Welcome to GigaOm’s research bulletin for November 2023 Hi, and welcome back! GigaOm’s partnership with Ingram Micro clearly shows how we…
Read MoreResearch
GigaOm Radar for Autonomous Security Operations Center (SOC)
Autonomous security operations center (SOC) solutions reallocate security analysts’ processing power from conducting repetitive analysis and response tasks to only investigating…
Read MoreGigaOm Radar for Ransomware Prevention
Ransomware continues to be a high-priority threat for all organizations, regardless of size. As with all cybersecurity challenges, the threat continues…
Read MoreKey Criteria for Evaluating Cloud Network Security Solutions
Cloud network security solutions provide a suite of security services for single and multicloud environments to prevent unauthorized traffic, access, modification,…
Read MoreKey Criteria for Evaluating Penetration Testing as a Service (PTaaS) Solutions
Penetration testing, a cornerstone in cybersecurity, has for many years been the go-to technique for security professionals looking to uncover vulnerabilities…
Read MoreSIEM and SOAR – Will They or Won’t They?
A considerable percentage of SIEM vendors share a vision for how to help security operations centers deal with the high volume…
Read MoreKey Criteria for Evaluating Ransomware Prevention Solutions
Ransomware continues to be a high-priority threat for all organizations, regardless of size. As with all cybersecurity challenges, the threat continues…
Read MoreKey Criteria for Evaluating Threat Intelligence Platforms (TIPs)
Cyber threat intelligence (CTI) encompasses the collection, processing, analysis, and distribution of threat data, culminating in actionable insights. These insights facilitate…
Read MoreGigaOm Radar for Multifactor Authentication (MFA)
Multifactor authentication (MFA) is a credential verification method that requires the provisioning of two or more verification factors to gain access…
Read MoreKey Criteria for Evaluating Autonomous Security Operations Center (SOC) Solutions
Autonomous security operations center (SOC) solutions converge security information and event management (SIEM) and security orchestration, automation, and response (SOAR) capabilities…
Read MoreGigaOm Radar for Endpoint Detection and Response (EDR)
The endpoint is, in some ways, an unusual problem forced upon organizations and security teams. Endpoints are portals through which sensitive…
Read MoreKey Criteria for Evaluating Multifactor Authentication (MFA) Solutions
Multifactor authentication (MFA) addresses one of the most vulnerable elements in cybersecurity—humans. As most attacks are enabled through social engineering, MFA…
Read MoreEnterprise MFA is actually really cool
Multifactor authentication (MFA) is a credential verification method that requires the provisioning of two or more authentication mechanisms to gain access…
Read MoreKey Criteria for Evaluating Endpoint Detection and Response (EDR) Solutions
The endpoint presents an unusual problem forced on organizations and security teams. Endpoints are portals through which sensitive data is accessed…
Read MoreGigaOm Radar for Security Orchestration, Automation, and Response (SOAR)
Security orchestration, automation, and response (SOAR) emerged as a product category in the mid-2010s. At that point, SOAR solutions were based…
Read MoreGigaOm Radar for Application Security Testing
Application security testing exercises an application at some point in its lifecycle. Traditionally, that testing took place at the end of…
Read MoreGigaOm Radar for Network Detection and Response (NDR)
Today’s IT infrastructure is becoming increasingly elaborate, comprising hybrid cloud and on-premises environments, internet of things (IoT) devices, and third-party providers.…
Read MoreAs Microsoft joins the party, is it time to try MDR?
Recently Microsoft entered the world of managed detection and response (MDR) solutions with its “Microsoft Defender Experts for XDR”. An addition…
Read MoreKey Criteria for Evaluating Security Orchestration, Automation, and Response (SOAR) Solutions
Depending on the size of an organization, security information and event management (SIEM) tools can produce tens of thousands of alarms…
Read MoreGigaOm Radar for Data Loss Prevention (DLP)
Data is a precious resource for today’s enterprises, and preventing data loss is of paramount importance. The cost of data loss…
Read MoreGigaOm Radar for API Security
APIs are quickly becoming the largest attack surface in organizations. API security solutions help organizations improve their security posture by finding…
Read MoreGigaOm Research Bulletin #004
Welcome to GigaOm’s research bulletin for August 2023 Hi, and welcome back! Our CEO Ben Book has taken GigaOm from a boutique analyst…
Read MoreGigaOm Radar for Cloud Security Posture Management (CSPM)
Cloud security posture management (CSPM) offerings are security solutions designed specifically for cloud environments. They employ the multitude of application programming…
Read MoreKey Criteria for Evaluating Network Detection and Response (NDR) Solutions
Network detection and response (NDR) is an advanced cybersecurity approach that focuses on detecting and responding to threats within a network…
Read More