Data is essential for any organization. This isn’t a new concept, and it’s not one that should be a surprise, but…
Read MoreResearch
“Gone Phishing”—Every Cyberattacker’s Favorite Phrase
Phishing—how old hat is that as a topic? Isn’t it solved for most of us by now? Can’t we speak about…
Read MoreGigaOm Radar for Data Loss Prevention (DLP)
Data is a precious resource for today’s enterprises, and preventing its loss is of paramount importance. The cost of data loss…
Read MoreAre We Taking Enterprise Password Management Seriously?
Passwords are the keys to your digital assets: it’s how we access applications and data, as well as infrastructure and systems.…
Read MoreSaaS Security Posture—It’s not you, it’s me!
In business, it’s not uncommon to take a software-as-a-service (SaaS)-first approach. It makes sense—there’s no need to deal with the infrastructure,…
Read MoreGigaOm Key Criteria for Evaluating Data Loss Prevention (DLP) Solutions
Data is a precious resource for today’s enterprises, and preventing data loss is of paramount importance. The cost of data loss…
Read MoreGigaOm Radar for SaaS Security Posture Management (SSPM)
Software as a service (SaaS) product offerings have been a major boon to productivity. Teams and businesses have gotten exactly the…
Read MoreGigaOm Radar for Anti-Phishing
Phishing has long been and remains the leading method used by cybercriminals in attempts to breach organizations. Successful phishing attacks lead…
Read MoreGigaOm Radar for Enterprise Password Management
Every organization has employees who are buried in username and password combinations for both business and personal use. The average user…
Read MoreGigaOm Key Criteria for Evaluating Anti-Phishing Solutions
Phishing remains the leading method used by cybercriminals to attempt to breach organizations. Successful phishing attacks lead to the loss of…
Read MoreGigaOm Key Criteria for Evaluating SaaS Security Posture Management (SSPM) Solutions
Software as a service (SaaS) has been a major boon to productivity, enabling business units and users to get exactly the…
Read MoreGigaOm Key Criteria for Evaluating Enterprise Password Management Solutions
Employees everywhere are buried in username and password combinations for both business and personal use. The average user has dozens, if…
Read More