Welcome back to our zero trust blog series! In our previous post, we took a deep dive into data security, exploring…
Read MoreResearch
Discovering Disruptions in Technology – Netwrix
COO Howard Holton is joined by Tyler Reese, the Director of Product at Netwrix to discuss identity management.
Watch NowProtecting Your Crown Jewels
Welcome back to our zero trust blog series! In the previous posts, we introduced the concept of zero trust and explored…
Read MoreDiscovering Disruptions in Technology with Nokia’s Rodrigo Brito
Nokia’s Head of Cybersecurity Products, Rodrigo Brito, stops by to discuss RSA and cybersecurity in telecom with COO Howard Holton.
Watch NowBuilding Blocks of Zero Trust: A Comprehensive Guide
In our previous post, we introduced the concept of zero trust and explored why it’s becoming an essential approach to cybersecurity…
Read MoreZero Trust 101: It’s Time to Ditch “Trust but Verify”
Welcome to our new blog series on zero trust! If you’re an IT executive trying to navigate the complex world of…
Read MoreGigaOm Key Criteria for Evaluating Enterprise Password Management Solutions
Employees everywhere are buried in username and password combinations for both business and personal use. The average user has dozens, if…
Read MoreGigaOm Key Criteria for Evaluating Operational Technology (OT) Security Solutions
Operational technology (OT) security solutions are an essential tool for organizations striving to secure their assets and protect against threats. OT…
Read MoreThe Challenge of Securing User Identities
Several businesses I’ve worked with recently have had the misfortune of being victims of cybersecurity incidents. While these incidents come in…
Read MoreCxO Decision Brief: Mobile Threat Defense (MTD)
This GigaOm CxO Decision Brief commissioned by Zimperium. Mobile devices are integral to corporate operations yet remain a vulnerable target for…
Read MoreGigaOm Radar for Identity Threat Detection and Response (ITDR)
Identity is an essential part of any organization’s IT infrastructure, acting as the means to control access to the applications and…
Read MoreGigaOm Benchmark: Achieving Cyber Resilience with Commvault Cloud Cleanroom Recovery
This GigaOm Benchmark Report was commissioned by Commvault. Commvault® Cloud Cleanroom™ Recovery represents a paradigm shift in how enterprises address cyber recovery…
Read MoreGigaOm Key Criteria for Evaluating Network Detection and Response (NDR) Solutions
Today’s IT infrastructure is becoming increasingly complex as it encompasses hybrid cloud and on-premises environments, IoT devices, and third-party providers. As…
Read MoreEverything Your Parents Told You About Posture Is True! Even For Data Security
Sit up straight! Shoulders back, chest out! We all heard these wise words about the importance of physical posture growing up.…
Read MoreGigaOm Radar for Data Security Posture Management (DSPM)
Data security posture management (DSPM) solutions provide visibility into where sensitive data is, who has access to it, and how it…
Read MoreSSE vs. SASE: Which One is Right for Your Business?
Security service edge (SSE) and secure access service edge (SASE) are designed to cater to the evolving needs of modern enterprises…
Read MoreThere’s Nothing Micro About Microsegmentation
I began my exploration of the microsegmentation space by semantically deconstructing the title. The result? Microsegmentation solutions help define network segments…
Read MoreGigaOm Radar for Security Service Edge (SSE)
Designed to address the evolving needs of modern enterprises as they navigate the complexities of cloud adoption, remote work, and digital…
Read MoreThe Quest for Extended Detection and Response (XDR): Unraveling Cybersecurity’s Next Generation
Embarking on an exploration of the extended detection and response (XDR) sector wasn’t just another research project for me; it was…
Read MoreGigaOm Key Criteria for Evaluating Identity Threat Detection and Response (ITDR) Solutions
Identity management is an essential part of any organization’s IT infrastructure because it serves as the means to control access to…
Read MoreGigaOm Radar for Extended Detection and Response (XDR)
Enterprise cybersecurity comprises multiple security solutions from various vendors. Solutions are typically combined with a security information and event management (SIEM)…
Read MoreGigaOm Key Criteria for Evaluating Data Security Posture Management (DSPM) Solutions
Data is core to all organizations and should be treated as an essential asset. As the data landscape continues to evolve,…
Read MoreCxO Decision Brief: Elevate Cyber Resilience with Commvault Cloud Cleanroom Recovery
This GigaOm CxO Decision Brief commissioned by Commvault. Commvault® Cloud Cleanroom™ Recovery has emerged as a pivotal solution for organizations and…
Read MoreCxO Decision Brief: Advancing Data Governance with Commvault Cloud Cleanroom Recovery
This GigaOm CxO Decision Brief was commissioned by Commvault. Data executives are primarily concerned with data management, emphasizing the governance, quality,…
Read More