Enterprises of every size are moving applications and infrastructure to the cloud. Maintaining operational awareness is difficult enough within a single cloud…
Read MoreHow to read this report The Vendor profile is part of a series of documents aimed at giving the reader the tools…
Read MoreDefining Cohesity as a data protection vendor is very limiting. In fact, Cohesity forged a new category of solutions aimed at consolidating…
Read MoreCommvault is one of the leaders in traditional data protection solutions, and it has been expanding its product line with new solutions…
Read MoreVeeam is a leader in the data protection industry. Started as an optimized solution for VMware virtualized infrastructures, the company has been…
Read MoreWe covered Zimperium in our December 2018 Landscape Report, and they continue to stand out in their approach and philosophy. Zimperium was…
Read MoreLearn about state of the Hybrid Cloud Data Protection providers and which vendors to consider to protect your organization.…
Read MoreCloud and edge computing have changed the way enterprises do IT. To best meet business and user needs, many enterprises are embracing…
Read MoreAbout this Episode On Episode 102 of Voices in AI, Byron Reese discusses security and its impact on AI as a whole…
Read MoreMany organizations find themselves having to address the information security demands of their clients in addition to government regulators. Losing bids for…
Read MoreMicroservices approaches such as Kubernetes are changing the way people think about applications, bringing the dual benefits of massive scalability and modularity.…
Read MoreThis report documents the GigaOm Field Test Lab Setup instructions to evaluate Aporeto’s zero trust cloud security solution. This report corresponds to…
Read MoreThe role of the CIO has evolved and encompasses more than managing servers, data centers, and the applications that run on them.…
Read MoreDocuments have always been part of the financial services industry. The ability to represent agreements or processes with documents is key for…
Read MoreTo ensure data and services are protected against attack, DevOps is evolving to incorporate cybersecurity practices across the lifecycle. Organizations need to…
Read MoreDeception technology is designed to detect the presence of adversaries on an enterprise network by using decoy systems as bait and lures.…
Read MoreBug bounties and penetration testing (pen-testing) are powerful techniques that uncover flaws in controls, applications, and hardware. They enable enterprises to secure…
Read MoreIT organizations of all sizes are facing several infrastructure challenges. On one hand, they repeatedly receive pressing requirements coming from the business…
Read MoreCybersecurity and innovation are not the most comfortable of bedfellows. While every CIO will say security is a top priority, innovation requires…
Read MoreAbout this Episode Episode 90 of Voices in AI features Byron speaking with Norman Sadeh from Carnegie Mellon University about the nature…
Read MoreThe ability to detect events and determine their intent — good versus bad — is crucial to information security and network defense.…
Read MoreLast week I attended VeeamON 2019, in Miami, and I had the chance to get a better idea about the status of…
Read MoreMobile devices have become ubiquitous within the enterprise over the last decade moving from shadow implementations to mainstream for extended communications, even…
Read MoreFollowing up on my take on the evolution of product and strategy of companies like Cohesity and NetApp, today I’d like to…
Read MoreThe saying goes, “Identity is the new security perimeter.” This changes the traditional way we think about granting users access to “granting…
Read More