Skip to content
Main Navigation
Gigaom
  • Research
    • <span class="title">Methodology</span>MethodologyLearn about GigaOm’s methodological process for its research
    • <span class="title">Vendor Escalation Policy</span>Vendor Escalation PolicyInitiate an escalation to resolve feedback
    • <span class="title">Analyst Videos</span>Analyst VideosExplore our video library of analyst appearances.
    • <span class="title">AI, Data & Analytics</span>AI, Data & AnalyticsLearn key criteria for evaluating Data Infrastructure.
    • <span class="title">Security & Risk</span>Security & RiskLearn key criteria for evaluating Security & Risk.
    • <span class="title">Cloud, Infrastructure & Management</span>Cloud, Infrastructure & ManagementLearn key criteria for moving and operating in the cloud.
    • <span class="title">DevOps</span>DevOpsLearn key criteria for evaluating DevOps solutions.
    • <span class="title">Network & Edge</span>Network & EdgeLearn key criteria for evaluating Edge solutions.
    • <span class="title">People, Processes, & Applications</span>People, Processes, & ApplicationsLearn key criteria for evaluating Applications.
    • View All Research
  • For Vendors
    • <span class="title">Research Calendar</span>Research CalendarIn-depth reports on this year’s topics and technology needs.
    • <span class="title">Customer Centric Enablement and Activation</span>Customer Centric Enablement and ActivationIncrease lead generation, sales conversion rates and grow revenue.
    • <span class="title">Total Cost of Ownership & Engineering Benchmarks</span>Total Cost of Ownership & Engineering BenchmarksShorten your sales cycle with rigorous, test-driven reports that quantify value.
    • <span class="title">Radars</span>RadarsProve your mettle with competitive analysis that spotlights your solutions.
    • <span class="title">Enterprise Subscription</span>Enterprise SubscriptionGain first-mover advantage with insights from our research community.
    • <span class="title">Vendor Marketing Content Review</span>Vendor Marketing Content ReviewGet the word out while maintaining the GigaOm brand.
    • <span class="title">Assets Login</span>Assets LoginView or download your reprint assets
    • <span class="title">Research Access</span>Research AccessGet access to GigaOm Research through your multi seat license
  • Analysts
  • Insights
    • <span class="title">Case Studies</span>Case StudiesLearn about participating in GigaOm research.
    • <span class="title">Blog</span>BlogRead GigaOm blogs for quick insight into your industry.
    • <span class="title">Video</span>VideoWatch GigaOm videos for quick insight into your industry.
    • <span class="title">Press Room</span>Press RoomStay up to date with GigaOm's latest appearances in the Press
  • Company
    • <span class="title">Why GigaOm</span>Why GigaOmLearn why GigaOm is right for you and your organization.
    • <span class="title">Our Team</span>Our TeamMeet the entire GigaOm team.
    • <span class="title">Partners</span>PartnersExplore opportunities to partner with GigaOm.
    • <span class="title">Careers</span>CareersExplore career opportunities to join GigaOm.
    • <span class="title">Contact us</span>Contact usLooking for the best way to get in touch with us?
  • Login
  • Login
  • Account
Research Home
Subscribe to GigaOm Sign up today for a GigaOm research subscription   Upgrade to Premium

Zero Trust 101: It’s Time to Ditch “Trust but Verify”

Posted on June 7, 2024 (October 14, 2024) by Howard Holton

Welcome to our new blog series on zero trust! If you’re an IT executive trying to navigate the complex world of cybersecurity,

Near, Far, Wherever Your CPUs Are

Posted on June 4, 2024 by Andrew Green
near far

Over the past two years, I’ve been making the point that near edge and far edge are utilitarian terms at best, but

The Challenge of Securing User Identities

Posted on June 4, 2024 by Paul Stringfellow
The Challenge

Several businesses I’ve worked with recently have had the misfortune of being victims of cybersecurity incidents. While these incidents come in many

Could Network Modeling Replace Observability?

Posted on June 4, 2024 by Andrew Green
network modeling

Over the past four years, I’ve consolidated a representative list of network observability vendors, but have not yet considered any modeling-based solutions.

On Questionnaires and Briefings: Explaining the GigaOm Policy Change

Posted on May 21, 2024 by Jon Collins

A stitch in time saves nine, they say, and so can receiving information in the right order. We at GigaOm are constantly

Everything Your Parents Told You About Posture Is True! Even For Data Security

Posted on May 17, 2024 by Paul Stringfellow
DSPM

Sit up straight! Shoulders back, chest out! We all heard these wise words about the importance of physical posture growing up. For

SSE vs. SASE: Which One is Right for Your Business?

Posted on May 15, 2024 by Ivan McPhee
SSE vs SASE

Security service edge (SSE) and secure access service edge (SASE) are designed to cater to the evolving needs of modern enterprises that

Save Money and Increase Performance on the Cloud

Posted on May 15, 2024 by Matt Jallo
Cloud Resource Optimization

One of the most compelling aspects of cloud computing has always been the potential for cost savings and increased efficiency. Seen through

There’s Nothing Micro About Microsegmentation

Posted on May 15, 2024 by Andrew Green
microsegmentation

I began my exploration of the microsegmentation space by semantically deconstructing the title. The result? Microsegmentation solutions help define network segments as

The Quest for Extended Detection and Response (XDR): Unraveling Cybersecurity’s Next Generation

Posted on April 26, 2024 by Chris Ray
XDR

Embarking on an exploration of the extended detection and response (XDR) sector wasn’t just another research project for me; it was a

Posts navigation

  • «
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 32
  • »
Gigaom

Knowingly Corporation
3905 State Street #7-448
Santa Barbara, CA 93105-5107

Subscribe to our monthly analyst insights newsletter

Stay on top of emerging trends by joining our newsletter, a monthly publication from our leading network of analysts.

Subscribe Now

Research

  • Methodology
  • Vendor Escalation Policy
  • Analyst Videos
  • AI, Data & Analytics
  • Security & Risk
  • Cloud, Infrastructure & Management
  • DevOps
  • Network & Edge
  • People, Processes, & Applications
  • View All Research

For Vendors

  • Research Calendar
  • Customer Centric Enablement and Activation
  • Total Cost of Ownership & Engineering Benchmarks
  • Radars
  • Enterprise Subscription
  • Vendor Marketing Content Review
  • Assets Login
  • Research Access

Insights

  • Case Studies
  • Blog
  • Video
  • Press Room

Company

  • Why GigaOm
  • Our Team
  • Partners
  • Careers
  • Contact us
  • LinkedIn
  • Twitter
  • Facebook
  • YouTube
  • Instagram
  • Reddit
  • Spotify
  • Privacy Policy
  • MSA
  • Terms of Service
  • Code of Conduct
  • © GigaOm All Rights Reserved 2026
This website uses cookies; by continuing you are a agreeing to our Privacy Policy Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
This is an necessary category.
Save & Accept