Alan Rodger has worked in industry analyst roles for almost 20 years, supporting clients mainly by writing, advising, or speaking on…
Learn MoreResearch
GigaOm Radar for Unified Endpoint Management (UEM)
Endpoint management is one of the most significant challenges enterprises face today. The modern workforce is becoming more distributed and demanding…
Read MoreKey Criteria for Evaluating Deception Technology
Attacker techniques and behaviors are constantly improving and evolving. As cyber security defenses zig, attackers zag. This dynamic creates a changed…
Read MoreDefeating Distributed Denial of Service Attacks
It seems like every day the news brings new stories of cyberattacks. Whether ransomware, malware, crippling viruses, or more frequently of…
Read MoreKey Criteria for Evaluating Developer Security Tools
Software needs to be written, built, and deployed with security in mind. This is true for both the application being created…
Read MoreKey Criteria for Evaluating Unified Endpoint Management
Endpoint management is one of the most significant challenges in the enterprise today. An increasingly large percentage of our workforce is…
Read MoreData Storage for Ever Changing Business Needs
Join GigaOm analyst Enrico Signoretti and CTERA CTO Aron Brand in this one-hour live webinar as they explore file storage trends…
Watch NowHigh Performance Application Security Testing – Cloud WAF Security Platforms
This free 1-hour webinar from GigaOm Research features analyst Jake Dolezal and will focus on comparing Web Application Firewall (WAF) security…
Watch NowHigh Performance Application Security Testing
Data, web, and application security have evolved dramatically over the past few years. Just as new threats abound, the architecture of…
Read MoreGigaOm Radar for Security Orchestration, Automation, and Response (SOAR)
Security Orchestration, Automation, and Response (SOAR) emerged as a product category in the mid-2010s. At that point, SOAR solutions were very…
Read MoreGigaOm Radar for DDoS Protection
With ransomware getting all the news coverage when it comes to internet threats, it is easy to lose sight of distributed…
Read MoreGigaOm Radar for Security Information and Event Management (SIEM) Solutions
The security information and event management (SIEM) solution space is mature and competitive. Most vendors have had well over a decade…
Read MoreKey Criteria for Evaluating a Distributed Denial of Service (DDoS) Solution
Although ransomware is making all the headlines today, it’s not the only kind of attack that can intrude between you and…
Read MoreKey Criteria for Evaluating Disaster Recovery as a Service (DRaaS)
Disaster Recovery (DR) provides rapid restoration of one or more applications or systems when the data center where they reside is,…
Read MorePlatform Play
LAWPRO is the leading provider of professional indemnity insurance and services to thousands of providers in the Ontario legal community. LAWPRO…
Read MoreGigaOm Radar for Data Loss Prevention
Data is at the core of modern business: It is our intellectual property, the lifeblood of our interactions with our employees,…
Read MoreThe Cost of Microsoft 365 Data Protection
Organizations are adopting solutions like Microsoft 365 (formerly Office 365) to reduce administrative burden, simplify management, and gain access to rapidly…
Read MoreGigaOm Radar for Privileged Access Management
Privileged credentials (administrator rights) are a top target for attackers from outside the organization, or even from among unhappy staff within,…
Read MoreKey Criteria for Evaluating Data Loss Prevention Platforms
Data is a crucial asset for modern businesses and has to be protected in the same way as any other corporate…
Read MoreKey Criteria for Evaluating Security Information and Event Management Solutions (SIEM)
Security Information and Event Management (SIEM) solutions consolidate multiple security data streams under a single roof. Initially, SIEM supported early detection…
Read MoreGigaOm Radar for Hybrid Cloud Data Protection for the Enterprise
Data is among the most important assets of any enterprise today, and keeping that data safe is paramount. This is especially…
Read MoreGigaOm Radar for Hybrid Cloud Data Protection for Small and Medium-Sized Businesses
The data protection market is undergoing a profound transformation. On the one hand, the cloud is radically changing where data is…
Read MoreKey Criteria for Evaluating Secure Service Access (SSA)
Since the inception of large-scale computing, enterprises, organizations, and service providers have protected their digital assets by securing the perimeter of…
Read MoreWhy We Need Cloud-Native Data Protection
GigaOm’s Enrico Signoretti Explores the need for Cloud-Native Data Protection in today’s enterprises. All enterprises were already using cloud computing in…
Read More