Jeff Edwards

44 Flips | 4 Magazines | 57 Followers | @JeffEdwards30lo | Editor @ Solutions Review, I cover InfoSec & Cloud Computing

Key Takeaways From Gartner's 2015 Cloud IaaS Critical Capabilities Report

Enterprise Technology analysis and research firm Gartner, Inc. has released its latest Critical Capabilities Report for Public Cloud Infrastructure …

Best Security Information & Event Management SIEM Vendors

Featured Information Security Best Practices<p>Californian SIEM and security analytics solution provider Exabeam today announced a successful Series D …

Event Planning

The Challenges of Identity Management and Federated SSO in a SaaS World

Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large.He …

Explaining the Cloud: What the Heck is PaaS Anyway?

The enterprise is in the middle of an explosion of growth in mobility and data. The old, insular model for developing “in-house” solutions is showing …

Container Control: Experts Weigh in on Docker’s Drawbacks

If you work IT and have a pulse, then you’ve heard the hype surrounding Docker and their Linux containers. Chances are you’re up to your ears in it. …

Cloud Computing IT Glossary | Top 50 Cloud Terms Defined

Foggy on your cloud jargon? We’ve got you covered. Solutions Review’s A to Z cloud computing IT glossary has definitions for 50 of the most popular …

Comparing the Cloud: Top 10 PaaS Vendors Go Head-to-Head

Over the past decade, enterprise IT has experienced an unprecedented growth in data and mobility that has left legacy on-premise solutions struggling …

Gartner 2015 Cloud Storage Magic Quadrant: Our Key Takeaways

Analysis and research firm Gartner, Inc. has released the latest iteration of its yearly report, <i>Magic Quadrant for Public Cloud Storage Services,</i> …

What's Changed: Gartner Magic Quadrant for Enterprise aPaaS

<i>Editor’s Note: The 2016 aPaaS Magic Quadrant is now out. Check out our coverage here.</i><p>Late last month, Gartner released the latest iteration of its …

Dealing with Docker: 9 Resources for Learning Linux Containers

If you work IT and have a pulse, then you’ve heard the hype surrounding Docker and their Linux containers. Chances are you’re up to your ears in it. …

What's Changed: Gartner's 2015 Cloud Infrastructure IaaS Magic Quadrant

Gartner’s Magic Quadrant placements, 2015 vs. 2014<p>On Tuesday night, IT research and analysis firm Gartner released the latest iteration of the highly …

Best Security Information & Event Management SIEM Vendors

Featured Information Security Best Practices<p>Californian SIEM and security analytics solution provider Exabeam today announced a successful Series D …

SIEM Buyer's Guide: Security Information & Event Management

<b>All New 2018 SIEM Buyer’s Guide</b><p><b>From the Editors of Solutions Review</b><p>With every successive year break a new record for data breaches, businesses can …

Top 10

Best Security Information & Event Management SIEM Vendors

Featured Information Security Best Practices<p>Californian SIEM and security analytics solution provider Exabeam today announced a successful Series D …

Event Planning

Best Security Information & Event Management SIEM Vendors

Featured Information Security Best Practices<p>Californian SIEM and security analytics solution provider Exabeam today announced a successful Series D …

Event Planning

Best Security Information & Event Management SIEM Vendors

Featured Information Security Best Practices<p>Californian SIEM and security analytics solution provider Exabeam today announced a successful Series D …

Best Security Information & Event Management SIEM Vendors

Featured Information Security Best Practices<p>Californian SIEM and security analytics solution provider Exabeam today announced a successful Series D …

Event Planning

Best Security Information & Event Management SIEM Vendors

Featured Information Security Best Practices<p>Californian SIEM and security analytics solution provider Exabeam today announced a successful Series D …

Event Planning

Best Security Information & Event Management SIEM Vendors

Featured Information Security Best Practices<p>Californian SIEM and security analytics solution provider Exabeam today announced a successful Series D …

Event Planning

Best Security Information & Event Management SIEM Vendors

Featured Information Security Best Practices<p>Californian SIEM and security analytics solution provider Exabeam today announced a successful Series D …

Best Security Information & Event Management SIEM Vendors

Featured Information Security Best Practices<p>Californian SIEM and security analytics solution provider Exabeam today announced a successful Series D …

Event Planning

Best Security Information & Event Management SIEM Vendors

Featured Information Security Best Practices<p>Californian SIEM and security analytics solution provider Exabeam today announced a successful Series D …

Event Planning

Best Security Information & Event Management SIEM Vendors

Featured Information Security Best Practices<p>Californian SIEM and security analytics solution provider Exabeam today announced a successful Series D …

Event Planning

Identity Management Glossary of Terms

Having a hard time keeping up with Identity Management jargon? We’ve got you covered. Solutions Review’s A to Z Identity Management glossary has …

12 Identity Management Books Every IAM Pro Should Read

Identity management is a fundamental part of organizational information security, yet too many businesses still rely on username and password …

What’s Changed: Gartner Magic Quadrant for Identity Governance and Administration IGA

<i>Editor’s Note: The 2016 IGA Magic Quadrant is now out, check out our coverage here.</i><p>Gartner has released the latest version of its Magic Quadrant for …

What’s Changed: Gartner’s 2015 Identity and Access Management as a Service (IDaaS) Magic Quadrant

Editor’s Note: The 2016 IDaaS Magic Quadrant is out and available here.<p>Analyst house Gartner has released the latest iteration of its annual Identity …

Top Identity & Access Management Software, Vendors, Products, Solutions, & Services

Identity and identity security are taking greater and greater prominence in cybersecurity. It was one of the most discussed and debated …<p>In part 1 of …

Forrester: Passwords are Here to Stay, Here’s How to Deal With It

Passwords, with all of their issues and rumored replacements, are here to stay—at least for the time being—according to a new research report from …

Forrester Report: The New CIAM Market Landscape

Is your company using traditional, employee-facing Identity and Access Management (IAM) solutions to manage customer identity? If so, your approach …