Identity, Authentication, and Access Market Database: 1H20 Update
The IAA Database is part of Omdia's new Identity, Authentication, and Access Intelligence Service. This database offers revenue figures for 2018 and 2019. It is segmented by the authentication and on-premises IAM/IDaaS categories, as well as by five global regions.
2021 Trends to Watch: IoT Cybersecurity
The IoT cybersecurity ecosystem has evolved out of the critical necessity to successfully discover, manage, and secure a growing variety of internet connected devices. Now, the new challenge is the growing volume of data created, shared, and transmitted by these devices.
Omdia Market Radar: Outbound Email Security
Omdia profiles four vendors of outbound email security, focusing on building in controls to offset risks from insider threats, i.e., scenarios in which sensitive, confidential, or the wrong information is sent to the wrong recipients.
On the Radar: PortSys Offers a Zero-Trust Access Platform
This report examines PortSys's zero-trust access technology and considers how it can replace traditional VPNs for remote access or complement an existing VPN infrastructure to enable gradual migration to the new remote access paradigm.
Fundamentals of Data Security Strategy
Because of the criticality of comprehensive data security, stakeholders must take concerted, ongoing action to build and support the critical business and technical functions that support sound data security.
Arista Buys Awake Security for an XDR Play
This acquisition positions networking vendor Arista to compete in the emerging XDR market, in which detection and response span multiple areas of corporate infrastructure.
Fundamentals of Outbound Email Security
Outbound email security focuses on building in controls to offset identified risks from various insider threat scenarios, many of which have received little attention from defenders to date.
AWS Security Tools for Its IaaS and PaaS Environments
AWS has been providing cloud computing services for over a decade and remains the clear leader in the IaaS market. Over that time, it has expanded and enhanced the security capabilities of its platform and services.
It's Time to Address Cybersecurity Complexity
Overlapping layers of security controls and technologies have deluged enterprises with security complexity. There are four steps that organizations can take to help reduce the complexity.
Fundamentals of Identity as a Service (IDaaS)
With cloud-based identity's speed, scalability, and cost advantages, on-premises products now fall squarely in the category of legacy technology, regardless of enterprise IT infrastructure.
Wake Up to Cyber-Espionage
Cyber-espionage has hit the headlines, with APT29 accused of attempting to steal COVID-19 vaccine development information. Organizations in all sectors should not be surprised that cyber-espionage is real and must be addressed.
A New Opportunity to Break the 'Rule of Steve'
To build the workforce, diversity must be encouraged: more women, more ethnic diversity, more neurodiversity. That requires more people from a range of groups who have the aptitude and attitude to work in cybersecurity.
DDoS Prevention Appliances Market Tracker - Update H1 2020
The updated DDoS Prevention Appliances Market Tracker provides accurate data -- including market size, vendor market share, forecasts, and market trends -- to help clients make better business decisions in the DDoS appliances market.
Threat Mitigation Products Market Database - Q1 2020
The latest data-only market tracker, providing a total view of the cybersecurity technology market by combining the data from three segments: Content Security Gateway Appliances, Network Security Appliances, and DDoS Prevention Appliances.
|