Skip to content

Main Navigation

Gigaom Search
  • Menu

  • About Us
  • ResearchExpand
    • Cloud & Infrastructure
    • Data Infrastructure, AI & Analytics
    • Edge & Networking
    • Security & Risk
    • DevOps & Applications
  • Analysts
  • Search
  • Sign in
Become a Client

Research

Show filters Hide filters
Topics
Cloud & Infrastructure Data Infrastructure, AI & Analytics Edge & Networking Security & Risk DevOps & Applications
Products
Market Radar Key Criteria & Market Landscape TCO & Benchmark GigaBrief Solution Brief Business & Technology Impact Webinar Blog Podcast
Advanced filters

Load More Loading Research…
Abstract internet security
Image credit: chainatp
Chris Grundemann, Karen Martin, Logan Andrew Green Aug 18, 2021 (Aug 18, 2021) -- Market Radar

GigaOm Radar for Security Information and Event Management (SIEM) Solutions

The security information and event management (SIEM) solution space is mature and competitive. Most vendors have had well over a decade to…

Read More
Security & Risk
Futuristic background of business network
Image credit: bluebay2014
Alastair Cooke, Chris Grundemann Jul 30, 2021 (Jul 30, 2021) -- Key Criteria & Market Landscape

Key Criteria for Evaluating a Distributed Denial of Service (DDoS) Solution

Although ransomware is making all the headlines today, it’s not the only kind of attack that can intrude between you and your…

Read More
Data Protection, Data Security, Security & Risk
Cloud computing concept.
Image credit: metamorworks
Sponsored by
William McKnight, Jake Dolezal Jul 19, 2021 (Jul 23, 2021) -- TCO & Benchmark

Cloud Data Security

Data security has become an immutable part of the technology stack for modern applications. Protecting application assets and data against cybercriminal activities,…

Read More
Cloud & Infrastructure, Cloud Storage, Data Security, Infrastructure, Security
Manager Technician Industrial Engineer working and control robotics with monitoring system software and icon industry network connection on tablet. AI, Artificial Intelligence, Automation robot arm machine in smart factory on blue digital background, Inno
Image credit: ipopba
Paul Stringfellow Jul 9, 2021 (Jul 12, 2021) -- Market Radar

GigaOm Radar for Data Loss Prevention

Data is at the core of modern business: It is our intellectual property, the lifeblood of our interactions with our employees, partners,…

Read More
Data Security, Insider Threat
Corridor Of  Server Room With Server Racks In Datacenter. 3D Ill
Image credit: monsitj
Sponsored by
Ned Bellavance Jul 2, 2021 (Jul 2, 2021) -- Report

The Cost of Microsoft 365 Data Protection

Organizations are adopting solutions like Microsoft 365 (formerly Office 365) to reduce administrative burden, simplify management, and gain access to rapidly evolving…

Read More
Data Protection, Data Storage
Top View Through the Glass of IT Engineer Working with Laptop in Data Center Full of  Active Rack Servers.
Image credit: gorodenkoff
Chris Grundemann, Ivan McPhee Jun 24, 2021 (Aug 10, 2021) -- Market Radar

GigaOm Radar for Evaluating Secure Service Access

Due to the rapid adoption of cloud services, edge networks, and mobile workforces redefining the boundaries of the enterprise, digital transformation is…

Read More
Edge & Networking, Security & Risk
rad.cook.pam radar2
Alastair Cooke Jun 23, 2021 -- Market Radar

GigaOm Radar for Privileged Access Management

Privileged credentials (administrator rights) are a top target for attackers from outside the organization, or even from among unhappy staff within, because…

Read More
Security & Risk
Man using an ipad
Image credit: ipopba
Paul Stringfellow Jun 17, 2021 (Aug 10, 2021) -- Key Criteria & Market Landscape

Key Criteria for Evaluating Data Loss Prevention Platforms

Data is a crucial asset for modern businesses and has to be protected in the same way as any other corporate asset,…

Read More
Data Management, Security & Risk
Abstract internet security
Image credit: chainatp
Chris Grundemann, Karen Martin, Logan Andrew Green Jun 15, 2021 (Aug 10, 2021) -- Key Criteria & Market Landscape

Key Criteria for Evaluating Security Information and Event Management Solutions (SIEM)

Security Information and Event Management (SIEM) solutions consolidate multiple security data streams under a single roof. Initially, SIEM supported early detection of…

Read More
Security, Security & Risk
Top View Through the Glass of IT Engineer Working with Laptop in Data Center Full of  Active Rack Servers.
Image credit: gorodenkoff
Chris Grundemann, Ivan McPhee Jun 4, 2021 (Aug 10, 2021) -- Key Criteria & Market Landscape

Key Criteria for Evaluating Secure Service Access (SSA)

Since the inception of large-scale computing, enterprises, organizations, and service providers have protected their digital assets by securing the perimeter of their…

Read More
Cloud & Infrastructure, Edge & Networking, Security & Risk
7rFbSL8I
Image credit: ra2studio
Enrico Signoretti May 27, 2021 (Jun 14, 2021) -- Blog

Why We Need Cloud-Native Data Protection

All enterprises were already using cloud computing in one way or the other when the COVID-19 pandemic suddenly accelerated the migration of…

Read More
Cloud & Infrastructure, Data Protection
vulnerability radar
Iben Rodriguez, Geoff Uyleman May 17, 2021 (May 21, 2021) -- Market Radar

GigaOm Radar for Vulnerability Management

The challenges facing IT decision makers when it comes to modern vulnerability management include the integration of DevOps practices and increasing complexity…

Read More
Security & Risk

Posts navigation

  • 1
  • 2
  • 3
  • …
  • 12
  • »

Stay on top of emerging trends impacting your industry with updates from our GigaOm Research Community.

Join Research Community
Gigaom
  • About Us
  • Analysts
  • Press Room
  • Contact
  • Jobs
  • Twitter
  • Facebook
  • LinkedIn
  • RSS Feed
  • Newsletter
  • Privacy Policy
  • Terms of Service
  • © GigaOm All Rights Reserved 2021
This website uses cookies; by continuing you are a agreeing to our Privacy Policy Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

This is an necessary category.

Save & Accept