7

GigaOm Radar for Evaluating Secure Service Access – Gigaom

 2 years ago
source link: https://gigaom.com/report/gigaom-radar-report-for-evaluating-secure-service-access/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Are you looking to evaluate enterprise technologies faster? Sign up to watch GigaOm's 4-part on-demand research video series that breakdowns our research methodology and what differentiates us as a leader in emerging technology research.

Watch the Videos
Image credit: gorodenkoff
Chris Grundemann, Ivan McPhee Jun 24, 2021 (Jun 25, 2021) -- Market Radar

GigaOm Radar for Evaluating Secure Service Access v1.0

Vendor Assessment for Technology Decision Makers

Summary

Converging networking and security, secure service access (SSA) represents a significant shift in the way organizations consume network security, enabling them to replace multiple security vendors with a single, integrated platform offering full interoperability and end-to-end redundancy. Encompassing secure access service edge (SASE), zero-trust network access (ZTNA), and extended detection and response (XDR), SSA shifts the focus of security consumption from being either data center or edge-centric to being ubiquitous, with an emphasis on securing services irrespective of user identity or resources accessed. This GigaOm Radar report provides a detailed assessment of SSA solutions.

Full report available to GigaOm Subscribers.

Subscribe to GigaOm Research

Edge & Networking, Security & Risk

Related Research

Image credit: ipopba

Data is a crucial asset for modern businesses and has to be protected in the same way as any other corporate asset,…

Read More
Data Management, Security & Risk

Privileged credentials (administrator rights) are a top target for attackers from outside the organization, or even from among unhappy staff within, because…

Read More
Security & Risk
Image credit: chainatp

Security Information and Event Management (SIEM) solutions consolidate multiple security data streams under a single roof. Initially, SIEM supported early detection of…

Read More
Security, Security & Risk
Image credit: gorodenkoff

Since the inception of large-scale computing, enterprises, organizations, and service providers have protected their digital assets by securing the perimeter of their…

Read More
Cloud & Infrastructure, Edge & Networking, Security & Risk
Image credit: ra2studio

All enterprises were already using cloud computing in one way or the other when the COVID-19 pandemic suddenly accelerated the migration of…

Read More
Cloud & Infrastructure, Data Protection

The challenges facing IT decision makers when it comes to modern vulnerability management include the integration of DevOps practices and increasing complexity…

Read More
Security & Risk

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK