Categories: DevOpsWallarm News

New GigaOm Report: Path to DevOps Success

This month Wallarm has partnered with GigaOm to help our DevOps customers better understand the industry landscape and strategies to address the challenges of doing things the agile way.

GigaOm’s perspective is that of the unbiased enterprise practitioner. GigaOm works directly with enterprises both inside and outside of the IT organization to apply proven research and methodologies designed to avoid pitfalls and roadblocks while balancing risk and innovation. Research methodologies include but are not limited to adoption and benchmarking surveys, use cases, interviews, ROI/TCO, market landscapes, strategic trends, and technical benchmarks. GigaOm analysts possess 20+ years of experience advising a spectrum of clients from early adopters to mainstream enterprises.

Wallarm is making the latest GigaOm report on DevOps strategy and tactics available to our readers and subscribers. The report is researched and written by GigaOm analyst Jon Collins. Jon wrote the British Computer Society’s handbook for security architects and co-authored The Technology Garden, a book offering CIOs clear advice on the six principles of sustainable IT delivery.

The report describes five areas that are fundamental to turning DevOps into a key competitive differentiator. These are: the need for customer-centricity; delivering agile best practice; connecting data and services; automating deployment and delivery; and finally, orchestrating operations infrastructure. Overheads that affect DevOps agility and can undermine the resulting benefits are what creates “Customer Friction” in each of these key areas.

While many tools exist to support DevOps, the litmus test for their effectiveness is how much friction they remove from the development pipeline, increasing efficiency without undermining governance, for example, through self-service or rules-based decisions.

Read the complete report and start applying the advice in your professional life. DOWNLOAD

Tags: Hacker News

Recent Posts

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

4 days ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

5 days ago

CISO Spotlight: Craig Riddell on Curiosity, Translation, and Why API Security is the New Business Imperative

It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his…

2 weeks ago

The Myth of “Known APIs”: Why Inventory-First Security Models Are Already Obsolete

You probably think the security mantra “you can’t protect what you don’t know about” is…

2 weeks ago

Why API Security Is No Longer an AppSec Problem – And What Security Leaders Must Do Instead

APIs are one of the most important technologies in digital business ecosystems. And yet, the…

3 weeks ago

7 Reasons to Get Certified in API Security

API security is becoming more important by the day and skilled practitioners are in high…

1 month ago