
Browse Research
With 25+ years' experience evaluating, comparing, and recommending software, our expert analysis and verified user data combine for a uniquely trustworthy perspective on enterprise software.
IT Security
Zoho's Strategic Play: Targeting Solopreneurs With a New Suite of Solutions
Zoho Corporation, known for its self-funded and expansive business software suite, used its small business event #SMZ25 in San Antonio on September 3, 2025, as a platform to outline a new direction aimed at sole proprietors. The centerpiece of the announcements was Zoho Solo, a single application pitched as a low-cost, all-in-one entry point into the larger Zoho ecosystem. The company presented Solo as a way for micro-businesses to get started quickly while remaining on a path to scale into the broader Zoho offering.
Palo Alto Networks' Acquisition of CyberArk Forges a Unified Security Fabric for Simplified Zero Trust
In a major cybersecurity consolidation, Palo Alto Networks is acquiring CyberArk. This merger streamlines zero trust implementation, offering CIOs and CTOs a blueprint for reducing complexity and accelerating secure transformation – regardless of existing vendor ties.
Uptycs: Your Swiss Army Knife for CNAPP Solutions
As more organizations move to a cloud-first or hybrid deployment model, the protection of cloud-native applications is of the utmost importance. This tech note explores how Uptycs tackles the typically complex challenges of cloud security, providing both deep visibility and automation to safeguard cloud environments.
An Evaluation of Gurucul's Identity Security Analytics Platform
From the outset, Gurucul positioned itself as a pioneer in what would later be known as user and entity behavior analytics (UEBA). This early focus allowed Gurucul to develop specialized solutions for identity-related security challenges long before those solutions became industry standards.
SMBs and Cybersecurity: Finding the Right Help
Small and medium enterprises are worried about being attacked, but they underestimate the costs. A survey by Nationwide shows 69% of SMBs worry about cyberattacks, with average claims between $18,000-$21,000 and recovery taking up to 75 days (about two and a half months). This matters because the financial and operational impacts of such attacks can be devastating, potentially crippling a business if not properly addressed.
AKA Identity: Revolutionizing Identity Management With Intelligent Data-Driven Insights
For many cybersecurity leaders, identity governance remains a critical yet challenging area. Traditional solutions are complex, costly, and prone to fail. Meet AKA Identity, a company that promises a fresh approach to these problems through advanced data integration, AI, and analytics.
Delinea’s Identity Security Platform: A Deep Dive Into Privileged Access Management
Delinea’s identity security solution integrates privileged access management with other critical security components to provide a robust solution for identity and access governance. I met with the Delinea team over two analyst briefing sessions to explore their capabilities and how they address key security concerns.
Securing Digital Identities: Exploring LastPass' Features, Security, and Market Strategy
As digital threats evolve, LastPass' proactive security measures will continue to gain momentum and improve their market strategy, positioning them well to serve their diverse clientele effectively.
Hornetsecurity: Redefining Email Security With AI and Global Insights
Hornetsecurity has distinguished itself in our integrated cloud email security (ICES) quadrant with its advanced email security platform. My discussions with numerous email security vendors highlight Hornetsecurity’s standout features like its robust phishing detection, adaptive data utilization for AI enhancement, and the flexibility of their deployment models.
IRONSCALES: Revolutionizing Integrated Cloud Email Security With AI and User-Centric Design
In our email security SoftwareReviews quadrant, IRONSCALES stands out as a leader with its integrated cloud email security (ICES) solution, now often called integrated cloud workspace security (ICWS).
Zoho and NVIDIA Join Forces to Enhance AI With Tailored, Efficient Models
Zoho Corporation has announced a strategic partnership with NVIDIA to leverage the NVIDIA AI accelerated computing platform, including NVIDIA NeMo, for the development and deployment of advanced AI models within Zoho's SaaS applications. This collaboration aims to enhance AI capabilities for Zoho's extensive customer base of over 700,000 businesses worldwide.
Securing the Identity Perimeter: An In-Depth Look at SpecterOps and BloodHound Enterprise
I speak to many cybersecurity vendors, some are good, some are not memorable, but others excel. Recently, one company I briefed with stood out to me for its innovative approach to identity attack path management (iAPM): SpecterOps. Its flagship product, BloodHound Enterprise, has become an indispensable tool for organizations worldwide looking to secure their identity infrastructure against sophisticated cyber risks.
Securing the Digital Identity: The Critical Role of Proofpoint's ITDR in Modern Cybersecurity
Proofpoint's Identity Threat Detection and Response (ITDR) solution, known as Identity Threat Defense (ITD), emerges as a beacon of security, offering not just a shield but a proactive platform against identity-based threats.
Beyond Traditional IGA: Lumos Delivers Zero Trust Identity Governance for the Modern Enterprise
As cyberthreats continue to evolve, managing access to sensitive resources is a growing challenge for organizations. Lumos, a relatively new player in the identity governance and administration (IGA) space, is making waves with its innovative approach. This tech note explores how Lumos’ technology simplifies access management while bolstering security.
Savvy: A Comprehensive Solution for Shadow IT Governance and Identity Security
Savvy is an identity-first SaaS security vendor that has rapidly gained traction in the market. While the company is relatively young, its founders and core team bring decades of experience from leading identity and access management (IAM) providers such as Ping Identity, Okta, and SailPoint. This deep understanding of the IAM landscape is evident in Savvy's approach to addressing the pervasive challenges of shadow IT governance and identity security. With a growing member network of over 50,000 individuals and organizations, Savvy has established itself as a trusted advisor and provider of innovative solutions in the SaaS-identity security space.
Kaspersky Lab: Caught in the Crossfire – A Technical Look at the US Ban
Kaspersky Lab has been knee-deep in controversy surrounding its ties to the Russian government and potential national security risks. We try to understand the situation from a security analyst’s perspective, examining the capabilities of Kaspersky products, the US government's concerns, and the implications for businesses.
A Deep Dive Into Eracent: SBOM Management, Vulnerability Analysis, and Beyond
Eracent is a privately held IT asset management (ITAM), software asset management (SAM) and cybersecurity solution provider founded in 2000. Their roots trace back to AT&T, Bell Labs, and Lucent’s pre-Y2K initiatives (around 1997-2000), where a core focus was placed on IT asset discovery and protection. Eracent emphasizes their experience with extensive asset discovery during a period with significantly different internet and network connectivity compared to today and have consistently focused on ITAM and SAM solutions throughout their existence. This note features Eracent’s extension into open-source software risk mitigation though software bill of materials (SBOM) management.
Devolutions Vs. the Goliaths: How Affordability & Ease of Use Challenge the PAM Status Quo
In this tech note I take a closer look at Devolutions, a partial stack Privileged Access Management (PAM) vendor, exploring its history, market positioning, core features, and differentiating factors. Through insights gleaned from a vendor briefing and demo, I explore Devolutions’ evolution, target audience, and its strategic approach to the PAM landscape.
Beyond Legacy Systems: How Verkada's Cloud Architecture Revolutionizes Physical Security
We examine Verkada's history, market position, and core offerings, providing an expert’s perspective informed by three decades of security architecture experience.
Zoho: Simplifying Enterprise Security Through a Unified Approach
This article explores Zoho's security suite, examining the interplay between its various products and the benefits it collectively brings to enterprise security.
The Rise of Human-Centric Data Loss Prevention: A Deep Dive Into Proofpoint’s Approach
With evolving threats and regulations, traditional DLP solutions are struggling to keep pace. Proofpoint is addressing these challenges with its Information Protection platform, emphasizing a human-centric approach empowered by behavioral analytics, granular controls, and cloud capabilities.