Why have we been making changes to the GigaOm Key Criteria and Radar reports? We are committed to a rigorous, defensible,…
Read MoreResearch
SIEM and SOAR – Will They or Won’t They?
A considerable percentage of SIEM vendors share a vision for how to help security operations centers deal with the high volume…
Read MoreWhat’s the Business Value of AI? A Systems Engineer’s Take
Across four decades, I have worked as a systems engineer in the information technology (IT) industry designing, architecting, configuring computing systems…
Read MoreCase Study: Ingram Micro
“GigaOm and Ingram Micro work with partners to drive strategic growth and deliver more value to technology buyers. GigaOm goes beyond…
Read MoreNDR: a simple acronym describing a complex and dynamic area
As three-letter acronyms in tech go, network detection and response (NDR) has to be one of the clearest – as the…
Read MorePlanning for Data Sovereignty in a Multicloud World
With its roots in privacy law emerging from the UK and Europe, data sovereignty has become a global concern. Increasingly, international…
Read MoreThe Cloud-only Era is Done
As ever in this job, it’s by putting multiple conversations together that I start building a picture. Over recent months, I’ve…
Read MoreDevOps efficiency needs to put business goals first
Here’s a quick story. As a business analyst, I worked at a publisher in Oxford. We were interviewing, process diagramming, and…
Read MoreEnterprise MFA is actually really cool
Multifactor authentication (MFA) is a credential verification method that requires the provisioning of two or more authentication mechanisms to gain access…
Read MoreNaaS – enterprise networking as an innovation platform
Network as a service (NaaS) applies a cloud-like provisioning model to enterprise networking, enabling on-demand, scalable connectivity and value-added services via…
Read MoreAs Microsoft joins the party, is it time to try MDR?
Recently Microsoft entered the world of managed detection and response (MDR) solutions with its “Microsoft Defender Experts for XDR”. An addition…
Read MoreGigaOm Research Bulletin #004
Welcome to GigaOm’s research bulletin for August 2023 Hi, and welcome back! Our CEO Ben Book has taken GigaOm from a boutique analyst…
Read MoreWhat’s the future for WebAssembly?
I was fortunate to sit down with Matt Butcher, CEO of Fermyon, and discuss all things application infrastructure, cloud native architectures,…
Read MoreStandalone SOAR is Alive and Kicking
Multiple publications and analyst firms have predicted a doomsday scenario for the standalone SOAR following a number of acquisitions in the…
Read MoreIs there a case for Microsoft as your only enterprise security partner?
In recent GigaOm research, we evaluated whether there was a good argument to use a single security partner to protect an…
Read MoreMicrosoft takes Entra to the edge
Identity security must be at the heart of any organization’s security strategy. Our infrastructures have become more disparate, and our users…
Read MoreHow Can CPAs Ethically Interact With ChatGPT?
Elizabeth Kittner is GigaOm’s VP of Finance. As CPA firms experiment with ChatGPT and other AI solutions, it is important to…
Read MoreTop Trends from Infosec Europe
Infosec Europe, this year at London’s Excel arena, is an opportunity for those of us working day to day in the…
Read MoreReviewing Architectural and Data Aspects of Microservices Applications
Microservices architectures have reached the mainstream. A 2016 Cloud Native Computing Foundation (CNCF) survey found that 23% of respondents had deployed…
Read MoreCan Open Source save AI?
Do excuse the clickbait headline, but isn’t everything we write these days done in order to drive some algorithm, somewhere? As…
Read MoreThe GigaOm Pivot – rebuilding the analyst business for the digital enterprise
How do you transform and grow in these times? CEO Ben Book has taken GigaOm from a boutique analyst company to…
Read MoreThe Fundamentals of Buying a Security Solution Today
Cybersecurity incidents aren’t something that happens to other people. Organizations today accept that it’s not about whether a breach will occur…
Read MoreThe True Value-Add of Container Networking Solutions
In distributed environments, the network is part of the application. Native container networking constructs available in Docker and Kubernetes enable organizations…
Read MoreFor Sustainability, Buildings and Energy are Strategic Resources
Reduce, reuse, recycle, that’s what we are told when it comes to environmental sustainability. But how does this apply to data…
Read More