Last week on Research: Our review of PaaS for 2014, security, and more


Last week on Gigaom Research, our analysts broke down the PaaS marketplace, projected the future of CXM for mobile service providers, and reflected on best practices for IT security leaders addressing an increasingly fragmented network.

Note: Gigaom Research is a subscription-based research service offering in-depth, timely analysis of developing trends and technologies. Visit to learn more about it.

Sector RoadMap: Platform as a Service (PaaS) in 2014 by David Linthicum

According to David Linthicum, “PaaS will change more than any other sector in the cloud computing space over the next several years” and will become increasingly “more difficult to define as it morphs with other cloud models, including IaaS and SaaS.” Our most recent Sector RoadMap breaks down the current market landscape, scoring key platform vendors, against the principal disruption vectors at play. Vendors include Microsoft, Amazon, Google, Red Hat, Pivotal, and (

PaaS2014 USE

Source: Gigaom Research 

Mobile: The future of mobile customer experience management by Derek Kerton

We see exciting shifts in customer experience management, or CXM, for mobile service providers. Analyst Derek Kerton provided his perspective on the future of user engagement. With more complex devices, late adopters becoming users, and fragmentation in the OS and hardware, there is plentiful opportunity to improve customer satisfaction. Although carriers are cautious due to privacy concerns and network impact, one cost saving trend includes remote control for customer support. By breaking away from the one-size-fits-all model, service providers show great promise in interacting with their user base in new ways.

Cloud: Application awareness: using data inspection to create context-sensitive security policies  by Matt Sarrel

In this report, Matt Sarrel examines the shortcomings of traditional security and management processes along side the best practices for the modern enterprise network. Market forces such as BYOD, cloud applications, and device proliferation call for IT leaders to test and implement new security controls closer to the network edge in order to keep pace with rapidly increasing exposer.

Featured image from Thinkstock/Greyfebruary.

Comments are closed.