Related Research
Key Criteria for Evaluating Multifactor Authentication (MFA) Solutions
Multifactor authentication (MFA) addresses one of the most vulnerable elements in cybersecurity—humans. As most attacks are enabled through social engineering, MFA…
Read MoreEnterprise MFA is actually really cool
Multifactor authentication (MFA) is a credential verification method that requires the provisioning of two or more authentication mechanisms to gain access…
Read MoreKey Criteria for Evaluating Endpoint Detection and Response (EDR) Solutions
The endpoint presents an unusual problem forced on organizations and security teams. Endpoints are portals through which sensitive data is accessed…
Read MoreGigaOm Radar for Security Orchestration, Automation, and Response (SOAR)
Security orchestration, automation, and response (SOAR) emerged as a product category in the mid-2010s. At that point, SOAR solutions were based…
Read MoreGigaOm Radar for Application Security Testing
Application security testing exercises an application at some point in its lifecycle. Traditionally, that testing took place at the end of…
Read MoreGigaOm Radar for Network Detection and Response (NDR)
Today’s IT infrastructure is becoming increasingly elaborate, comprising hybrid cloud and on-premises environments, internet of things (IoT) devices, and third-party providers.…
Read More