21 followers 3 articles/semaine
Near, Far, Wherever Your CPUs Are

Over the past two years, I’ve been making the point that near edge and far edge are utilitarian terms at best, but they fail to capture some really important architectural and delivery mechanisms for edge solutions. Some of those include as-a-service consumption versus purchasing hardware, global networks versus local deployments, or suitability for...

Tue Jun 4, 2024 17:33
The Challenge of Securing User Identities

Several businesses I’ve worked with recently have had the misfortune of being victims of cybersecurity incidents. While these incidents come in many forms, there is a common thread: they all started with a compromise of user identity. Why Identities are Targeted Identity security—whether it involves usernames and passwords, machine names, encryption...

Tue Jun 4, 2024 17:33
Could Network Modeling Replace Observability?

Over the past four years, I’ve consolidated a representative list of network observability vendors, but have not yet considered any modeling-based solutions. That changed when Forward Networks and NetBrain requested inclusion in the network observability report. These two vendors have built their products on top of a network modeling technology, and...

Tue Jun 4, 2024 17:33
On Questionnaires and Briefings: Explaining the GigaOm Policy Change

A stitch in time saves nine, they say, and so can receiving information in the right order. We at GigaOm are constantly looking to make our research processes more efficient and more effective. Vendors often tell us what it’s like to work with us—we welcome these interactions and look to address every comment (so thank you for these!). We spent a...

Tue May 21, 2024 23:58
Everything Your Parents Told You About Posture Is True! Even For Data Security

Sit up straight! Shoulders back, chest out! We all heard these wise words about the importance of physical posture growing up. For those who did sit up straight and find themselves in positions of influence when it comes to IT, they are still hearing about the importance of posture, but in this case, it’s the importance of security posture. Data security...

Sat May 18, 2024 00:45
SSE vs. SASE: Which One is Right for Your Business?

Security service edge (SSE) and secure access service edge (SASE) are designed to cater to the evolving needs of modern enterprises that are increasingly adopting cloud services and supporting remote workforces. While SASE encompasses the same security features as SSE in addition to software-defined wide area networking (SD-WAN) capabilities, both offer...

Thu May 16, 2024 00:19

Construisez votre propre fil d'actualité

Prêt à tenter le coup ?
Commencer un essai de 14 jours, aucune carte de crédit n'est requise.

Créer un compte