Latest Research


This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-703-340-1171 (International)

Browse Research

With 25+ years' experience evaluating, comparing, and recommending software, our expert analysis and verified user data combine for a uniquely trustworthy perspective on enterprise software.

IT Security

Zoho's Strategic Play: Targeting Solopreneurs With a New Suite of Solutions

​Zoho Corporation, known for its self-funded and expansive business software suite, used its small business event #SMZ25 in San Antonio on September 3, 2025, as a platform to outline a new direction aimed at sole proprietors. The centerpiece of the announcements was Zoho Solo, a single application pitched as a low-cost, all-in-one entry point into the larger Zoho ecosystem. The company presented Solo as a way for micro-businesses to get started quickly while remaining on a path to scale into the broader Zoho offering.

Securing the Identity Perimeter: An In-Depth Look at SpecterOps and BloodHound Enterprise

I speak to many cybersecurity vendors, some are good, some are not memorable, but others excel. Recently, one company I briefed with stood out to me for its innovative approach to identity attack path management (iAPM): SpecterOps. Its flagship product, BloodHound Enterprise, has become an indispensable tool for organizations worldwide looking to secure their identity infrastructure against sophisticated cyber risks.

Savvy: A Comprehensive Solution for Shadow IT Governance and Identity Security

Savvy is an identity-first SaaS security vendor that has rapidly gained traction in the market. While the company is relatively young, its founders and core team bring decades of experience from leading identity and access management (IAM) providers such as Ping Identity, Okta, and SailPoint. This deep understanding of the IAM landscape is evident in Savvy's approach to addressing the pervasive challenges of shadow IT governance and identity security. With a growing member network of over 50,000 individuals and organizations, Savvy has established itself as a trusted advisor and provider of innovative solutions in the SaaS-identity security space.

A Deep Dive Into Eracent: SBOM Management, Vulnerability Analysis, and Beyond

Eracent is a privately held IT asset management (ITAM), software asset management (SAM) and cybersecurity solution provider founded in 2000. Their roots trace back to AT&T, Bell Labs, and Lucent’s pre-Y2K initiatives (around 1997-2000), where a core focus was placed on IT asset discovery and protection. Eracent emphasizes their experience with extensive asset discovery during a period with significantly different internet and network connectivity compared to today and have consistently focused on ITAM and SAM solutions throughout their existence. This note features Eracent’s extension into open-source software risk mitigation though software bill of materials (SBOM) management.

Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171