|
Oct 30, 2024
AI isn't just another tool in the technology toolkit; it's a revolution waiting to be led. As tech leaders, this is your
The post Unleashing Transformation appeared first on Gigaom.
|
|
Oct 29, 2024
With the vision of a billion developers, AI is evolving from a specialized tool to a platform that democratizes coding. As AI's
The post Preparing for a Billion Developers appeared first on Gigaom.
|
|
Oct 23, 2024
As we head into 2025, CEOs are focused on a clear set of priorities—AI-enabled growth, dynamic capacity, risk management, and human-machine integration.
The post Driving AI Transformation appeared first on Gigaom.
|
|
Oct 23, 2024
At the recent Gartner Symposium, there was no shortage of data and insights on the evolving role of the CIO. While the
The post The Modern CIO appeared first on Gigaom.
|
|
Oct 23, 2024
At the recent Gartner Symposium, there was no shortage of data and insights on the evolving role of the CIO. While the
The post The Modern CIO: Moving from Technology Steward to Transformation Agent appeared first on Gigaom.
|
|
Oct 01, 2024
In today's rapidly evolving digital landscape, managing IP infrastructure has become increasingly complex and critical for organizations of all sizes. As networks
The post Don't Ignore What You Can Easily Control: Your IP Infrastructure appeared first on Gigaom.
|
|
Oct 01, 2024
Data is essential for any organization. This isn't a new concept, and it's not one that should be a surprise, but it
The post The Impact of GenAI on Data Loss Prevention appeared first on Gigaom.
|
|
Oct 01, 2024
With a macrotrend/backdrop of platformization and convergence, the industry is exploring places where identity security, endpoint security, and network security naturally meet.
The post Identity, Endpoint, and Network Security Walk into a Bar appeared first on Gigaom.
|
|
Oct 01, 2024
Service meshes have become a cornerstone in the architecture of modern microservices, providing a dedicated infrastructure layer to manage service-to-service communication. Traditionally,
The post Sidecarless Service Meshes: Are They Ready for Prime Time? appeared first on Gigaom.
|
|
Oct 01, 2024
In today's fast-paced digital landscape, creating engaging and personalized customer experiences is paramount to business success. Enter digital experience platforms (DXPs)—powerful systems
The post Digital Experience Platforms: Transforming Marketing in the 21st Century appeared first on Gigaom.
|
|
Oct 01, 2024
Phishing—how old hat is that as a topic? Isn't it solved for most of us by now? Can't we speak about AI
The post "Gone Phishing"—Every Cyberattacker's Favorite Phrase appeared first on Gigaom.
|
|
Oct 01, 2024
"I finally invented something that works!" This iconic quote from Back to the Future perfectly encapsulates the transformative journey of cloud-native data
The post Backup to the Future! appeared first on Gigaom.
|
|
Oct 01, 2024
In today's fast-paced digital world, protecting your data isn't just a technical necessity—it's a long-term strategy for operational sustainability. As businesses increasingly
The post Getting Started with Hybrid Cloud Data Protection appeared first on Gigaom.
|
|
Oct 01, 2024
I have always been intrigued by how security marries automation in infrastructure. Defining and managing security policies as code in what is
The post Security Policy as Code: An Architect's Perspective on the Evolving Landscape appeared first on Gigaom.
|
|
Oct 01, 2024
The ownership of the information technology infrastructure library (ITIL) has changed. As a result, the information technology service management (ITSM) market's understanding
The post How ITIL's Ownership Transition Impacts the ITSM Market appeared first on Gigaom.
|
|
Sep 06, 2024
I spoke recently with Carsten Brinkschulte, co-founder and CEO of Dryad. Here is some of our conversation on Silvanet and how it
The post 5 Questions for Carsten Brinkschulte, CEO Dryad: Silvanet, early warning for forest fires appeared first on Gigaom.
|
|
Sep 06, 2024
I spoke recently with Carsten Brinkschulte, co-founder and CEO of Dryad. Here is some of our conversation. Carsten, tell me a bit
The post 5 Questions: Carsten Brinkschulte, Dryad appeared first on Gigaom.
|
|
Aug 19, 2024
In the ever-evolving cyberthreat landscape, cybercriminals are deploying sophisticated methods to exploit network vulnerabilities while organizations constantly seek new ways to protect
The post The Detection Debate: Deep-Packet Inspection vs. Flow-Based Analysis appeared first on Gigaom.
|
|
Aug 19, 2024
As we stand on the cusp of a new era in cloud security, the landscape of cloud access security brokers (CASB) is
The post Embracing the Future: A Vision for the CASB Market appeared first on Gigaom.
|
|
Aug 19, 2024
Passwords are the keys to your digital assets: it's how we access applications and data, as well as infrastructure and systems. Often
The post Are We Taking Enterprise Password Management Seriously? appeared first on Gigaom.
|
|
Aug 19, 2024
In an era where digital transformation is not just a buzzword but a business imperative, edge orchestration platforms are emerging as a
The post Edge Orchestration Platforms: Navigating the Next Wave of Innovation appeared first on Gigaom.
|
|
Aug 19, 2024
Zero trust network access (ZTNA) has emerged as a crucial security paradigm for organizations seeking to secure their applications and data in
The post The Future of ZTNA: A Convergence of Network Access Solutions appeared first on Gigaom.
|
|
Aug 19, 2024
In business, it's not uncommon to take a software-as-a-service (SaaS)-first approach. It makes sense—there's no need to deal with the infrastructure, management,
The post SaaS Security Posture—It's not you, it's me! appeared first on Gigaom.
|
|
Aug 16, 2024
Exploring the operational technology (OT) security sector has been both enlightening and challenging, particularly due to its distinct priorities and requirements compared
The post Navigating the Unique Landscape of OT Security Solutions appeared first on Gigaom.
|
|
Aug 16, 2024
For a long time, enterprise object storage was positioned for archive and backup workloads—hardly the most exciting task, yet certainly a critical
The post The Rapidly Changing Landscape of Enterprise Object Storage appeared first on Gigaom.
|
|
Aug 16, 2024
The old saying, "history doesn't repeat itself, but it often rhymes," proves itself time and again with computers. In my recent analysis
The post SaaS Management and Application Discovery appeared first on Gigaom.
|
|
Aug 16, 2024
Much has been written about the whys and wherefores of the recent Crowdstrike incident. Without dwelling too much on the past (you
The post Operations Leadership Lessons from the Crowdstrike Incident appeared first on Gigaom.
|
|
Aug 02, 2024
There's a legacy connotation attached to SIEM that has led to vendors advertising themselves as some iteration of a next-generation solution. But
The post Why isn't "Just SIEM" Enough? appeared first on Gigaom.
|
|
Aug 02, 2024
In simplistic definitions, the edge is characterized as simply moving workloads closer to end users to reduce network latency associated with clouds.
The post What Makes Something Edge Native? appeared first on Gigaom.
|
|
Jul 19, 2024
As a seasoned CIO/CISO and tech industry analyst with 35 years of experience, I've seen my fair share of cybersecurity incidents. However,
The post Navigating the CrowdStrike Outage: Insights from a Tech Industry Veteran appeared first on Gigaom.
|
|
Jul 03, 2024
It is common in today's workforce to find multiple generations working alongside each other. While to some extent this has always been
The post Multigenerational Diversity appeared first on Gigaom.
|
|
Jul 02, 2024
Welcome to the final post in our zero trust blog series! Throughout this series, we've explored the key components, best practices, and
The post Putting It All Together: Getting Started with Your Zero Trust Journey appeared first on Gigaom.
|
|
Jul 01, 2024
Welcome back to our zero trust blog series! In our previous post, we explored the critical role of automation and orchestration in
The post Governance and Compliance: Aligning Zero Trust with Business Requirements appeared first on Gigaom.
|
|
Jun 28, 2024
Welcome to the next installment of our zero trust blog series! In our previous post, we explored the critical role of monitoring
The post Automation and Orchestration: The Backbone of Zero Trust appeared first on Gigaom.
|
|
Jun 27, 2024
Welcome back to our zero trust blog series! In our previous post, we took a deep dive into API security and explored
The post Monitoring and Analytics: The Eyes and Ears of Zero Trust appeared first on Gigaom.
|
|
Jun 26, 2024
In an age where cyber threats are growing exponentially, traditional security measures are no longer sufficient. At RSAC 2024, Cisco's Jeetu Patel
The post Redefining Cybersecurity: Leveraging AI for Proactive Defense appeared first on Gigaom.
|
|
Jun 26, 2024
Welcome to the latest installment of our zero trust blog series! In our previous post, we explored the importance of application security
The post Securing APIs: The Cornerstone of Zero Trust Application Security appeared first on Gigaom.
|
|
Jun 25, 2024
Welcome back to our zero trust blog series! In our previous post, we discussed the importance of device security and explored best
The post Securing Applications: Zero Trust for Cloud and On-Premises Environments appeared first on Gigaom.
|
|
Jun 14, 2024
Welcome to the next installment of our zero trust blog series! In our previous post, we explored the importance of network segmentation
The post Securing Endpoints: Zero Trust for Devices and IoT appeared first on Gigaom.
|
|
Jun 14, 2024
Welcome back to our zero trust blog series! In our previous posts, we explored the importance of data security and identity and
The post Microsegmentation: Implementing Zero Trust at the Network Level appeared first on Gigaom.
|
|
Jun 13, 2024
In today's fast-paced, highly competitive market, technology vendors often struggle to connect with their customers on a meaningful level. Traditional marketing approaches,
The post Customer-Centric Marketing for Technology Vendors appeared first on Gigaom.
|
|
Jun 13, 2024
Welcome back to our zero trust blog series! In our previous post, we took a deep dive into data security, exploring the
The post Securing Identities: The Foundation of Zero Trust appeared first on Gigaom.
|
|
Jun 12, 2024
Welcome back to our zero trust blog series! In the previous posts, we introduced the concept of zero trust and explored the
The post Protecting Your Crown Jewels appeared first on Gigaom.
|
|
Jun 11, 2024
In our previous post, we introduced the concept of zero trust and explored why it's becoming an essential approach to cybersecurity in
The post Building Blocks of Zero Trust: A Comprehensive Guide appeared first on Gigaom.
|
|
Jun 10, 2024
This past week, I had the opportunity to attend Snowflake Summit 2024 in San Francisco. As an analyst, I was treated to
The post Reflections on Snowflake Summit 2024 appeared first on Gigaom.
|
|
Jun 07, 2024
Welcome to our new blog series on zero trust! If you're an IT executive trying to navigate the complex world of cybersecurity,
The post Zero Trust 101: It's Time to Ditch "Trust but Verify" appeared first on Gigaom.
|
|
Jun 04, 2024
Over the past two years, I've been making the point that near edge and far edge are utilitarian terms at best, but
The post Near, Far, Wherever Your CPUs Are appeared first on Gigaom.
|
|
Jun 04, 2024
Several businesses I've worked with recently have had the misfortune of being victims of cybersecurity incidents. While these incidents come in many
The post The Challenge of Securing User Identities appeared first on Gigaom.
|
|
Jun 04, 2024
Over the past four years, I've consolidated a representative list of network observability vendors, but have not yet considered any modeling-based solutions.
The post Could Network Modeling Replace Observability? appeared first on Gigaom.
|
|
May 21, 2024
A stitch in time saves nine, they say, and so can receiving information in the right order. We at GigaOm are constantly
The post On Questionnaires and Briefings: Explaining the GigaOm Policy Change appeared first on Gigaom.
|
|
May 17, 2024
Sit up straight! Shoulders back, chest out! We all heard these wise words about the importance of physical posture growing up. For
The post Everything Your Parents Told You About Posture Is True! Even For Data Security appeared first on Gigaom.
|
|
May 15, 2024
Security service edge (SSE) and secure access service edge (SASE) are designed to cater to the evolving needs of modern enterprises that
The post SSE vs. SASE: Which One is Right for Your Business? appeared first on Gigaom.
|
|
May 15, 2024
One of the most compelling aspects of cloud computing has always been the potential for cost savings and increased efficiency. Seen through
The post Save Money and Increase Performance on the Cloud appeared first on Gigaom.
|
|
May 15, 2024
I began my exploration of the microsegmentation space by semantically deconstructing the title. The result? Microsegmentation solutions help define network segments as
The post There's Nothing Micro About Microsegmentation appeared first on Gigaom.
|
|
Apr 26, 2024
Embarking on an exploration of the extended detection and response (XDR) sector wasn't just another research project for me; it was a
The post The Quest for Extended Detection and Response (XDR): Unraveling Cybersecurity's Next Generation appeared first on Gigaom.
|
|
Apr 17, 2024
With the network no longer a commodity but a strategic partner in digital transformation, network operating systems (NOSs) have become indispensable. They
The post Debunking Myths: All Network Operating Systems are NOT Created Equal appeared first on Gigaom.
|
|
Apr 17, 2024
NetDevOps is revolutionizing the way networking teams operate by integrating DevOps principles into network management. It contributes to network resilience by embedding
The post From Resistance to Resilience: A Strategic Approach to NetDevOps Integration appeared first on Gigaom.
|
|
Apr 17, 2024
The latest SEC ruling on cybersecurity will almost certainly have an impact on risk management and post-incident disclosure, and CISOs will need
The post Navigating the SEC Cybersecurity Ruling appeared first on Gigaom.
|
|
Mar 27, 2024
Disruption is the new normal. Cyberattacks, natural disasters, and unforeseen technical glitches can cripple even the most prepared businesses. In today's interconnected
The post Weathering the Storm: Disaster Recovery and Business Continuity as a Service (DR/BCaaS) in 2024 appeared first on Gigaom.
|
|
Mar 27, 2024
Edge computing represents a significant shift in the IT landscape, moving data processing closer to the source of data generation rather than
The post Unlocking the Future of Edge Computing: The Pivotal Role of Kubernetes in Navigating the Next Network Frontier appeared first on Gigaom.
|
|
Mar 26, 2024
The vast and ever-expanding sea of unstructured data—filled with emails, documents, images, sensor data, and more—represents a potential goldmine for organizations. Too
The post Unleash Your Unstructured Data: A Strategic Playbook appeared first on Gigaom.
|
|
Mar 26, 2024
Cloud performance testing provides flexibility, cost savings, global reach, automation, and comprehensive insights. It's a powerful ally in delivering high-quality applications to
The post Harnessing the Power of Cloud Performance Testing appeared first on Gigaom.
|
|
Mar 26, 2024
Can observability deal with the IT chaos facing so many enterprises today? It's a question worth digging into. IT Chaos (Monitoring, Observability,
The post Chaos Theory and Observability appeared first on Gigaom.
|
|
Mar 22, 2024
Firewalls, we all have one. It's a well-established market, full of vendors with mature stacks of technology. Firewalls do a number of
The post The Time is Right to Review Your Enterprise Firewalls appeared first on Gigaom.
|
|
Mar 22, 2024
Enterprise process automation (EPA) is a fascinating field that strategically leverages technology to integrate, streamline, and automate business processes across an organization.
The post Unlocking Efficiency with Enterprise Process Automation appeared first on Gigaom.
|
|
Mar 22, 2024
The cloud-first strategy is no longer in its infancy. This wave of change has impacted and continues to disrupt the entire traditional
The post CIEM: Bridging the Gap Between IAM and Cloud Security appeared first on Gigaom.
|
|
Mar 22, 2024
A very high market demand for cloud networking has encouraged a large number of networking vendors to enter this space. Each of
The post The Cloud Networking Polysemy appeared first on Gigaom.
|
|
Mar 22, 2024
Insider threats pose a serious cybersecurity challenge for organizations across all industries. When trusted employees, contractors, or partners abuse their privileges and
The post Springing the Trap: Snagging Rogue Insiders with Deceptive Tactics appeared first on Gigaom.
|
|
Mar 21, 2024
AAS Today Application and API security (AAS) has been around as a unified security toolset for several years now, and it is
The post The Evolution of Application and API Security (AAS) appeared first on Gigaom.
|
|
Mar 21, 2024
Techniques for optimizing data center networks to support AI workloads are not intuitive. You first need a baseline understanding of how AI
The post The Elephant Flows Through the Data Center Network appeared first on Gigaom.
|
|
Mar 21, 2024
Customer data platforms (CDPs) unify first-party customer data from multiple online and offline systems to create a single centralized view of all
The post Customer Data Platforms (CDPs): A Smart Tool for the Enlightened Marketer appeared first on Gigaom.
|
|
Mar 21, 2024
In the mature market landscape of IT asset management (ITAM), you might wonder "what's the rush?" to invest in a long-run, stable
The post Making Sense of ITAM Investments in 2024 appeared first on Gigaom.
|
|
Mar 21, 2024
The IT sector has been pursuing automated deployment for a very long time. Back in the day, application release automation mapped an
The post From Here to GitOps and Back Again appeared first on Gigaom.
|
|
Mar 18, 2024
Cybersecurity continues to dominate business IT discussions in response to constantly evolving threats from ever more organized and professional adversaries. The IT
The post DNS Security: The Forgotten Hero of Your Cybersecurity Strategy appeared first on Gigaom.
|
|
Mar 18, 2024
The evolution of software portability converges naturally with the proliferation of easily scalable infrastructure made available by cloud computing providers. The clearest
The post Insights from Runtime: How Kubernetes Resource Management Influences Cloud Development appeared first on Gigaom.
|
|
Mar 18, 2024
In the ever-changing realm of digital technology, organizations are witnessing an unprecedented expansion of their digital footprints. This expansion is not unique
The post Best Practices for Implementing an ASM Solution appeared first on Gigaom.
|
|
Mar 14, 2024
Secure access service edge (SASE) is a transformative cybersecurity concept that converges network security functions with wide-area networking capabilities to match evolving
The post SASE: Today's Landscape and Tomorrow's Horizons appeared first on Gigaom.
|
|
Feb 29, 2024
Digital transformation is the holy grail of businesses today, but the route is bumpy and the journey full of challenges. Businesses have,
The post Digital Transformation Not Working? Here's a Five-Point Plan That Can Help appeared first on Gigaom.
|
|
Feb 26, 2024
Over the past several months, GigaOm has been working to establish and maintain the right culture to position the company for the
The post Developing a Culture for Growth—Reflections from the Project Team appeared first on Gigaom.
|
|
Feb 26, 2024
As I've previously noted, all machines are amplifiers, including the hardware and software machinery that makes up today's computer systems. The technology
The post Machines as Amplifiers: Constructing Value Statements appeared first on Gigaom.
|
|
Feb 26, 2024
We're delighted to announce the launch of our in-depth GigaOm Radar explainer video, which tells you everything you need to know about
The post All About the GigaOm Radar | Explainer Video appeared first on Gigaom.
|
|
Feb 23, 2024
I spoke with Heather MacDonald, principal consultant for technology training and online learning platform Pluralsight, about how to align learning with the
The post Transformational Training as Lived Experience: 5 Questions for Heather MacDonald, Pluralsight appeared first on Gigaom.
|
|
Feb 14, 2024
Introduction I rarely get the chance to work with technologies that fundamentally disrupt the way we work. Right now, I am using
The post Apple Vision Pro: Unlocking the Potential of Spatial Computing appeared first on Gigaom.
|
|
Jan 30, 2024
The landscape of cloud workload security (CWS) is rapidly evolving, offering new challenges and opportunities for businesses of all sizes. In this
The post Charting A Course Through Cloud Workload Security (CWS): An Enterprise Blueprint appeared first on Gigaom.
|
|
Jan 30, 2024
Unified endpoint management (UEM) is neither a new term nor a new technology. Rather, it's a bundling of existing technologies into a
The post The Evolution of Endpoint Management appeared first on Gigaom.
|
|
Jan 24, 2024
There's been little to no coverage from the analyst community of enterprise-grade container networking solutions—a market that has until recently consisted of
The post Container Networking: From DIY to Buy appeared first on Gigaom.
|
|
Jan 24, 2024
As the fifth generation of cellular network technology, 5G has tremendous potential as a transformative technology: it can enhance connectivity, drive digital
The post Hybrid 5G or Private 5G: What's Right for Your Business? appeared first on Gigaom.
|
|
Jan 24, 2024
Content delivery networks (CDNs) have been around for decades, so they may not generate the interest and excitement of newer technology. Still,
The post "But Aren't CDNs Boring?" No, Not at All. appeared first on Gigaom.
|
|
Jan 05, 2024
First, a story. When I returned to being a software industry analyst in 2015 or thereabouts, I had a fair amount of
The post On Microsoft's Radius, and building bridges between infra, dev and ops appeared first on Gigaom.
|
|
Dec 28, 2023
In the ever-evolving landscape of networking and security, two buzzwords have been making the rounds: software-defined wide area network (SD-WAN) and secure
The post Does SD-WAN Have a Future in a SASE World? appeared first on Gigaom.
|
|
Dec 28, 2023
In the course of this year's evaluation into the API functional automated testing space, we found some evolving trends that have bearing
The post API Testing: Divergent Roots, Unified Future appeared first on Gigaom.
|
|
Dec 28, 2023
Today, we're diving deep into the world of user and entity behavior analytics (UEBA). It's one of those catchy acronyms that has
The post UEBA is Transforming Cyber Defense—Here's How appeared first on Gigaom.
|
|
Dec 28, 2023
Data is at the heart of today's business. It's an essential business asset, the lifeblood of the modern organization. While essential, however,
The post Why You Need a Data Security Platform (DSP) appeared first on Gigaom.
|
|
Dec 22, 2023
As part of our ongoing process of improvement, we are excited to announce the release of our Online Research Calendar, covering the scheduling
The post GigaOm Research Bulletin #006 appeared first on Gigaom.
|
|
Dec 11, 2023
In this, the third in our series of predictions blogs, we turn to the increased focus on platforms - that is, coherent
The post 2024 predictions redux: data, storage, infrastructure, and services platforms revisited appeared first on Gigaom.
|
|
Dec 08, 2023
So, how are the more engineering levels of tech evolving - security, networking, and management? We spoke to some of our experts
The post Five security, networking and management predictions for 2024 appeared first on Gigaom.
|
|
Nov 28, 2023
Generative AI is a thing. Let's go further and say it's a big thing, with lots of promise. But that doesn't mean
The post Seven reasons why generative AI will fall short in 2024 appeared first on Gigaom.
|
|
Nov 22, 2023
We're excited to announce the release of our online research calendar, covering the scheduling of GigaOm Radar reports. These are practitioner-led technology
The post Heads up: New Research Calendar for GigaOm Radar Reports appeared first on Gigaom.
|
|
Nov 17, 2023
Koby Avital is a strategic advisor at enterprise software development company NearForm and a board member of the Linux Foundation - he
The post 5 questions for Koby Avital: on business-first transformation and strategic vendor partnerships appeared first on Gigaom.
|
|
Nov 07, 2023
One of the challenges we face as analysts is how to categorize technologies. I'm feeling this directly as I work through the (still-evolving)
The post Intelligent Automation vs Hyperautomation - what's the score? appeared first on Gigaom.
|
|