In the last year, the very concept of the office environment—and how work, collaboration, and communication takes place—changed dramatically. Now that…
Read MoreResearch
GigaOm Radar for Vulnerability Management
The challenges facing IT decision makers when it comes to modern vulnerability management include the integration of DevOps practices and increasing…
Read MoreKey Criteria for Evaluating Privileged Access Management
Privileged Access Management (PAM) enables administrative access to critical IT systems while minimizing the chances of security compromises through monitoring, policy…
Read MoreUnderstanding Vulnerability Management
No organization wants its name in the headlines because of a security incident or data breach, but major security incidents occur…
Read MoreKasten by Veeam
Kasten, now a part of Veeam, has developed one of the most innovative Kubernetes-native data protection solutions on the market. It…
Read MoreAdventist Risk Management Data Protection Infrastructure
Companies always want to enhance their ability to quickly address pressing business needs. Toward that end, they look for new ways…
Read MoreTough Threat Landscape Demands Better Data Protection for Hybrid Cloud
The number of businesses migrating to the cloud is constantly growing. Hybrid cloud is now considered a standard approach by organizations…
Read MoreSecure Insight: GigaOm Partners with the CISO Series
Don’t look now, but GigaOm, the analyst firm that enables smart businesses to future-proof their decisions, is forging new partnerships to…
Read MoreKey Criteria for Evaluating Vulnerability Management Tools
Vulnerability management tools scan your IT estate to help identify and mitigate security risks and weaknesses. These tools can facilitate the…
Read MoreModern Data Protection Use Case Analysis
This free 1-hour webinar from GigaOm Research brings together experts in HCI and data protection, featuring GigaOm analyst Enrico Signoretti and…
Watch NowKey Criteria for Evaluating Hybrid Cloud Data Protection
A strong data protection strategy remains at the core of every IT infrastructure, but cloud and edge computing have changed the…
Read MoreWork from Home Security
Spin Master is a leading global children’s entertainment company that invents toys and games, produces dozens of television and studio series…
Read MoreIvan McPhee
Formerly an enterprise architect and management consultant focused on accelerating time-to-value by implementing emerging technologies and cost optimization strategies, Ivan has…
Learn MoreThe Five Pillars of (Azure) Cloud-based Application Security
This 1-hour webinar from GigaOm brings together experts in Azure cloud application migration and security, featuring GigaOm analyst Jon Collins and…
Watch NowAndrew Green
Andrew Green is an enterprise IT writer and practitioner with an engineering and product management background at a tier 1 telco.…
Learn MoreData Management and Secure Data Storage for the Enterprise
This free 1-hour webinar from GigaOm Research brings together experts in data management and security, featuring GigaOm Analyst Enrico Signoretti and…
Watch NowUnderstanding and Managing Data Protection for Kubernetes in Enterprise Environments
Over the last year we have moved past the initial enthusiasm and adoption phases of Kubernetes. Enterprises are moving their applications…
Read MoreTalking DevSecOps on the CISO Series Podcast
When GigaOm VP of Research Jon Collins published his latest report, “GigaOm Radar for Evaluating DevSecOps Tools,” it kicked off a…
Read MorePredictions for 2021 and Beyond
Here at Gigaom we’re looking at how leading-edge technologies impact the enterprise, and what organizations can do to gear up for…
Read MoreCISO Podcast: Talking Anti-Phishing Solutions
Simon Gibson earlier this year published the report, “GigaOm Radar for Phishing Prevention and Detection,” which assessed more than a dozen…
Read MorePaul Stringfellow
Paul Stringfellow has more than 25 years of experience in the IT industry helping organizations of all kinds and sizes use…
Learn MorePhish Fight: Securing Enterprise Communications
Yes, much of the world may have moved on from email to social media and culturally dubious TikTok dances, yet traditional…
Read MoreWhen Is a DevSecOps Vendor Not a DevSecOps Vendor?
DevOps’ general aim is to enable a more efficient process for producing software and technology solutions and bringing stakeholders together to…
Read MoreDigital Risk, Compliance, and Data Centricity
This report examines the current state of digital governance, risk, and compliance within enterprise companies—an area that has recently seen dramatic…
Read More