for Evaluating Zero-Trust Network Access Solutions
Secure remote access provides numerous benefits to organizations, making it an essential component of their business operations. One of the primary…
Read MoreKey Criteria for Evaluating Extended Detection and Response Solutions
Enterprise cybersecurity is typically composed of multiple solutions from various vendors, combined with a security information and event management (SIEM) and/or…
Read MoreGigaOm Radar for Deception Technology
The prevalence of malicious actors in the digital world has created a dynamic that compels cybersecurity defenses to adapt constantly. Attackers…
Read MoreKey Criteria for Evaluating Deception Technology Solutions
Attacker techniques and behaviors are constantly evolving. As cybersecurity vendors zig, attackers zag. This creates an environment where what worked in…
Read MoreGigaOm Radar for Cybersecurity Incident Response
Cybersecurity incidents are a daily occurrence, and their frequency is only increasing. According to research conducted by the Cybersecurity and Infrastructure…
Read MoreKey Criteria for Evaluating Cybersecurity Incident Response Solutions
Cybersecurity incidents are a daily occurrence and their frequency is only increasing. According to research conducted by the Cybersecurity and Infrastructure…
Read More