Frank J. Ohlhorst

About

Frank Ohlhorst is an award-winning technology journalist and IT industry analyst, with extensive experience as a business consultant, editor, author, and blogger. Frank works with both technology startups and established technology ventures, helping them to build channel programs, launch products, validate product quality, create marketing materials, author case studies, eBooks and white papers.

How DigitSec Brings Much Needed Security to Salesforce

Salesforce has experienced massive growth over the last few years and now ranks 137 on the Fortune 500. Simply put, it’s hard to ignore the impact Salesforce has had on the enterprise application market. Yet few seem to realize that there is a great deal of third-party development and customized code on the Salesforce platform, […]

How Sectigo Certificate Manager Removes the Chaos of Enterprise PKI

Organizations are relying more and more on PKI (Public Key Infrastructure) certificates to protect critical resources. While that in essence is a good thing, the management of those certificates has become a potential cybersecurity nightmare. After all, PKI certificates are used for authenticating users, servers, or devices online, meaning that they are critical for establishing […]

How ADAssessor Brings Visibility to AD Attack Surfaces

Effectively securing and protecting Active Directory (AD) is an undeniable best practice for businesses today. Especially since some 90% of the world’s enterprise organizations are using AD as their primary method for authentication and authorization. AD’s enormous market share has made it a prime target for attackers. In fact, cyberattacks on AD are so prevalent […]

How Cyglass Brings Network Defense into the “As a Service” Market

The term “As a Service” is growing in popularity among vendors, IT and cybersecurity managers. After all, if one can transform a burdensome siloed practice into a service, there are bound to be benefits to all concerned. What’s more, the concept of “As a Service” has been well proven by offerings such as SaaS (Software […]

How CrowdStorage Built an Affordable Alternative to Amazon S3

On premise data storage is a lot like closet space: one can never seem to have enough! However, the arrival of cloud-based storage solutions has changed the dynamic. More storage is just a few clicks away, making data storage today more like a long term storage facility, where you pay for the space needed and […]

How NetBeez Reveals Actionable Data for Effective Network Management

Managing networks has become more complex than ever before. Hybrid clouds, SD-WANs, off-premises solutions and the many other flavors of networking have made it almost impossible to get a full picture of network performance, activity and connectivity. Add to that the demands of the COVID-19 crisis, which has further distributed users across hundreds–if not thousands–of […]

How Simeio Removes Chaos from Identity, Access Management

The COVID-19 crisis has fueled a global shift to a remote work model, which has created myriad challenges and security concerns for enterprises. CSOs and those charged with cybersecurity are particularly concerned with the who, what, when, why and where of access. Elements that have become more complex to manage due to work-from-home policies and […]

How Lumu Illuminates the Current Threat, Compromises Landscape

Effectively battling threats requires actionable intelligence, something many organizations lack today. Typically, compromises or threats are only discovered sometime after an incident occurs, turning what should have been a defense into incident response. That lack of quick discovery potentially creates dark areas in IT, where lateral attacks, data exfiltration and other compromises can go on […]

How Atera Brings IT Management to Distributed Workforces

While the lasting impact of the COVID-19 pandemic may not be known for some time, businesses have realized that there are no certainties or guarantees that things will return back to normal. This realization impacts IT departments and staffers worldwide. Most small, medium and large enterprises had to rapidly embrace different operational mindsets, ones that […]

How Strata Brings Distributed Identity to a Multi-Cloud Enterprise

Recent cloud services compromises have demonstrated the importance of controlling identities for access to cloud-delivered services. Afterall, usurping identities has become one of the main attack vectors for cyber criminals today. However, identity information is usually stored in silos, which require management and synchronization across services, which can allow mistakes to go unnoticed and malicious […]