Vulnerability management tools scan your IT estate to help identify and mitigate security risks and weaknesses. These tools can facilitate the…
Read MoreResearch
Modern Data Protection Use Case Analysis
This free 1-hour webinar from GigaOm Research brings together experts in HCI and data protection, featuring GigaOm analyst Enrico Signoretti and…
Watch NowKey Criteria for Evaluating Hybrid Cloud Data Protection
A strong data protection strategy remains at the core of every IT infrastructure, but cloud and edge computing have changed the…
Read MoreWork from Home Security
Spin Master is a leading global children’s entertainment company that invents toys and games, produces dozens of television and studio series…
Read MoreIvan McPhee
Formerly an enterprise architect and management consultant focused on accelerating time-to-value by implementing emerging technologies and cost optimization strategies, Ivan has…
Learn MoreThe Five Pillars of (Azure) Cloud-based Application Security
This 1-hour webinar from GigaOm brings together experts in Azure cloud application migration and security, featuring GigaOm analyst Jon Collins and…
Watch NowAndrew Green
Andrew Green is an enterprise IT writer and practitioner with an engineering and product management background at a tier 1 telco.…
Learn MoreData Management and Secure Data Storage for the Enterprise
This free 1-hour webinar from GigaOm Research brings together experts in data management and security, featuring GigaOm Analyst Enrico Signoretti and…
Watch NowUnderstanding and Managing Data Protection for Kubernetes in Enterprise Environments
Over the last year we have moved past the initial enthusiasm and adoption phases of Kubernetes. Enterprises are moving their applications…
Read MoreTalking DevSecOps on the CISO Series Podcast
When GigaOm VP of Research Jon Collins published his latest report, “GigaOm Radar for Evaluating DevSecOps Tools,” it kicked off a…
Read MorePredictions for 2021 and Beyond
Here at Gigaom we’re looking at how leading-edge technologies impact the enterprise, and what organizations can do to gear up for…
Read MoreCISO Podcast: Talking Anti-Phishing Solutions
Simon Gibson earlier this year published the report, “GigaOm Radar for Phishing Prevention and Detection,” which assessed more than a dozen…
Read MorePaul Stringfellow
Paul Stringfellow has more than 25 years of experience in the IT industry helping organizations of all kinds and sizes use…
Learn MorePhish Fight: Securing Enterprise Communications
Yes, much of the world may have moved on from email to social media and culturally dubious TikTok dances, yet traditional…
Read MoreWhen Is a DevSecOps Vendor Not a DevSecOps Vendor?
DevOps’ general aim is to enable a more efficient process for producing software and technology solutions and bringing stakeholders together to…
Read MoreDigital Risk, Compliance, and Data Centricity
This report examines the current state of digital governance, risk, and compliance within enterprise companies—an area that has recently seen dramatic…
Read MoreHigh Performance Application Security Testing
Data, web, and application security has evolved dramatically over the past few years. Just as new threats abound, the architecture of…
Read MoreGigaOm Radar for Phishing Prevention and Detection
In 2020, global email usage will top 300 billion messages sent, according to technology market research firm The Radicati Group. And…
Read MoreHYCU
HYCU provides an innovative approach to data protection, combining efficiency and ease of use thanks to a set of purpose-built, specifically…
Read MoreArea 1
We covered Area1 Security in our 2018 Phishing Landscape. The company has continued its upward trajectory and holds a strong position…
Read MoreKey Criteria for Evaluating Phishing Protection Platforms
Phishing is the primary method for breaching businesses. According to a 2018 Verizon Data Breach report, 96% of all attacks begin…
Read MoreZimperium
We covered Zimperium in our December 2018 Landscape Report, and they continue to stand out in their approach and philosophy. Zimperium…
Read MoreSelecting and Adopting a Security-Standards Framework
Many organizations find themselves having to address the information security demands of their clients in addition to government regulators. Losing bids…
Read MoreZero Trust Cloud Security Provider Aporeto: Product Profile and Evaluation
Microservices approaches such as Kubernetes are changing the way people think about applications, bringing the dual benefits of massive scalability and…
Read More