As an analyst at G2, Aaron’s research is focused on cloud, application, and network security technologies. As the cybersecurity market continues to explode, Aaron maintains the growing market on G2.com, adding 90+ categories of security technology (and emerging technologies that are added regularly). His exposure to both security vendors and data from security buyers provides a unique perspective that fuels G2’s research reports and content, including pieces focused on trends, market analysis, and acquisitions. In his free time, Aaron enjoys film photography, graphic design, and lizards.
Risk-based authentication software (RBA), sometimes called adaptive authentication, is an...
Data has become one of the most valuable commodities in the world.
IT security innovation aims to stay one step ahead of hackers, malware technology and other...
Small but mighty, the Twin Cities are shaping up to be a one-two tech punch.
Our neighbors to the north have gifted the earth wonderful things like curling and poutine.
Docker, a noted container platform, has become enormously popular over the last few years, but...
Container tools are popping into company stacks, or lists of software used at a company, all...
As a concept, encryption is a bit mysterious, but it's becoming necessary in today’s tumultuous...
Database software tools power just about every application you can think of.