Gartner Blog Network

Tag: 'security' Blog Posts

from the Gartner Blog Network

Microsoft acquires CyberX: Tech Providers Pay Close Attention to Security

by Barika Pace  |  June 23, 2020

Analysis Last year, we predicted that by the end of 2023, 60% of stand-alone IoT and OT security providers would no longer exist as we know them today. Since that...

Read more »

Comments: 1

Say Hello to SASE (Secure Access Service Edge)

by Andrew Lerner  |  December 23, 2019

So by now, most networking folks know about SDWAN.  And of course, just when everyone is aware and comfortable with a technology, and it is (relatively) stable with over 25,000...

Read more »

Introducing Research - Top Emerging Technology Predictions for Technology and Service Providers (TSPs)

by Rajesh Kandaswamy  |  December 10, 2019

Emerging technologies play a large role in helping TSPs build competitive advantages, win new business, grow margins and capture a larger market share. It is vital for decision-makers at TSPs...

Read more »

Open Shares in the Trenches

by Jay Heiser  |  January 4, 2019

Today’s open sharing of sensitive files from the public cloud parallels an information warfare problem from 1916. It should remind us that security always takes a back seat when there’s...

Read more »

Emerging service providers: Be analytical with your free tier of service!

by Ted Chamberlin  |  July 10, 2018

    One of the great things we as analyst get to do at Gartner is witness the evolution of companies.  Most enjoy some degree of success; yet a handful...

Read more »

Cybersecurity Is Critical to the M&A Due Diligence Process

by Sam Olyaei  |  May 1, 2018

Another merger, another acquisition, another breach.... Organizations are exposing themselves to undue risk by overlooking cybersecurity implications during the screening and due diligence process of a M&A transaction. A few...

Read more »

New Job Alert: Virtual CISO

by Sam Olyaei  |  February 28, 2018

  Are you an Executive/IT leader/CIO with oversight for security? Do you find yourself resource constrained and reactive? Do you have any idea where your critical data lie? How about...

Read more »