219 Search Results

  • 26 June 2020

    COVID-19 Update: 2020 Trends in Information Security

    The coronavirus outbreak has rapidly shifted global markets, including those related to enterprise technology, since we published our 2020 Trends report on Information Security in December 2019. This foreword serves as anupdate to our 2020 predictions in light of market changes due to COVID-19.

  • 25 June 2020

    Cloud-Native Market Monitor: Serverless

    Serverless computing has the potential to revolutionize the way applications in the cloud are developed, built and operated. The key to understanding the power of serverless is not technology " it's the economics of using what is essentially a fully managed service that can meet the exact need at every time, both at scale and down to zero. Serverless has become a real option for developers with both small and large requirements, and we firmly believe that the popularity of serverless will continue growing over the next several years, along with its impact on the industry. As a deployment model, adapting a monolithic application for serverless takes a fair bit of engineering, which means this architecture is more likely to be used for net-new development; lack of an open standard means these programs tend to be siloed within a given cloud environment, attaching customers to (and generating revenue from) other services from that provider. Given the leverage potential providers have revealed within their serverless offerings, locking in high-value customers with a lower or no-cost sticky set of services could prove an easy decision for providers to make. As a result, there is a realistic possibility that serverless functionality increasingly becomes embedded in cost of sales and transitions from a stand-alone market to an embedded feature of a broader cloud service. This report leverages 451 Research's deep knowledge of and relationships within the serverless market. Included is our market taxonomy and sector definitions, a market forecast with a scenario analysis that incorporates a range of proprietary survey data specific to the fallout of the COVID-19 pandemic and a view of the competitive landscape for each of the market sectors. Additionally, this report includes an analysis of vendor capabilities and traits.

  • 5 June 2020

    VMware grabs Lastline to tie up its security bundle

    After adding NDR capabilities to its original sandbox-centric focus, Lastline has been acquired by VMware as a complement to security capabilities that the latter has assembled over the years. Adding more network insights and malware analytics could build a more capable whole, fed by NSX and Carbon Black data.

  • 4 June 2020

    Coverage Initiation: Source Defense looks to close web app security gaps

    Credit card compromised recently? It could be due to a gap in control for modern web properties that attackers have been exploiting with formjacking tools like Magecart. As ecosystems expand, third-party trust becomes critical. Source Defense is working to help sites protect themselves from 'friends.'

  • 29 May 2020

    Zscaler rounds out its zero-trust portfolio with pickup of microsegmentation startup Edgewise Networks

    The target is complementary to Zscaler's software-defined perimeter offering, Private Access, and, in combination with the recently purchased Cloudneeti, should help round out the buyer's zero-trust portfolio. We also think part of Edgewise's appeal to Zscaler could have been in the value of its trained machine learning models.

  • 22 May 2020

    Akamai moves into web browser security with Page Integrity Manager

    Third-party scripts executed in a web browser have become vehicles for credit card skimming and other types of attacks. Akamai is countering with Page Integrity Manager, one of a few security products on the market combating malicious script activity.

  • 8 May 2020

    Red Hat's OpenShift ushers in VMs on Kubernetes, more operators

    The company unveiled its latest OpenShift 4.4 at Red Hat Virtual Summit, touting the ability to run VMs and containers on Kubernetes, a growing number of Kubernetes Operators, and other improvements.

  • 6 May 2020

    Keysight looks to improve breach assessment vision with development of Breach Defense

    The company's Breach Defense product aims to test network security defenses through targeted attacks in areas that it believes are the most prone to vulnerabilities. The process can be automated to ensure that enterprises are aware of new attacks that could affect their networks.

  • 5 May 2020

    NVIDIA acquires Cumulus Networks, strengthening its cloud-scale switching portfolio

    After closing its purchase of Mellanox in April, NVIDIA has announced its intent to buy Cumulus Networks for an undisclosed sum, adding the white-box switch vendors to its growing networking portfolio, and pushing the company to the front of the pack of the high-performance and cloud-scale networking segment.

  • 5 May 2020

    Coverage Initiation: Reservoir Labs aims to accelerate network threat hunting

    Network security continues to become more complex, with greater context required to reliably weed out unhealthy activity at ever-higher data rates. Reservoir Labs is putting advanced analytics to work with a turbocharged packaging of the Zeek sensor to create greater levels of awareness and accelerate threat hunting.