The market for data center switching has seen multiple transformations over the last decade due to the consolidation of data center…
Read MoreResearch
GigaOm Key Criteria for Evaluating Data Center Switching Solutions
A decade ago, data centers were much smaller and hosted large, monolithic applications deployed using the classic client-server model. This architecture,…
Read MoreGigaOm Key Criteria for Evaluating Container Networking Solutions
Container networking solutions provide lower-level (Layer 3 and 4) networking capabilities that support communications within and between pods and clusters in…
Read MoreGigaOm Key Criteria for Evaluating Autonomous Security Operations Center (SOC) Solutions
Autonomous security operations center (SOC) solutions are converged security operations (SecOps) tools that handle data ingestion and management, threat hunting, orchestration,…
Read MoreGigaOm Radar for Container Networking
Container networking solutions provide Layer 3 and 4 networking capabilities that enable communication within and between pods and clusters in distributed…
Read MoreGigaOm Radar for Cloud Network Security
Cloud network security solutions provide a suite of security services for single- and multicloud environments to prevent unauthorized traffic, access, modification,…
Read MoreGigaOm Key Criteria for Evaluating Cloud Network Security Solutions
Cloud network security solutions provide a suite of security services for single and multicloud environments to prevent unauthorized traffic, access, modification,…
Read MoreGigaOm Radar for Security Orchestration, Automation, and Response (SOAR)
Security orchestration, automation, and response (SOAR) emerged as a product category in the mid-2010s to provide a set of tools and…
Read MoreGigaOm Radar for Autonomous Security Operations Center (SOC) Solutions
Autonomous security operations center (SOC) solutions shift security analysts’ focus from repetitive tasks to investigating only the most important incidents. These…
Read MoreIdentity, Endpoint, and Network Security Walk into a Bar
With a macrotrend/backdrop of platformization and convergence, the industry is exploring places where identity security, endpoint security, and network security naturally…
Read MoreGigaOm Key Criteria for Evaluating Security Orchestration, Automation, and Response (SOAR) Solutions
Depending on the size of an organization, security information and event management (SIEM) tools can produce tens of thousands of alarms…
Read MoreGigaOm Radar for Secure Enterprise Browsing
Secure enterprise browsing solutions enable users to access websites and web-based resources in compliance with corporate security policies and provide security…
Read More