If you do not find what you are looking for try a different term or contact us.
Key Insights At Software Analyst Cyber Research, we view data security as the second major frontier in the rise of Agentic AI (behind Identity). A clear convergence is emerging between data security platforms and the systems designed to secure AI and autonomous agents. At the heart of this shift is a simple concern that’s grown more complex: how enterprises protect their sensitive data as intelligent systems take a more active role in using it. The first generation of data security (DLP, DSPM) and privacy tools focused on regulatory compliance. The next will focus on agents and autonomous environments. Today’s piece...
Actionable Summary It’s been over three months since Palo Alto Networks announced its acquisition of CyberArk, a move that drew widespread attention across the cybersecurity industry. Numerous analysts have since offered detailed perspectives on the transaction, such as “The Case For and Against Palo Alto Networks Acquiring CyberArk. The deal itself is historic. For many PANW observers, this represents a departure from Palo Alto Networks’ traditional focus on smaller, incremental acquisitions. This report does not aim to introduce new commentary, but rather to address several questions that still remain open: What does this acquisition reveal about the current state of...
Author Cole Grolmus is the founder of Strategy of Security where he writes about the business and strategy of cybersecurity. Contributors Francis Odum is the Founder/CEO of the Software Analyst Cyber Research, where he leads the firm’s research and engagement with cybersecurity leaders. CJ Gustafson is the founder of Mostly Metrics, a newsletter for CFOs and startup business operators. Netskope just became the second cybersecurity-related IPO of 2025. The company filed its S-1 on August 22, 2025 and went public 27 days later at a $7.26 billion offering valuation. The journey of Netskope is a remarkable one. The company was...
Author: Aqsa Taylor Co-author: Francis Odum Disclaimer: The purpose of this image is to provide a high-level depiction of various risk and exposure management categories, and it is not intended to rank the vendors (many of them cross categories in capabilities). It is also not all-inclusive, but rather based on the vendors we have interacted with in some capacity. Introduction Vulnerability management is not what it was in the 2000s. Factors like CVSS scores, vulnerability counts, and the number of resolved CVEs are no longer the primary standards. Today, organizations do not need reminders to scan their resources for vulnerabilities...
The EDR Advantage in the SIEM Pivot Practitioners, Today, we’re doing a deep dive into how EDR vendors are pivoting into the SIEM market. This has become an unexpected, but potentially highly successful wedge for these players to rip out legacy SIEMs. It’s something I never expected. Here is how I see it. EDR vendors are moving into SIEM because they already sit where the signal starts, on the endpoint and increasingly on cloud workloads. That vantage point gives them richer telemetry with process lineage, identity context, and device posture. When you start with higher fidelity data, correlation tends to...
Subscribe for a weekly digest on the best private technology companies.