Our Insights
What We Provide
Farallon Technology Group provides in-depth technology research and advisory services for embedded and edge cybersecurity. Traditional advisory and technology research firms that focus on a broad portfolio of technologies typically provide coverage that is a mile wide and an inch deep. This type of research is both expensive and impractical, causing enterprises to conduct their own time-consuming research.
In-Depth Technical Coverage
Our reports are never generic. We cover technology and vendor capabilities, implementation and management.
Affordable
We believe that great research should be made broadly available at a fair price for the actual users of technologies.
Easy to Access
Simply buy our research online with no expensive subscriptions or complex approvals.
Our Research Coverage Areas
We specialize in advanced cybersecurity technologies for embedded systems and the edge, including hardware, software and services. These new technologies aim to improve safety and security, improve performance and availability, accelerate time to market, and enable differentiation through a fundamentally different use of technology and shift in economics.
Embedded Cybersecurity
- Secure Hardware
- Cryptographic Engines
- PKI Management
- Encryption Key Management
- Digital Certificate Services
- IoT Security
OT Cybersecurity
- Asset Management
- Monitoring and Threat Detection
- Protection
- Device Security Management
Edge Cybersecurity
- Identity and Access Managment
- Secrets Vaults
- Container Security
- CI/CD Pipeline Security
- Hyperconverged Infrastructure (HCI) Security
- Software Analysis
- Code Signing
Request Research
Explore our research. Go ahead, it’s easy and comes with a 100% satisfaction guarantee.
Market Landscape Reports
Review of the market, trends and drivers, leading vendors, and considerations for readiness and vendor evaluation.
Technology Sector Reports
In-depth technical review of the sector and its leading vendors. Includes comparisons of capabilities, use cases, implementation, and management.
Vendor Profiles
In-depth technical review of a vendor, including a description of their capabilities, typical use cases, implementation, and management.
Request Coverage
If your company falls into our coverage areas, please contact us to request coverage of your company. One of our analysts will contact you to setup a briefing.
Vendor Coverage
Accenture
AMD
Aporeto
Aqua
Arm
Armis
AWS
Axonius
Azure
Bayshore Networks
Blackberry QNX
BICS
Circle CI
Cisco
Claroty
Cradlepoint
Cryptsoft
CyberX
Dell
Device Authority
Diamanti
Digi
Digicert
Docker
EdgeWorx
Entrust Datacard
Fornetix
Fortanix
Fortinet
FreeRTOS
Futurexf
G+D
GE Digital
Gemalto
GlobalSign
Google
Hashicorp
Hitachi
HP
Hytrust
IBM
IDEMIA
Iotium
Indegy
Infineon
Intel
ISS
Keyfator
KORE
Kubernetes
Linux
LogDNA
Microsoft
Mirantis
Mocana
MSI
Multitech
NimbleLink
Neuvector
Nozomi
NTT Ltd
Nutanix
Nuvoton
NXP
OpenSSL
Owl Cyber Defense
Palo Alto Networks
PAS Global
Pixeom
PTC
Quectel
Red Hat
RSA BSAFE
SCADAfence
Scyte
Sequans
Sectigo
Sercom
Snyk
Software AG
Sphere OS
STMicroelectronics
Strongkey
Telit
Tenable
Thales
ThreadX
Townsend Security
Turbot
Twistlock
u-blox
Ultra Electronics
Utimaco
Veracode
Venafi
Vormetric
Vmware
VxWorks
Waterfall
WolfSSL
Xage