Application development architecture has been changing to accommodate new platforms, processes, and application needs. Increasingly, applications are collections of application programming…
Read MoreResearch
GigaOm Radar for Attack Surface Management
The difficulties and challenges presented by rapid digital growth, cloud adoption, and the sprawling public IP space leave organizations unable to…
Read MoreKey Criteria for Evaluating Next-Generation Firewall Solutions
Firewalls have been an essential part of network security for decades, sitting at the perimeter of an organization’s network and using…
Read MoreKey Criteria for Evaluating DNS Security Solutions
The domain name system (DNS) is fundamental to every modern organization. It’s the global web address book without which communications networks,…
Read MoreKey Criteria for Evaluating Attack Surface Management Solutions
The difficulties and challenges presented by rapid digital growth, cloud adoption, and the sprawling public IP space leave organizations unable to…
Read MoreKey Criteria for Evaluating Application and API Security Solutions
Modern applications are composed of the application itself and the application programming interfaces (APIs) that represent application subsystems. Recent trends in…
Read MoreKey Criteria for Evaluating Network Access Control Solutions
Network access control (NAC) lies at the intersection of network security and visibility. It offers visibility over all network entities and…
Read MoreSecurity Information and Event Management: A MITRE ATT&CK Framework Competitive Evaluation
Security information and event management (SIEM) technology supports threat detection, compliance, and security incident management through the collection and analysis (near…
Read MoreGigaOm Radar for User and Entity Behavior Analysis
Cybersecurity is a multidisciplinary practice experiencing a fast rate of change and growing complexity. In response, vendors are evolving their technology…
Read MoreGigaOm Radar for Managed Security Services: Managed Detection and Response (MDR)
All businesses face significant and complex cybersecurity challenges. Threats are constant and evolving rapidly; they can be targeted or random, malicious…
Read MoreGigaOm Radar for Unified Endpoint Management
Endpoint management is one of the most significant challenges in the enterprise today. The world continues to change, with increasingly large…
Read MoreGigaOm Radar for Development Security
Development security is not a new topic, but the need for it is the strongest it has ever been. Security was…
Read More