Don’t look now, but GigaOm, the analyst firm that enables smart businesses to future-proof their decisions, is forging new partnerships to…
Read MoreResearch
Key Criteria for Evaluating Vulnerability Management Tools
Vulnerability management tools scan your IT estate to help identify and mitigate security risks and weaknesses. These tools can facilitate the…
Read MoreModern Data Protection Use Case Analysis
This free 1-hour webinar from GigaOm Research brings together experts in HCI and data protection, featuring GigaOm analyst Enrico Signoretti and…
Watch NowKey Criteria for Evaluating Hybrid Cloud Data Protection
A strong data protection strategy remains at the core of every IT infrastructure, but cloud and edge computing have changed the…
Read MoreWork from Home Security
Spin Master is a leading global children’s entertainment company that invents toys and games, produces dozens of television and studio series…
Read MoreThe Five Pillars of (Azure) Cloud-based Application Security
This 1-hour webinar from GigaOm brings together experts in Azure cloud application migration and security, featuring GigaOm analyst Jon Collins and…
Watch NowData Management and Secure Data Storage for the Enterprise
This free 1-hour webinar from GigaOm Research brings together experts in data management and security, featuring GigaOm Analyst Enrico Signoretti and…
Watch NowUnderstanding and Managing Data Protection for Kubernetes in Enterprise Environments
Over the last year we have moved past the initial enthusiasm and adoption phases of Kubernetes. Enterprises are moving their applications…
Read MoreTalking DevSecOps on the CISO Series Podcast
When GigaOm VP of Research Jon Collins published his latest report, “GigaOm Radar for Evaluating DevSecOps Tools,” it kicked off a…
Read MorePredictions for 2021 and Beyond
Here at Gigaom we’re looking at how leading-edge technologies impact the enterprise, and what organizations can do to gear up for…
Read MoreCISO Podcast: Talking Anti-Phishing Solutions
Simon Gibson earlier this year published the report, “GigaOm Radar for Phishing Prevention and Detection,” which assessed more than a dozen…
Read MorePhish Fight: Securing Enterprise Communications
Yes, much of the world may have moved on from email to social media and culturally dubious TikTok dances, yet traditional…
Read More