Recently Microsoft entered the world of managed detection and response (MDR) solutions with its “Microsoft Defender Experts for XDR”. An addition…
Read MoreResearch
Key Criteria for Evaluating Security Orchestration, Automation, and Response (SOAR) Solutions
Depending on the size of an organization, security information and event management (SIEM) tools can produce tens of thousands of alarms…
Read MoreGigaOm Radar for Data Loss Prevention (DLP)
Data is a precious resource for today’s enterprises, and preventing data loss is of paramount importance. The cost of data loss…
Read MoreGigaOm Radar for API Security
APIs are quickly becoming the largest attack surface in organizations. API security solutions help organizations improve their security posture by finding…
Read MoreGigaOm Research Bulletin #004
Welcome to GigaOm’s research bulletin for August 2023 Hi, and welcome back! Our CEO Ben Book has taken GigaOm from a boutique analyst…
Read MoreGigaOm Radar for Cloud Security Posture Management (CSPM)
Cloud security posture management (CSPM) offerings are security solutions designed specifically for cloud environments. They employ the multitude of application programming…
Read MoreKey Criteria for Evaluating Network Detection and Response (NDR) Solutions
Network detection and response (NDR) is an advanced cybersecurity approach that focuses on detecting and responding to threats within a network…
Read MoreGigaOm Radar for Continuous Vulnerability Management
Vulnerability management is now a cornerstone of cybersecurity frameworks and should be a part of every organization’s cybersecurity plan. This critical…
Read MoreKey Criteria for Evaluating Data Loss Prevention (DLP) Solutions
Data is a precious resource for today’s enterprises, and preventing data loss is of paramount importance. The cost of data loss…
Read MoreStandalone SOAR is Alive and Kicking
Multiple publications and analyst firms have predicted a doomsday scenario for the standalone SOAR following a number of acquisitions in the…
Read MoreIs there a case for Microsoft as your only enterprise security partner?
In recent GigaOm research, we evaluated whether there was a good argument to use a single security partner to protect an…
Read MoreMicrosoft takes Entra to the edge
Identity security must be at the heart of any organization’s security strategy. Our infrastructures have become more disparate, and our users…
Read More