Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Encrypted Traffic Strategies
Webinar: Best practices for enterprise net traffic
Omdia's On-Demand Webinars
Omdia's On-Demand Cybersecurity Webinars
What's next for DC firewalls?
Webinar: Net security for software-defined DCs
News & Commentary
On International Women's Day 2021, Does the 'Rule of Steve' Still Apply? Yes.
Maxine Holt, Research Director, OmdiaCommentary
On International Women's Day 2021, gender diversity has improved in cybersecurity, but there is still a long way to go.
By Maxine Holt Research Director, Omdia, 3/5/2021
Comment0 comments  |  Read  |  Post a Comment
Data Security Accountability in an Age of Regular Breaches
Tanner Johnson, Senior Analyst, Connectivity & IoT, OMDIACommentary
As the number of vendors impacted by supply chain breaches grows, one constant question remains: Where exactly does accountability for data security lie, and what part do end users play in their own data breach protection?
By Tanner Johnson Senior Analyst, Connectivity & IoT, OMDIA, 2/18/2021
Comment1 Comment  |  Read  |  Post a Comment
Data Privacy Day 2021: Pandemic Response Data Must Align with Data Privacy Rules
Maxine Holt, Research Director, OmdiaCommentary
Amid a pandemic, Data Privacy Day this year brings forth expanded responsibilities for organizations in the response to COVID-19.
By Maxine Holt Research Director, Omdia, 1/28/2021
Comment1 Comment  |  Read  |  Post a Comment
Bringing Zero Trust to Secure Remote Access
Rik Turner, Principal Analyst, Infrastructure Solutions, OmdiaCommentary
Demand for secure remote access has skyrocketed during the pandemic. Here Omdia profiles more secure alternatives to virtual private network (VPN) technology.
By Rik Turner Principal Analyst, Infrastructure Solutions, Omdia, 1/12/2021
Comment0 comments  |  Read  |  Post a Comment
SolarWinds Hack Lessons Learned: Finding the Next Supply Chain Attack
Eric Parizo, Senior Analyst, OmdiaCommentary
The SolarWinds supply chain compromise won't be the last of its kind. Vendors and enterprises alike must learn and refine their detection efforts to find the next such attack.
By Eric Parizo Senior Analyst, Omdia, 1/11/2021
Comment0 comments  |  Read  |  Post a Comment
More News
Omdia Subscriber Research
On the Radar: Twingate Offers an Easy-to-Use Zero-Trust Access Service
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia
Twingate is a developer of zero-trust access (ZTA) technology, which delivers remote access in a more secure fashion than virtual private networks (VPNs). It delivers its technology as a service. As a fully managed SaaS product with multiple product tiers and price points to suit customers needs, Twingate will be a strong option for companies looking to simplify their remote access experience.
By Rik Turner Principal Analyst, Infrastructure Solutions, Omdia, 2/11/2021
Log In to Access Report
Fortinet's FortiXDR Challenges Rivals with Automated Investigation and Response
Eric Parizo, Senior Analyst, Omdia
Fortinet, per its style, is not among the first vendors to enter the enterprise Extended Detection and Response (XDR) product segment, but the debut iteration of FortiXDR is based on proven technology that pushes the envelope on threat detection and response automation. FortiXDR immediately pressures top-tier XDR competitors, whose solutions can be complicated to deploy and offer less automation.
By Eric Parizo Senior Analyst, Omdia, 2/4/2021
Log In to Access Report
On the Radar: IBM Security SOAR Breach Response Enables Data Breach Response
Maxine Holt, Research Director, Omdia
Data privacy is a bigger issue than ever, with hundreds of varying regulations around the globe dictating the use of personally identifiable information (PII). The IBM Security security orchestration, automation, and response (SOAR) Breach Response offering helps facilitate a coordinated response across the organization by leveraging case management, automation of manual tasks, and incident response playbooks, which can incorporate a raft of regulations from different countries and regions as part of the response.
By Maxine Holt Research Director, Omdia, 2/4/2021
Log In to Access Report
Googles BeyondCorp Enterprise is a ZTA Service Using the Chrome Browser
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia
Google has announced an Enterprise version of its BeyondCorp implementation of zero-trust access (ZTA) technology for secure remote access. The novelty is that it has obviated the need for software agents on end-user devices by using the Chrome browser as its source of endpoint data. With BeyondCorp Enterprise, Google is expanding its offering to any company accessing applications in any location (on the companys premises or in any cloud) and thus becomes a fully fledged competitor in the ZTA market.
By Rik Turner Principal Analyst, Infrastructure Solutions, Omdia, 2/1/2021
Log In to Access Report
On the Radar: Keyavi Data Corp. Makes Data Intelligent, Helping it Secure Itself
Tanner Johnson, Senior Analyst, Connectivity & IoT, OMDIA
Keyavi Data seeks to grant data intelligent, self-protecting, and self-awareness capabilities that ultimately help make the native security of the data itself more robust. As a result of the growing challenges that remain in place for information protection, Omdia projects that investment in data security solutions will see significant growth in the near term. The consistent demand for fluid data protection presents a welcoming market to vendors such as Keyavi.
By Tanner Johnson Senior Analyst, Connectivity & IoT, OMDIA, 1/29/2021
Log In to Access Report
On the Radar: SecureAge Delivers File-level Encryption on the Endpoint
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia
SecureAge Technology is a Singapore-based cybersecurity company with a product portfolio that spans data, endpoint, and network security. Omdia sees an opportunity for smaller vendors like SecureAge, who are not yet household names, to prosper with products that are differentiated by the strength of their security offering, its ease of use, and its manageability.
By Rik Turner Principal Analyst, Infrastructure Solutions, Omdia, 1/29/2021
Log In to Access Report
On the Radar: Sonrai Security Delivers Cloud Permissions Management
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia
Sonrai Security offers a cloud permissions management (CPM) platform that surveys the access entitlements across a companys cloud data stores, recommends where they should be curtailed, and takes remedial action either through escalations or in an automated fashion if the customer so desires. Omdia was impressed with Sonrai Digs simplicity of deployment and with Sonrais straightforward charging mechanism.
By Rik Turner Principal Analyst, Infrastructure Solutions, Omdia, 1/21/2021
Log In to Access Report
Enterprise Case Study: Innovation and Rapid Response to COVID-19 using ServiceNow Now Platform
Maxine Holt, Research Director, Omdia
CDL was one of the few companies that had pandemic planning in its business continuity plans. The company had already put capabilities in place to enable remote working well in advance of COVID-19, and these plans, alongside ServiceNows Now Platform, has enabled CDL to continue delivering strong customer service as well as continuing to build on the Now Platform for its future development throughout 2020.
By Maxine Holt Research Director, Omdia, 1/19/2021
Log In to Access Report
Cloud and Security are Hot in 2021, but Cloud Security is Incandescent
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia
Lacework raises an impressive $525 million in a funding round, while Red Hat spends an undisclosed amount on container security vendor StackRox, with a particular focus on Kubernetes (K8s) security, and F5 splashes out $500 million for edge app platform start-up Volterra. All these developments in the first week of 2021 put cloud and security front and center for the coming year, but also show that the place where these two trends intersect (i.e., cloud security), is at the epicenter of investment priorities for this year.
By Rik Turner Principal Analyst, Infrastructure Solutions, Omdia, 1/15/2021
Log In to Access Report
On the Radar: Ermetic Uses Identity to Limit Permissions in the Cloud
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia
Ermetic provides security for data stores, databases, and some compute instances in the infrastructure- and platform-as-a-service (IaaS and PaaS) delivery modes of cloud computing. It does this with a software-as-a-service (SaaS) platform that refers to a companys identity and cloud infrastructures to manage the access rights granted both to human users and systems (applications, services, etc.). Omdia calls this emerging class of technology cloud permissions management (CPM).
By Rik Turner Principal Analyst, Infrastructure Solutions, Omdia, 1/12/2021
Log In to Access Report
More Research
Twitter Feed
Analyst Quotes
Analyst Quotes Applying the necessary controls and greater rigor, without making the process so difficult or time-consuming that it gets subverted anyway by frustrated users, is a challenge that organizations will increasingly need and want to address. Analyst Quotes
Rik Turner
Fundamentals of Outbound Email Security
Log In to Access Report
Analyst Quotes IDaaS should be considered as an opportunity to streamline identity and access management and provide an enterprise-wide approach that deals with on-premises as well as cloud-based relationships. Analyst Quotes
Don Tait
Fundamentals of Identity as a Service (IDaaS)
Log In to Access Report
Analyst Quotes Hackers feed on chaos, and we're already seeing the signs that they will leverage the fear and uncertainty everyone is feeling. Analyst Quotes
Jeff Wilson
Early Insight: Impact of Coronavirus on the Cybersecurity Technology Industry
Log In to Access Report
Analyst Quotes The surge in the volume of IoT devices implemented in this market has resulted in a proportionate increase in the size of the threat landscape itself. Analyst Quotes
Tanner Johnson
Market Landscape: Industrial IoT Cybersecurity Operation and Management Solutions
Log In to Access Report
Analyst Quotes We must all take responsibility for protecting our privacy and security while doing our best to protect the privacy and security of those we work with and the organizations we work for. Analyst Quotes
Maxine Holt
Has COVID-19 Thrown the Data Privacy Rule Book Out the Window?
Log In to Access Report
Analyst Quotes Every organization using more than a handful of enterprise cybersecurity products should have a technology strategy and approach specific to integration. Analyst Quotes
Eric Parizo
Fundamentals of Security Platform Integration Frameworks
Log In to Access Report
Omdia Cybersecurity Accelerator

The Cybersecurity Accelerator is a unique research service that combines Omdia's cybersecurity market analysis and data assets into a single subscription offering, with regular updates and direct support from our team of expert analysts. Omdia, the global technology research group within Informa Tech, combines the expertise of more than 400 analysts covering 150 markets, publishing more than 3,000 research reports annually.

Current Omdia subscribers may log in to access research content highlighted on this page.

Learn how you can benefit from Omdia's research and data solutions
Learn more about Omdia's Cybersecurity Accelerator service
Omdia LinkedIn Omdia Twitter Omdia YouTube
Video from Omdia
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.