Prediction for 2025: Cyber Asset Attack Surface Management (CAASM) Will Make a Breakthrough by 2027
NEW
Cyber asset attack surface management (CAASM) is a method for effectively managing and securing the attack surface of a company’s IT resources. The attack surface...
Analyst:
Wolfgang Schwab
Published:Nov 14, 2024
Blog post
Micro-segmentation – How organizations can reduce the attack surface to secure their business
FREE
COVID-19 marked a global increase in demand for digital workplace solutions. A development that placed CISO’s and cybersecurity professionals in the spotlight as enterprises pushed them...
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.
Contents:
General Information
Key Offerings in Cyber Security
Background...
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.
Contents:
General Information
Key Offerings in Cyber Security
Background...
The Cybersecurity vendor profiles portray leading cybersecurity providers, analyzing their strategies and portfolios.
Analyst:
Kristina Mikhnevich
Published:Mar 07, 2024
Market reports
Expert View: Behavioral Analytics in Cyber Security
Behavioral analytics seems to be gaining awareness among user organizations, and many software providers are adjusting their offerings accordingly. What has triggered this growing attention...
Analyst:
Kristina Mikhnevich
Published:Nov 04, 2021
Blog post
Vendor Consolidation in the Cyber Security Market
FREE
Vendor consolidation in cyber security will be an essential trend in the market for the next few years. The reasons for this include cost constraints...
Analyst:
Wolfgang Schwab
Published:May 04, 2023
Market reports
How to Do Breach and Attack Simulations – Red, Blue, and Purple Teams - InBrief Analysis - Worldwide
Currently, many organizations are failing to detect sophisticated attacks because of ineffective security controls, gaps in their cybersecurity defenses and inherent software or systems insecurities...
Analyst:
Kristina Mikhnevich
Published:May 16, 2022
Blog post
Cyber Security Service Provider Landscape in Europe
FREE
The cyber security market is highly dynamic. This is true from a technology perspective and a demand perspective. User organizations are implementing their digital strategies...
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.
Contents:
General Information
Key Offerings in Cyber Security
Background...
Analyst:
Kristina Mikhnevich
Published:Jul 06, 2022
Market reports
Expert View: Vendor Consolidation in the Cyber Security Market
Cost constraints, talent availability, and reactivity to threats are driving the need to consolidate companies’ cyber security. By focusing on best-of-suite solutions, vendor...
Analyst:
Wolfgang Schwab
Published:Mar 30, 2023
Market reports
Cyber Security for Hybrid Multi-Clouds - InBrief Analysis - Worldwide
Hybrid multi-cloud infrastructures are the norm. They are becoming increasingly complex, and companies face the challenge of selecting and deploying appropriate cyber protection. The...
Analyst:
Aline Trautmann
Published:Jul 18, 2022
Market reports
Cyber Security Service Provider Landscape in France - InBrief Analysis
The cyber security service provider landscape in France consists of 89 providers which fall into the following categories: security services; security consulting and system integration; telcos;...
Analyst:
Kristina Mikhnevich
Published:Feb 18, 2022
Whitepaper & Trend Studies
Whitepaper: Next-generation Cyber Defense Center – AreYou Ready?
FREE
This whitepaper attempts to examine and elucidate the fundamental aspects that need to be considered in order to secure an organization robustly and mitigate all...
Analyst:
Wolfgang Schwab
Published:Sep 20, 2021
Blog post
SASE: a new class of cyber security solution
FREE
Much time and investment are pouring into innovations in the enterprise security space. One evolving proposition is Secure Access Service Edge, a new style of...
Analyst:
Wolfgang Schwab
Published:Mar 12, 2021
Blog post
Ransomware Attack on Blue Yonder: A Wake-Up Call for Retail Supply Chain Cybersecurity
NEW
FREE
Analyst:
Jennifer Jonat
Published:Dec 05, 2024
Market reports
Building a Solid Cyber Security Strategy - InBrief Analysis - Worldwide
The purpose of this document is to provide companies with a step-by-step guide to developing their own pragmatic, business-specific, and agile cyber...
Analyst:
Kristina Mikhnevich, Wolfgang Schwab
Published:Aug 13, 2021
Market reports
Expert View: The Contribution of RPA to Cyber Security
In a similar way to the integration of artificial intelligence (AI) technologies into cyber security solutions, robotic process automation (RPA) is another technology starting to...
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.
Contents:
General Information
Key Offerings in Cyber Security
Background...
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.
Contents:
General Information
Key Offerings in Cyber Security
Background...