Security Orchestration, Automation, and Response (SOAR) emerged as a product category in the mid-2010s. At that point, SOAR solutions were very…
Read MoreResearch
GigaOm Radar Report for Evaluating Service Mesh
Historically, developers independently implemented error handling, observability, and security within each application or microservice to ensure the success of inbound and…
Read MoreKey Criteria for Evaluating Service Mesh
The service mesh approach was conceived to simplify and streamline the development and deployment of microservices-based applications. Replacing monolithic architectures, microservices…
Read MoreGigaOm Radar for Security Information and Event Management (SIEM) Solutions
The security information and event management (SIEM) solution space is mature and competitive. Most vendors have had well over a decade…
Read MoreKey Criteria for Evaluating Security Orchestration, Automation, and Response (SOAR)
Depending on the size of an organization, Security Information and Event Management (SIEM) tools can produce tens of thousands of alarms…
Read MoreKey Criteria for Evaluating a Distributed Denial of Service (DDoS) Solution
Although ransomware is making all the headlines today, it’s not the only kind of attack that can intrude between you and…
Read MoreSolution Profile: VyOS
The VyOS project started in 2013 as a fork of Vyatta Core when the open-source Vyatta version was acquired by Brocade…
Read MoreGigaOm Radar for Evaluating Secure Service Access
Due to the rapid adoption of cloud services, edge networks, and mobile workforces redefining the boundaries of the enterprise, digital transformation…
Read MoreKey Criteria for Evaluating Security Information and Event Management Solutions (SIEM)
Security Information and Event Management (SIEM) solutions consolidate multiple security data streams under a single roof. Initially, SIEM supported early detection…
Read MoreKey Criteria for Evaluating Secure Service Access (SSA)
Since the inception of large-scale computing, enterprises, organizations, and service providers have protected their digital assets by securing the perimeter of…
Read MoreGigaOm Radar for Edge Platforms
Edge platforms leverage distributed infrastructure to deliver services, bringing content, computing, and security closer to end devices, offloading networks, and improving…
Read MoreKey Criteria for Evaluating Edge Platforms
Edge platforms leverage distributed infrastructure to deliver content, computing, and security closer to end devices, offloading networks and improving performance. We…
Read More