Our seasoned analysts couple their industry-leading B2B research with in-depth buyer intent data for unparalleled insights about critical technology markets.
Clients trust us across their GTMs—from strategy and product development to competitive insights and content creation—because we deliver high-quality, actionable support.
Browse our extensive library of research reports, research-based content, and blogs for actionable data and expert analysis of the latest B2B technology trends, market dynamics, and business opportunities.
Our seasoned analysts couple their industry-leading B2B research with in-depth buyer intent data for unparalleled insights about critical technology markets.
Clients trust us across their GTMs—from strategy and product development to competitive insights and content creation—because we deliver high-quality, actionable support.
Browse our extensive library of research reports, research-based content, and blogs for actionable data and expert analysis of the latest B2B technology trends, market dynamics, and business opportunities.
Senior Analyst Todd Thiemann has over 20 years of experience in cybersecurity marketing and strategy. Todd helps clients understand emerging market trends, refine messaging, and distinguish themselves in the marketplace.
Todd has spent most of his career leading cybersecurity marketing and product marketing at category leaders including ReliaQuest, Arctic Wolf Networks, Vormetic (now Thales), Nok Nok Labs, and Trend Micro where he helped articulate compelling messaging and executed successful go-to-market strategies. He holds a BS from the School of Foreign Service at Georgetown University in Washington, DC and an MBA from the UCLA Anderson School of Management in Los Angeles.
A significant challenge in cybersecurity is overcoming enterprise inertia—identity and data protection solutions need to deliver change providing greater control, automation, and scale.”
Organizations continue to rely on identities that are susceptible to compromise, abuse, misuse, and theft. Risk is compounded by over-permissive, static access rights that provide little to no visibility into access trends or, most importantly, who is accessing what and how they are doing so. Despite the transformation to a dynamic, amorphous perimeter, a multitude […]