GigaOm’s comprehensive 2021 Radar Report for SOAR reveals the leading SOAR vendors in different categories. The report is based on key criteria and relevant evaluation metrics that identify the vendors that excel based on their products, technical feature set, innovation efforts, and forward-thinking capabilities.
As usual the Monitorama talk selection team did a bang-up job. Every talk was interesting, but a few jumped out at me for some very specific reasons. I’ll broadly categorize these as the best talks (talks that gave me hope and inspiration), the worst talks (talks that terrified or depressed me), and the beautiful talks (talks that captured something beautiful).
While the world is largely returning to a semblance of comfort with larger public events, COVID is still a real and present threat, something we keep in the backs of our minds all the time. But having a sense of community is also important and so, we weigh the risks — go another year without collaboration and connection — or take sensible precautions, cross our fingers, and accept the risks of a large indoor gathering?
What is the tipping point between “cloud-native-like” and “truly cloud-native?” Is it simply adopting new practices, processes, and technologies like containers or serverless? How do you empower your teams to take advantage of the unique features of cloud computing to power more reliable systems, reduce cost, and accelerate innovation?
This webinar draws on bespoke Computing research to uncover cyber security decision-maker plans and opinions around the use of SIEM. We reveal the extent to which organisations are under strain from cyber security threats and the related challenges they are facing, the capacity of SIEM solutions to alleviate these, and share real world data to highlight the extent to which SIEM’s promise is born out in reality.
Many of today’s organisations are already seeing the impact Artificial Intelligence (AI) can have in helping protect them from cybersecurity threats. In a Security Operations Centre (SOC), which continually monitors and analyses an organisation’s security posture, automating certain activities can help optimise, augment and speed up threat detection and resolution.