Use this feature to view the product’s related, periodically updated content, including historical items in the series.
Last Updated: 06 Mar 2023GO TO COLLECTION
Last Updated: 09 Jun 2023GO TO COLLECTION
Security Breaches Tracker: 1H23 Update – Analysis
This report provides insight into the Security Breaches Tracker to 1H23. It provides an explanation of breaches with insight across a range of industries and regions, and includes Omdia commentary on forecast breach updates.
Cybersecurity Viewpoint: Market Tracker – 2H22 Database
The Cybersecurity Viewpoint: Market Tracker presents an overview of data from the infrastructure security, IoT cybersecurity, data security, security operations, enterprise security management, and identity, authentication, access intelligence services.
Executive Summary: Fundamentals of Identity Governance Administration (IGA)
This report describes the evolution of identity governance and administration (IGA) technology and introduces the fundamental capabilities of a platform in this product category.
Executive Summary: Fundamentals of Comprehensive Extended Detection and Response
This report details the key capabilities for CXDR, and why Omdia believes it is the cybersecurity industry’s best hope to broadly empower enterprises with a unified, effective threat detection, investigation, and response solution.
Fundamentals of Cybersecurity Awareness Training and Behavior Change
Organizational appreciation of the value of cybersecurity awareness training is growing. This Executive Summary provides an overview of what cybersecurity awareness training sets out to do and the forces driving its development.
Executive Summary: Challenges and Innovations in the Enterprise Threat Detection Data Lifecycle
Threat detection data issues can be the difference between avoiding or suffering a major security incident. This document provides an executive summary of the full Omdia report, Challenges and Innovations in the Enterprise Threat Detection Data Lifecycle.
The Analyst Team
Senior Director, Cybersecurity
Managing Principal Analyst
Senior Principal Analyst
Senior Analyst, Identity, Authentication, Access
Principal Analyst, Enterprise Security Management
Senior Analyst, IoT Cybersecurity
Senior Principal Analyst, Cybersecurity
Senior Analyst, Infrastructure Security
All set! This article has been sent to email@example.com.
All fields are required. For multiple recipients, separate email addresses with a semicolon.
Please Note: Only individuals with an active subscription will be able to access the full article. All other readers will be directed to the abstract and would need to subscribe.