Skip to content

Main Navigation

Gigaom
  • Research
    • <span class="title">Methodology</span>MethodologyLearn about GigaOm’s methodological process for its research
    • <span class="title">Vendor Escalation Policy</span>Vendor Escalation PolicyInitiate an escalation to resolve feedback
    • <span class="title">Analyst Videos</span>Analyst VideosExplore our video library of analyst appearances.
    • <span class="title">AI, Data & Analytics</span>AI, Data & AnalyticsLearn key criteria for evaluating Data Infrastructure.
    • <span class="title">Security & Risk</span>Security & RiskLearn key criteria for evaluating Security & Risk.
    • <span class="title">Cloud, Infrastructure & Management</span>Cloud, Infrastructure & ManagementLearn key criteria for moving and operating in the cloud.
    • <span class="title">DevOps</span>DevOpsLearn key criteria for evaluating DevOps solutions.
    • <span class="title">Network & Edge</span>Network & EdgeLearn key criteria for evaluating Edge solutions.
    • <span class="title">People, Processes, & Applications</span>People, Processes, & ApplicationsLearn key criteria for evaluating Applications.
    • View All Research
  • For Vendors
    • <span class="title">Research Calendar</span>Research CalendarIn-depth reports on this year’s topics and technology needs.
    • <span class="title">Customer Centric Enablement and Activation</span>Customer Centric Enablement and ActivationIncrease lead generation, sales conversion rates and grow revenue.
    • <span class="title">Total Cost of Ownership & Engineering Benchmarks</span>Total Cost of Ownership & Engineering BenchmarksShorten your sales cycle with rigorous, test-driven reports that quantify value.
    • <span class="title">Radars</span>RadarsProve your mettle with competitive analysis that spotlights your solutions.
    • <span class="title">Key Criteria</span>Key CriteriaIn-depth decision-making frameworks that enlighten and guide IT acquisitions.
    • <span class="title">Advisory Services</span>Advisory ServicesBuild your strategy with Fortune 500 CIO and CTO decision makers.
    • <span class="title">Enterprise Subscription</span>Enterprise SubscriptionGain first-mover advantage with insights from our research community.
    • <span class="title">Value Engineering</span>Value EngineeringHelp prospective customers to adapt their workflows to new technology.
    • <span class="title">Vendor Marketing Content Review</span>Vendor Marketing Content ReviewGet the word out while maintaining the GigaOm brand.
    • <span class="title">Assets Login</span>Assets LoginView or download your reprint assets
    • <span class="title">Research Access</span>Research AccessGet access to GigaOm Research through your multi seat license
  • Analysts
  • Insights
    • <span class="title">Case Studies</span>Case StudiesLearn about participating in GigaOm research.
    • <span class="title">Blog</span>BlogRead GigaOm blogs for quick insight into your industry.
    • <span class="title">Video</span>VideoWatch GigaOm videos for quick insight into your industry.
    • <span class="title">Press Room</span>Press RoomStay up to date with the latest company announcements.
  • Company
    • <span class="title">Why GigaOm</span>Why GigaOmLearn why GigaOm is right for you and your organization.
    • <span class="title">Our Team</span>Our TeamMeet the entire GigaOm team.
    • <span class="title">Partners</span>PartnersExplore opportunities to partner with GigaOm.
    • <span class="title">Careers</span>CareersExplore career opportunities to join GigaOm.
    • <span class="title">Contact us</span>Contact usLooking for the best way to get in touch with us?
  • Login
  • Login
  • Account
Research Home
Subscribe to GigaOm Sign up today for a GigaOm research subscription   Upgrade to Premium

How ITIL’s Ownership Transition Impacts the ITSM Market

Posted on October 1, 2024 by Lisa Erickson-Harris
ITIL

The ownership of the information technology infrastructure library (ITIL) has changed. As a result, the information technology service management (ITSM) market’s understanding

5 Questions for Carsten Brinkschulte, CEO Dryad: Silvanet, early warning for forest fires

Posted on September 6, 2024 (September 12, 2024) by Jon Collins

I spoke recently with Carsten Brinkschulte, co-founder and CEO of Dryad. Here is some of our conversation on Silvanet and how it

The Detection Debate: Deep-Packet Inspection vs. Flow-Based Analysis

Posted on August 19, 2024 by Ivan McPhee
the detection debate

In the ever-evolving cyberthreat landscape, cybercriminals are deploying sophisticated methods to exploit network vulnerabilities while organizations constantly seek new ways to protect

Embracing the Future: A Vision for the CASB Market

Posted on August 19, 2024 by Jamal Bihya
embracing the future

As we stand on the cusp of a new era in cloud security, the landscape of cloud access security brokers (CASB) is

Are We Taking Enterprise Password Management Seriously?

Posted on August 19, 2024 by Paul Stringfellow
enterprise password management

Passwords are the keys to your digital assets: it’s how we access applications and data, as well as infrastructure and systems. Often

Edge Orchestration Platforms: Navigating the Next Wave of Innovation

Posted on August 19, 2024 by Dr. Shane C. Archiquette
edge orchestration

In an era where digital transformation is not just a buzzword but a business imperative, edge orchestration platforms are emerging as a

The Future of ZTNA: A Convergence of Network Access Solutions

Posted on August 19, 2024 by Chris Ray
future of zero

Zero trust network access (ZTNA) has emerged as a crucial security paradigm for organizations seeking to secure their applications and data in

SaaS Security Posture—It’s not you, it’s me!

Posted on August 19, 2024 by Paul Stringfellow
SSPM

In business, it’s not uncommon to take a software-as-a-service (SaaS)-first approach. It makes sense—there’s no need to deal with the infrastructure, management,

Navigating the Unique Landscape of OT Security Solutions

Posted on August 16, 2024 by Chris Ray
OT Security Solutions

Exploring the operational technology (OT) security sector has been both enlightening and challenging, particularly due to its distinct priorities and requirements compared

The Rapidly Changing Landscape of Enterprise Object Storage

Posted on August 16, 2024 by Kirk Ryan
enterprise object storage

For a long time, enterprise object storage was positioned for archive and backup workloads—hardly the most exciting task, yet certainly a critical

Posts navigation

  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 32
  • »
Gigaom

Knowingly Corporation
3905 State Street #7-448
Santa Barbara, CA 93105-5107

Subscribe to our monthly analyst insights newsletter

Stay on top of emerging trends by joining our newsletter, a monthly publication from our leading network of analysts.

Subscribe Now

Research

  • Methodology
  • Vendor Escalation Policy
  • Analyst Videos
  • AI, Data & Analytics
  • Security & Risk
  • Cloud, Infrastructure & Management
  • DevOps
  • Network & Edge
  • People, Processes, & Applications
  • View All Research

For Vendors

  • Research Calendar
  • Customer Centric Enablement and Activation
  • Total Cost of Ownership & Engineering Benchmarks
  • Radars
  • Key Criteria
  • Advisory Services
  • Enterprise Subscription
  • Value Engineering
  • Vendor Marketing Content Review
  • Assets Login
  • Research Access

Insights

  • Case Studies
  • Blog
  • Video
  • Press Room

Company

  • Why GigaOm
  • Our Team
  • Partners
  • Careers
  • Contact us
  • LinkedIn
  • Twitter
  • Facebook
  • YouTube
  • Instagram
  • Reddit
  • Spotify
  • Privacy Policy
  • MSA
  • Terms of Service
  • Code of Conduct
  • © GigaOm All Rights Reserved 2025
This website uses cookies; by continuing you are a agreeing to our Privacy Policy Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
This is an necessary category.
Save & Accept