The unification of operational technology (OT) and informational technology (IT) brings a range of benefits to sophisticated technology systems in industries…
Read MoreResearch
Key Criteria for Evaluating Enterprise Password Management Solutions
Every organization’s employees are buried in username and password combinations. The sheer volume of passwords we must maintain for our jobs—not…
Read MoreGigaOm Radar for Zero-Trust Network Access (ZTNA)
Secure remote access is a critical component of an organization’s ability to maintain business operations. Before COVID, many saw remote access…
Read MoreGigaOm Radar for Identity as a Service (IDaaS)
Identity management presents a significant challenge to organizations as more complex and distributed environments continue to impact their operational management and…
Read MoreKey Criteria for Evaluating Identity As a Service (IDaaS) Solutions
Identity management presents a significant challenge to organizations as more complex and distributed environments continue to impact their operations management and…
Read MoreCxO Decision Brief: Managed Security Service Providers (MSSP)
This GigaOm CxO Decision Brief report was commissioned by OTAVA. Managed security service providers (MSSP) fill a critical need for businesses…
Read MoreCxO Decision Brief: Cyber Workforce Resilience
This GigaOm CxO Decision Brief was commissioned by Immersive Labs. Cybersecurity incidents have become so pervasive that it is no longer…
Read MoreKey Criteria for Evaluating Security-Policy-as-Code Solutions
Security policies are designed to protect an organization’s IT assets by formulating security requirements into a set of rules that IT…
Read MoreGigaOm Radar for Extended Detection and Response (XDR)
Enterprise cybersecurity comprises multiple security solutions from various vendors. Solutions are paired with a security information and event management (SIEM) and/or…
Read MoreKey Criteria for Evaluating Zero-Trust Network Access Solutions
Secure remote access provides numerous benefits to organizations, making it an essential component of their business operations. One of the primary…
Read MoreKey Criteria for Evaluating Extended Detection and Response Solutions
Enterprise cybersecurity is typically composed of multiple solutions from various vendors, combined with a security information and event management (SIEM) and/or…
Read MoreGigaOm Radar for Deception Technology
The prevalence of malicious actors in the digital world has created a dynamic that compels cybersecurity defenses to adapt constantly. Attackers…
Read MoreGigaOm Research Bulletin #002
Welcome to GigaOm’s research bulletin for March 2023 Hello again, plenty to report but first, a few words about our Chief Analyst, Michael…
Read MoreKey Criteria for Evaluating Deception Technology Solutions
Attacker techniques and behaviors are constantly evolving. As cybersecurity vendors zig, attackers zag. This creates an environment where what worked in…
Read MoreThinking Strategically About Software Bills of Materials (SBOMs)
Where did SBOMs spring from? As someone who (let’s say) has been around the block a few times, I’ve often felt…
Read MoreGigaOm Radar for Cybersecurity Incident Response
Cybersecurity incidents are a daily occurrence, and their frequency is only increasing. According to research conducted by the Cybersecurity and Infrastructure…
Read MoreGigaOm Radar for Security Awareness and Training
Designing a defense strategy against cyber threats for systems, networks, and data that focuses only on technologies does not guarantee an…
Read MoreGigaOm Radar for Next-Generation Firewalls
Firewalls have been an essential part of network security for decades, sitting at the perimeter of an organization’s network and using…
Read MoreKey Criteria for Evaluating Security Training Solutions
When a security breach occurs, there’s a high probability that the origin of the breach is due to negligence, a lack…
Read MoreKey Criteria for Evaluating Cybersecurity Incident Response Solutions
Cybersecurity incidents are a daily occurrence and their frequency is only increasing. According to research conducted by the Cybersecurity and Infrastructure…
Read MoreGigaOm Radar for DNS Security
The domain name system (DNS) is fundamental to every modern organization. Without it, networks, including the internet, cannot function. You’d imagine…
Read MoreGigaOm Radar for Application and API Security
Application development architecture has been changing to accommodate new platforms, processes, and application needs. Increasingly, applications are collections of application programming…
Read MoreGigaOm Radar for Attack Surface Management
The difficulties and challenges presented by rapid digital growth, cloud adoption, and the sprawling public IP space leave organizations unable to…
Read MoreKey Criteria for Evaluating Next-Generation Firewall Solutions
Firewalls have been an essential part of network security for decades, sitting at the perimeter of an organization’s network and using…
Read More