informa

Omdia

A Level-Set on Russia-Borne Cyber Threats
As hostilities mount between Russia and Ukraine, new and more dangerous cyberattacks are likely to develop. Pinpointing sources and motives will remain elusive, but enterprises should prepare for an escalation in cyberspace.
January 24, 2022
As hostilities mount between Russia and Ukraine, new and more dangerous cyberattacks are likely to develop. Pinpointing sources and motives will remain elusive, but enterprises should prepare for an escalation in cyberspace.
by Tanner Johnson, Principal Analyst, Data Security, Omdia
January 24, 2022
6 min read
Article
Omdia Webinar: How to Survive the Encrypted Network Traffic Apocalypse
Omdia Principal Analyst Eric Parizo discusses the changing network traffic decryption landscape amid encryption standards changes, and presents ways to maintain critical network traffic visibility.
January 12, 2022
Omdia Principal Analyst Eric Parizo discusses the changing network traffic decryption landscape amid encryption standards changes, and presents ways to maintain critical network traffic visibility.
by Eric Parizo, Principal Analyst, Omdia
January 12, 2022
1 min read
Video
5 Things to Know About Next-Generation SIEM
NG-SIEM is emerging as a cloud- and analytics-driven alternative to legacy SIEMs. Based on new research, Omdia highlights five important new insights for anyone considering a NG-SIEM purchase.
January 11, 2022
NG-SIEM is emerging as a cloud- and analytics-driven alternative to legacy SIEMs. Based on new research, Omdia highlights five important new insights for anyone considering a NG-SIEM purchase.
by Eric Parizo, Principal Analyst, Omdia
January 11, 2022
6 min read
Article
Analysis: Log4j Vulnerability Highlights the Value of Defense-in-Depth, Accurate Inventory
The early lessons from Log4j indicate that key security principles can help better handle these high-risk software supply chain security incidents if teams have proper support.
December 15, 2021
The early lessons from Log4j indicate that key security principles can help better handle these high-risk software supply chain security incidents if teams have proper support.
by Fernando Montenegro, Senior Principal Analyst, Omdia
December 15, 2021
6 min read
Article
Identity Authentication Access Market Set to Hit $28.9B in 2021
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Market forecasts, drivers, and trends are explored.
December 10, 2021
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Market forecasts, drivers, and trends are explored.
by Don Tait, Senior Analyst, Omdia
December 10, 2021
3 min read
Article
When Will a Cloud Infrastructure Heavyweight Launch a SASE?
There's been a veritable gold rush of security vendors getting into secure access service edge. Now will any of the major IaaS vendors enter the market? Rik Turner makes the case.
December 02, 2021
There's been a veritable gold rush of security vendors getting into secure access service edge. Now will any of the major IaaS vendors enter the market? Rik Turner makes the case.
by Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia
December 02, 2021
5 min read
Article
Where Is Cloud Permissions Management Headed?
Cloud permissions management emerged as a standalone cloud security technology but is quickly becoming part of a broader set of capabilities
November 03, 2021
Cloud permissions management emerged as a standalone cloud security technology but is quickly becoming part of a broader set of capabilities
by Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia
November 03, 2021
5 min read
Article
CyberArk Leads the PAM Omdia Universe
The company performed well in all solution capability categories, including analytics, secrets management, privileged delegation and elevation management, and privileged access governance.
October 07, 2021
The company performed well in all solution capability categories, including analytics, secrets management, privileged delegation and elevation management, and privileged access governance.
by Don Tait, Senior Analyst, Omdia
October 07, 2021
4 min read
Article
Research Highlights Significant Evolution in Email Security
Email security is in transition, from on-premises to the cloud, from inline to API-based, and from stand-alone to integrated into XDR. New research from Omdia highlights where the market is today, and where it is heading.
September 27, 2021
Email security is in transition, from on-premises to the cloud, from inline to API-based, and from stand-alone to integrated into XDR. New research from Omdia highlights where the market is today, and where it is heading.
by Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia
September 27, 2021
7 min read
Article
UK MoD Data Breach Shows Cybersecurity Must Protect Both People and Data
The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences.
September 22, 2021
The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences.
by Maxine Holt, Research Director, Omdia
September 22, 2021
3 min read
Article
Biden Administration Responds to Geopolitical Cyber Threats
In response to growing concerns regarding the recent uptick in large-scale, nation-state-backed ransomware attacks on critical infrastructure, the Biden administration is taking new action to tackle the evolving challenges posed by ransomware attacks.
July 23, 2021
In response to growing concerns regarding the recent uptick in large-scale, nation-state-backed ransomware attacks on critical infrastructure, the Biden administration is taking new action to tackle the evolving challenges posed by ransomware attacks.
by Tanner Johnson, Principal Analyst, Data Security, Omdia
July 23, 2021
5 min read
Article
Kaseya Hacked via Authentication Bypass
The Kaseya ransomware attack is believed to have been down to an authentication bypass. Yes, ransomware needs to be on your radar -- but good authentication practices are also imperative.
July 08, 2021
The Kaseya ransomware attack is believed to have been down to an authentication bypass. Yes, ransomware needs to be on your radar -- but good authentication practices are also imperative.
by Don Tait, Senior Analyst, Omdia
July 08, 2021
2 min read
Article
Colonial Pipeline Cyberattack Proves a Single Password Isn't Enough
Since the attack, it's been revealed that it was down to a single password. Yes, ransomware needs to be on your radar -- but a focus on credentials is vital.
June 14, 2021
Since the attack, it's been revealed that it was down to a single password. Yes, ransomware needs to be on your radar -- but a focus on credentials is vital.
by Hollie Hennessy, Senior Analyst, IoT Cybersecurity, Omdia
June 14, 2021
3 min read
Article
The Perfect Storm for PAM to Grow In
With more staff working remotely, privileged access management (or PAM) has never been more important. Market forecasts, drivers, and trends are explored.
June 04, 2021
With more staff working remotely, privileged access management (or PAM) has never been more important. Market forecasts, drivers, and trends are explored.
by Don Tait, Senior Analyst, Omdia
June 04, 2021
4 min read
Article
Verizon DBIR 2021: "Winners" No Surprise, But All-round Vigilance Essential
Verizon's Data Breach Investigations Report (DBIR) covers 2020 -- a year like no other. Phishing, ransomware, and innovation caused big problems.
May 13, 2021
Verizon's Data Breach Investigations Report (DBIR) covers 2020 -- a year like no other. Phishing, ransomware, and innovation caused big problems.
by Maxine Holt, Research Director, Omdia
May 13, 2021
5 min read
Article