GigaOm’s Enrico Signoretti Explores the need for Cloud-Native Data Protection in today’s enterprises. All enterprises were already using cloud computing in…
Read MoreResearch
SASE: Securing the Digital-First Enterprise
In the last year, the very concept of the office environment—and how work, collaboration, and communication takes place—changed dramatically. Now that…
Read MoreGigaOm Radar for Vulnerability Management
The challenges facing IT decision makers when it comes to modern vulnerability management include the integration of DevOps practices and increasing…
Read MoreKey Criteria for Evaluating Privileged Access Management
Privileged Access Management (PAM) enables administrative access to critical IT systems while minimizing the chances of security compromises through monitoring, policy…
Read MoreUnderstanding Vulnerability Management
No organization wants its name in the headlines because of a security incident or data breach, but major security incidents occur…
Read MoreKasten by Veeam
Kasten, now a part of Veeam, has developed one of the most innovative Kubernetes-native data protection solutions on the market. It…
Read MoreAdventist Risk Management Data Protection Infrastructure
Companies always want to enhance their ability to quickly address pressing business needs. Toward that end, they look for new ways…
Read MoreTough Threat Landscape Demands Better Data Protection for Hybrid Cloud
The number of businesses migrating to the cloud is constantly growing. Hybrid cloud is now considered a standard approach by organizations…
Read MoreSecure Insight: GigaOm Partners with the CISO Series
Don’t look now, but GigaOm, the analyst firm that enables smart businesses to future-proof their decisions, is forging new partnerships to…
Read MoreKey Criteria for Evaluating Vulnerability Management Tools
Vulnerability management tools scan your IT estate to help identify and mitigate security risks and weaknesses. These tools can facilitate the…
Read MoreModern Data Protection Use Case Analysis
This free 1-hour webinar from GigaOm Research brings together experts in HCI and data protection, featuring GigaOm analyst Enrico Signoretti and…
Watch NowKey Criteria for Evaluating Hybrid Cloud Data Protection
A strong data protection strategy remains at the core of every IT infrastructure, but cloud and edge computing have changed the…
Read More