Traditional vulnerability management is an essential part of many cybersecurity programs. It aids in the discovery of hardware and software assets…
Read MoreResearch
GigaOm Radar for Distributed Denial of Service (DDoS) Protection
According to the Cybersecurity and Infrastructure Security Agency (CISA), distributed denial of service (DDoS) attacks are a common threat to organizations.…
Read MoreKey Criteria for Evaluating Cloud Security Posture Management (CSPM) Solutions
Cloud security posture management (CSPM) offerings are security solutions designed specifically for cloud environments. They employ the multitude of application programming…
Read MoreGigaOm Radar for Operational Technology (OT) Security
The unification of operational technology (OT) and information technology (IT) brings a range of benefits to sophisticated technology systems in industries…
Read MoreKey Criteria for Evaluating Distributed Denial of Service (DDoS) Protection Solutions
According to the Cybersecurity and Infrastructure Security Agency (CISA), distributed denial of service (DDoS) attacks are a growing threat to organizations.…
Read MoreKey Criteria for Evaluating Operational Technology (OT) Security Solutions
The unification of operational technology (OT) and informational technology (IT) brings a range of benefits to sophisticated technology systems in industries…
Read MoreGigaOm Radar for Zero-Trust Network Access (ZTNA)
Secure remote access is a critical component of an organization’s ability to maintain business operations. Before COVID, many saw remote access…
Read MoreCxO Decision Brief: Managed Security Service Providers (MSSP)
This GigaOm CxO Decision Brief report was commissioned by OTAVA. Managed security service providers (MSSP) fill a critical need for businesses…
Read MoreGigaOm Radar for Extended Detection and Response (XDR)
Enterprise cybersecurity comprises multiple security solutions from various vendors. Solutions are paired with a security information and event management (SIEM) and/or…
Read MoreKey Criteria for Evaluating Zero-Trust Network Access Solutions
Secure remote access provides numerous benefits to organizations, making it an essential component of their business operations. One of the primary…
Read MoreKey Criteria for Evaluating Extended Detection and Response Solutions
Enterprise cybersecurity is typically composed of multiple solutions from various vendors, combined with a security information and event management (SIEM) and/or…
Read MoreGigaOm Radar for Deception Technology
The prevalence of malicious actors in the digital world has created a dynamic that compels cybersecurity defenses to adapt constantly. Attackers…
Read More