In February 2020, GigaOm published its first analysis of the phishing detection and prevention market, “Key Criteria for Evaluating Phishing Protection…
Read MoreResearch
Key Criteria for Evaluating Comprehensive Anti-Phishing Solutions
In February 2020, GigaOm published its first analysis of the phishing detection and prevention market, “Key Criteria for Evaluating Phishing Protection…
Read MoreGigaOm Radar for Identity as a Service
Identity is at the core of the modern business environment. It’s the control plane for how users, partners, and customers interact…
Read MoreKey Criteria for Evaluating Identity as a Service Solutions
User access management, or identity and access management (IAM), is a critical part of enterprise IT. It has long allowed organizations…
Read MoreGigaOm Radar for Unified Endpoint Management (UEM)
Endpoint management is one of the most significant challenges enterprises face today. The modern workforce is becoming more distributed and demanding…
Read MoreKey Criteria for Evaluating Unified Endpoint Management
Endpoint management is one of the most significant challenges in the enterprise today. An increasingly large percentage of our workforce is…
Read MoreGigaOm Radar for Data Loss Prevention
Data is at the core of modern business: It is our intellectual property, the lifeblood of our interactions with our employees,…
Read MoreKey Criteria for Evaluating Data Loss Prevention Platforms
Data is a crucial asset for modern businesses and has to be protected in the same way as any other corporate…
Read More