Frank J. Ohlhorst

About

Frank Ohlhorst is an award-winning technology journalist and IT industry analyst, with extensive experience as a business consultant, editor, author, and blogger. Frank works with both technology startups and established technology ventures, helping them to build channel programs, launch products, validate product quality, create marketing materials, author case studies, eBooks and white papers.

How Catchpoint Brings Employee-Experience Monitoring to the Enterprise

There is an old business axiom, one that states “if you can’t measure it, you can’t manage it,” a statement that proves very relevant to the challenges facing IT today. Perhaps one of the most important measurements for enterprises moving to the cloud is one of calculating how well cloud-enabled applications are running. This is […]

How Ermetic Tackles Public Cloud Risks by Securing Identities, Entitlements

The global pandemic has forced many businesses to turn to the public cloud and its ability to support a remote and distributed workforce. However, moving to the cloud has exposed companies to compromises and cyberattacks against which most of them were unprepared to defend. Many of those problems can be attributed to one of the […]

How Data Theorem Brings Full-Stack Security to Multi-Platform Web Apps

Many enterprises are going through the throws of digital transformation to expedite their movement into the cloud. However, with transformation comes challenges, namely in the form of reengineering applications that are not only efficient, but also secure. Palo Alto-based Data Theorem aims to proactively secure enterprise applications with its suite of products that potentially redefine […]

How Sectigo Web Security Brings Unified Protection to Web-Facing SMBs

Cybersecurity is becoming something that everybody needs but no one wants to be responsible for. Nowhere is this more true than in the world of micro, small and medium businesses, where CISOs (chief information security officers) are a rarity and budgets are constrained, yet threats are on the rise. What’s more, the current Covid19 crisis […]

How ClearSkye IGA Takes the Pain Out of Identity Governance

Enterprises are starting to recognize the importance of properly managing the lifecycle of identities, yet recognition alone is not the basis for solving identity governance challenges. Challenges have been amplified by numerous factors, such as adopting cloud services, meeting compliance requirements and enforcing security policy, while also supporting a mobile or remote workforce.  Perhaps the […]

How RangeForce Brings Management, Measurement to Enterprise IT Training

A recent Forbes Insights survey of more than 200 CISOs found that talent and training constraints have a significant impact on security organizations. An observation that many enterprise IT leaders have started to agree with and extends beyond the realm of cybersecurity into other areas, such as DevOps, IT support, digital transformation, network management and […]

How Attivo Networks Strengthens Active Directory Defense

How can an enterprise today more effectively protect AD (Active Directory)? This is a relevant question for those managing network security. Research giant Forrester noted, “Having a strong control of privileges in an ever-evolving company is critical and one of the challenges that every CISO must tackle.” Even so, Forrester stated that “100% of corporations […]

How NeuShield Mitigates the Bite of Ransomware

Ransomware has become the scourge of many businesses and is likely not to disappear as a threat anytime soon. If anything, ransomware is on the rise, as evidenced by the Cybersecurity and Infrastructure Security Agency (CISA), which has observed an increase in ransomware attacks across the world so far this year. That proves to be […]

How SecureLink Eliminates Remote Access Security Woes

The COVID-19 pandemic has driven the remote access market to new heights. More and more enterprises are seeking secure ways to support remote contractors, temporary workers and other partners. However, most are finding that traditional VPN technology may not be up to the job of offering the security, performance and granular control needed. Simply put, […]

How Cato Networks Builds Secure SD-WANs with SASE

Enterprises are adopting SD-WAN (software-defined wide-area network) technology as a means to reduce costs, advance digital transformation, improve network resilience and move away from legacy network connectivity offerings, such as MPLS. [Editor’s note: Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that directs data from one node to the next based on […]