Multifactor authentication (MFA) addresses one of the most vulnerable elements in cybersecurity—humans. As most attacks are enabled through social engineering, MFA…
Read MoreResearch
Enterprise MFA is actually really cool
Multifactor authentication (MFA) is a credential verification method that requires the provisioning of two or more authentication mechanisms to gain access…
Read MoreGigaOm Radar for Security Orchestration, Automation, and Response (SOAR)
Security orchestration, automation, and response (SOAR) emerged as a product category in the mid-2010s. At that point, SOAR solutions were based…
Read MoreKey Criteria for Evaluating Network-as-a-Service (NaaS) Solutions
Network as a service (NaaS) is a category of solutions that applies a cloud-like provisioning model to enterprise networks, allowing communications…
Read MoreNaaS – enterprise networking as an innovation platform
Network as a service (NaaS) applies a cloud-like provisioning model to enterprise networking, enabling on-demand, scalable connectivity and value-added services via…
Read MoreKey Criteria for Evaluating Security Orchestration, Automation, and Response (SOAR) Solutions
Depending on the size of an organization, security information and event management (SIEM) tools can produce tens of thousands of alarms…
Read MoreStandalone SOAR is Alive and Kicking
Multiple publications and analyst firms have predicted a doomsday scenario for the standalone SOAR following a number of acquisitions in the…
Read MoreGigaOm Radar for Security Information and Event Management (SIEM)
The security information and event management (SIEM) solution space is mature and competitive. Most vendors have had well over a decade…
Read MoreKey Criteria for Evaluating Security Information and Event Management (SIEM) Solutions
Security information and event management (SIEM) solutions consolidate multiple security data streams under one roof. Initially, SIEM solutions supported early detection…
Read MoreThe True Value-Add of Container Networking Solutions
In distributed environments, the network is part of the application. Native container networking constructs available in Docker and Kubernetes enable organizations…
Read MoreGigaOm Radar for Edge Platforms
There’s an excitement in the networking space around bringing workloads, content, and security closer to the edge. We’ve previously described how…
Read MoreCxO Decision Brief: Internet Resilience
Internet Performance Monitoring solutions address the thorny challenge of ensuring continuous service availability for digital companies that rely on the public…
Read More