Gigamon | September 28, 2022
Gigamon, the leading deep observability company, is guiding the industry forward today, bringing application and network-level intelligence together for the first time to help network, security, and cloud IT operations teams eliminate security blind spots and deliver defense in depth across their highly distributed hybrid and multi-cloud infrastructure. Leading market intelligence firm, the 650 Group, forecasts the deep observability market’s CAGR to grow over 60 percent to reach $2 billion by 2026. They predict Gigamon will take a commanding lead with 68 percent market share in the first half of 2022. Together with an expanding ecosystem of technology alliance partners, Gigamon harnesses actionable network-level intelligence that amplifies the power of cloud, security, and observability tools, ultimately empowering large organizations to achieve the transformational promise of the cloud.
A recent IDC global survey of 900 large organization IT executives and managers* revealed that 'strengthened cybersecurity posture and practices' is the number one benefit of deep observability intelligence and insights. And to overcome their concerns for security vulnerabilities, 79 percent of respondents indicate they have made good-to-excellent progress in leveraging network intelligence and performance metrics for security insights. When asked specifically where the alignment of NetOps and SecOps efforts and tools have improved security management, a strong majority of respondents cited the following: provide complete visibility into on-premises systems and cloud services, reduce false positives, improve speed and accuracy of triage, and validate remediation.
To further underscore the urgency for organizations to address security blind spots, a recent Vitreous World State of Ransomware for 2022 and Beyond survey revealed more than 95 percent of the more than one thousand global respondents, consisting of large organization IT and security executives, had experienced ransomware attacks in the past year. The research also revealed that 89 percent of global security leaders surveyed agree deep observability is an important element of cloud security with 50 percent of global CISOs/CIOs strongly agreeing with this statement.
“As a cloud-first dental support organization, we are continuously seeking new ways to fortify our security posture and equip our supported owner doctors with the latest, proven technology and highly skilled support staff, so they can focus on providing the perfect patient experience to patients with an extraordinary, differentiated care experience,” said Nemi George, vice president of IT and information security officer and IT service operations at Pacific Dental Services. “With the deep observability we gain from Gigamon, we can eliminate security blind spots at the network layer of our hybrid cloud infrastructure, deliver defense in depth, and confidently scale our operations.”
A New Frontier: Deep Observability
The Gigamon Hawk Deep Observability Pipeline harnesses actionable network-level intelligence to amplify the power of cloud, security, and observability tools, enabling IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks and lower the operational overhead associated with managing today’s highly distributed hybrid and multi-cloud infrastructure. Gigamon extends the value of these tools with real-time network intelligence derived from packets, flows and application metadata to deliver defense in depth and performance management. Gigamon has an extensive ecosystem of technology alliance partners that includes leading observability vendors Dynatrace, New Relic and Sumo Logic.
“We are proud to partner with Gigamon and integrate their network-level intelligence with the Dynatrace platform’s full-stack observability, application security, and AIOps capabilities to enable our joint customers to innovate faster and more securely,” said Bob Wambach, vice president of product marketing at Dynatrace. “Large organizations continue to embrace hybrid-cloud, multi-cloud, and cloud-native technologies as the foundation for their digital services and innovation. As a result, applications have become increasingly complex and distributed. The combination of Dynatrace and Gigamon gives customers unprecedented abilities to simplify cloud complexity. The actionable, network-level intelligence of the Gigamon deep observability pipeline provides additional network-security context to the precise answers and intelligent automation delivered by Dynatrace.”
“At Trace3 we help our customers design, move and re-architect workloads to the Cloud. One of the challenges we face is maintaining visibility into key applications regardless of cloud architecture pattern, in alignment with guidance from well-architected frameworks,” said Chris Nicholas, vice president cloud and cloud solutions group at Trace3. “Gigamon Hawk helps us deliver actionable network-level intelligence against many advanced security and observability use-cases. The built-in performance tools help us accelerate troubleshooting while lowering operational costs.”
“IT organizations are navigating an unprecedented increase in cyber threats across all vectors of their hybrid and multi-cloud infrastructure, and the underlying complexity and disparity of tools used to manage these environments introduces blind spots that can expose their organizations to risk, Gigamon is at the right place at the right time to capitalize on this high growth market and deliver more value to our customers by extending the value of tools they have already deployed and empowering them with actionable network-level intelligence for the hybrid cloud so they can run fast, stay secure, and accelerate innovation.”
Shane Buckley, president and CEO of Gigamon
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination helps IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, 9 of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide.
Wolters Kluwer | September 30, 2022
Wolters Kluwer Tax & Accounting announced that its innovative TeamMate+ suite of cloud-based expert audit solutions was recognized by the Business Intelligence Group as a global leader in cloud computing and awarded the 2022 Stratus Awards for Cloud Computing in their annual business award program. TeamMate+ was recognized as a global leader in the Software as a Service category. Through these awards, the Business Intelligence Group sought to identify the companies, products and people that are offering unique solutions and technology that will continue to lead the industry.
“We are honored to be recognized by the Business Intelligence Group for our part in the evolution of cloud solutions for the internal audit profession, TeamMate continues to help organizations redefine their risk assessment methodology to ensure they stay ahead of risk while optimizing human resources and adhering to professional standards.”
Frans Klaassen, Senior Vice President & General Manager, Wolters Kluwer TeamMate
TeamMate+ supports all phases of audit work, from overarching audit plans aligned with organizational objectives to individual project planning, which guides day-to-day work. It enhances workflow using request and tracking features to ensure appropriate data is provided and captured within the tool during audit execution. And provides reporting capabilities that allow audit teams to craft output appropriate to various audiences including audit management and stakeholders. In addition, the TeamCloud hosting provides a secure and stable environment to access a customizable TeamMate environment from the web.
Earlier this year, TeamMate achieved authorization status from the Federal Risk and Authorization Management Program (FedRAMP) for the TeamMate+ FedRAMP cloud hosting environment. Achieving authorization means that auditors within US Federal agencies can create, manage, and execute audits all while staying aligned with the Red and Yellow Book standards.
“Wolters Kluwer is at the forefront of the cloud helping to drive practical innovations in the cloud,” said Maria Jimenez, Chief Nominations Officer of Business Intelligence Group. “The cloud is now part of the fabric of our society, and we are thrilled that our volunteer judges were able to help promote all of these innovative services, organizations and executives.”
About Business Intelligence Group
The Business Intelligence Group was founded with the mission of recognizing true talent and superior performance in the business world. Unlike other industry and business award programs, business executives—those with experience and knowledgejudge the programs. The organization’s proprietary and unique scoring system selectively measures performance across multiple business domains and then rewards those companies whose achievements stand above those of their peers.
About Wolters Kluwer
Wolters Kluwer (WKL) is a global leader in professional information, software solutions, and services for the healthcare; tax and accounting; governance, risk and compliance; and legal and regulatory sectors. We help our customers make critical decisions every day by providing expert solutions that combine deep domain knowledge with advanced technology and services.
Wolters Kluwer reported 2021 annual revenues of €4.8 billion. The group serves customers in over 180 countries, maintains operations in over 40 countries, and employs approximately 19,800 people worldwide. The company is headquartered in Alphen aan den Rijn, the Netherlands.
Wolters Kluwer shares are listed on Euronext Amsterdam (WKL) and are included in the AEX and Euronext 100 indices. Wolters Kluwer has a sponsored Level 1 American Depositary Receipt (ADR) program. The ADRs are traded on the over-the-counter market in the U.S. (WTKWY).
Palo Alto Network | September 23, 2022
Open source software is a critical component of cloud-native applications, allowing developers greater speed and modularity without having to reinvent the wheel each time they code. However, as the Unit 42 Cloud Threat Report, 2H 2021 found, open source software can often contain known vulnerabilities, which can open organizations up to significant risk. Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today introduced the industry's first context-aware software composition analysis (SCA) solution to help developers safely use open source software components. The integration of SCA into Prisma® Cloud further demonstrates why Palo Alto Networks is the leading provider of cloud-native security.
Traditional SCA solutions are standalone products that can produce a large number of alerts but lack the runtime context to help fix vulnerabilities. With the addition of SCA to the Prisma Cloud platform, developers and security teams can proactively surface and prioritize known vulnerabilities that impact the application lifecycle (i.e., code, build, deploy and run). Prisma Cloud SCA delivers deep dependency detection and remediation of vulnerabilities in open source software before applications reach production. It can also help developers prioritize remediation based on software components that are already in use. These capabilities are not possible when SCA solutions are deployed as single point products.
"Developers leveraging open source software should be able to build applications with the confidence they aren't opening the organization up to risk, With the average application consisting of 75% open source components, SCA on Prisma Cloud is key to protecting the organization from code to cloud and empowering developers to build with speed."
Ankur Shah, senior vice president, Prisma Cloud, Palo Alto Networks
As a complete cloud-native application protection platform (CNAPP), Prisma Cloud is context-aware at every stage of the application lifecycle to provide a unified view of risk across organizations' cloud environments. Where current approaches to cloud security rely on siloed products that provide intermittent visibility without remediation, Prisma Cloud approaches cloud security with a comprehensive, prevention-first framework. With 188% increase in cloud incident response cases over the past three years, this shift in approach has become mandatory.
A complete code-to cloud CNAPP needs to incorporate the following five key principles in order to keep organizations safe:
Security from code to cloud — protects applications at every stage of the development lifecycle — from code, build, deploy and run.
Continuous, real time visibility — uses real-time and contextual security analysis of cloud environments to help prevent misconfigurations, vulnerabilities and threats.
Prevention-first protection — stopping attacks and defending against zero-day vulnerabilities to drive down mean time to remediation.
Choice for every cloud journey — aligning security needs with current and future cloud priorities by supporting a breadth of cloud service providers, workload architectures, continuous integration and continuous delivery (CI/CD) pipelines, integrated development environments (IDEs), and repositories with a unified platform
Cloud scale security — consistently secures applications as cloud environments scale.
In addition to SCA and to further increase the safety of cloud-native applications, Prisma Cloud introduced a software bill of materials (SBOM) among other capabilities for developers to easily maintain and reference a complete codebase inventory of every application component used across cloud environments. Implementing SCA and SBOM ensures Prisma Cloud aligns with these principles.
"Buyers looking for cloud-native security solutions need to keep the requirements of microservices security protection in mind. The 'bolted-on' and 'whack-a-mole' approaches are a thing of the past," said Frank Dickson, program vice president, Security and Trust at IDC. "Security should be embedded throughout the application development life cycle. This means that buyers need to fundamentally change their approach to security, although they need to continue to protect their run-time environments, they must also embrace solutions that embed security in the application development process, an approach referred to as 'shift left.' Shift left requires one to think less about security products and more about continuous security processes."
About Palo Alto Networks
Palo Alto Networks is the world's cybersecurity leader. We innovate to outpace cyberthreats, so organizations can embrace technology with confidence. We provide next-gen cybersecurity to thousands of customers globally, across all sectors. Our best-in-class cybersecurity platforms and services are backed by industry-leading threat intelligence and strengthened by state-of-the-art automation. Whether deploying our products to enable the Zero Trust Enterprise, responding to a security incident, or partnering to deliver better security outcomes through a world-class partner ecosystem, we're committed to helping ensure each day is safer than the one before. It's what makes us the cybersecurity partner of choice.