category-report

Want to know more about a cybersecurity product or market space in an easy-to-digest report you can read in 5 minutes? These are the reports for you.

CMI #12 - Attack Surface Management (ASM) Members Public

What you don’t see can hurt you. Managing your attack surface has become increasingly important while at the same time becoming increasingly complex. This product category seeks to simplify and streamline the process of practical risk management.

Mike P
Mike P
category-report
How do you keep your data on lock?

CMI #11 - Data Loss Prevention (DLP) Members Public

Businesses run on sensitive data. Protecting and limiting the loss or misuse of that data is an ever-evolving challenge.

Mike P
Mike P
category-report

CMI #10 - Deception Technologies Members Public

The best offense is a good defense. Purposefully misleading or deceiving would-be attackers with traps and decoys is a way to have a canary in the coal mine.

Mike P
Mike P
category-report

CMI #9 - Breach & Attack Simulation Members Public

Security is point-in-time. It’s not a matter of if you get hacked, but when. Why not simulate hacking yourself to get better at attack detection and response?

Mike P
Mike P
category-report

CMI #8 - Data Access Governance Members Public

Data is the currency of business, and as trends in privacy and cybersecurity grow, it becomes increasingly important to govern access to that data.

Mike P
Mike P
category-report

CMI #7 - API Security Members Public

APIs are everywhere. They are a critical part of modern mobile, SaaS, and web applications. They make up peer-to-peer networks and are how the Internet of things (IoT) functions. Let's unpack the cybersecurity vendor and landscape around APIs.

Mike P
Mike P
category-report

CMI #6 - Endpoint Detection and Response (EDR) Members Public

Few frontiers in cybersecurity are as highly attacked and as highly defended as the computers and mobile devices we use in everyday life (like the one you’re on now). Let’s unpack the Endpoint Detection and Response (EDR) space and all it entails.

Mike P
Mike P
category-report

CMI #5 - Third-Party Security Members Public

Trust reigns supreme in business, and ensuring your company’s data is secure with your third-party vendors has never been more critical. Let’s unpack this complex topic from a product landscape perspective.

Mike P
Mike P
category-report