Secure service access (SSA) represents a significant shift in how organizations consume network security. Replacing multiple point products with a single…
Read MoreResearch
How Would a Distributed SIEM Look?
SIEMs have been the main workhorse for security operations centers, constantly scaled up throughout the years to accommodate the increased volume…
Read MoreGigaOm Radar for Operational Technology (OT) Security
The unification of operational technology (OT) and information technology (IT) brings a range of benefits to sophisticated technology systems in industries…
Read MoreKey Criteria for Evaluating Distributed Denial of Service (DDoS) Protection Solutions
According to the Cybersecurity and Infrastructure Security Agency (CISA), distributed denial of service (DDoS) attacks are a growing threat to organizations.…
Read MoreThe Evolution of E-Signature Functionality & Market Trends
Key Criteria for Evaluating Application Security Testing Solutions
Testing has always been seen as a cost center. While everyone agrees that, in general, testing improves product quality and security…
Read MoreKey Criteria for Evaluating Operational Technology (OT) Security Solutions
The unification of operational technology (OT) and informational technology (IT) brings a range of benefits to sophisticated technology systems in industries…
Read MoreKey Criteria for Evaluating Enterprise Password Management Solutions
Every organization’s employees are buried in username and password combinations. The sheer volume of passwords we must maintain for our jobs—not…
Read MoreGigaOm Radar for Zero-Trust Network Access (ZTNA)
Secure remote access is a critical component of an organization’s ability to maintain business operations. Before COVID, many saw remote access…
Read MoreGigaOm Radar for Identity as a Service (IDaaS)
Identity management presents a significant challenge to organizations as more complex and distributed environments continue to impact their operational management and…
Read MoreKey Criteria for Evaluating Identity As a Service (IDaaS) Solutions
Identity management presents a significant challenge to organizations as more complex and distributed environments continue to impact their operations management and…
Read MoreCxO Decision Brief: Managed Security Service Providers (MSSP)
This GigaOm CxO Decision Brief report was commissioned by OTAVA. Managed security service providers (MSSP) fill a critical need for businesses…
Read More