Research Notes

Research Note: Nutanix & Pure Storage Partnership

At the recent Nutanix .NEXT event, Pure Storage and Nutanix announced a collaboration to deliver a jointly certified solution combining Nutanix Cloud Infrastructure with Pure Storage FlashArray over NVMe/TCP.

The alliance targets enterprise customers seeking alternatives to traditional virtualization stacks, particularly VMware deployments.

Read More »

Research Note: IBM Orchestrate for Enterprise Agentic AI

At IBM Think 2025 in Boston, IBM announced its new watsonx Orchestrate, catching the shift that sees enterprise AI moving beyond simple model deployment toward agent orchestration.

The platform enables organizations to build, deploy, and manage AI agents across enterprise environments with minimal technical expertise required.

Read More »

Research Note: CrowdStrike’s Falcon Adversary OverWatch

CrowdStrike expanded its threat-hunting capabilities, introducing its new Falcon Adversary OverWatch Next-Gen SIEM, extending visibility beyond endpoints to third-party data sources.

The new solution uses managed threat hunting to uncover threats in their early stages using available third-party SIEM data from network edge devices, identity and access management tools, SaaS applications, and email security tools.

Read More »

Research Note: Palo Alto Networks Prisma AIRS for AI Protection

At RSAC 2025, Palo Alto Networks launched its new Prisma AIRS (AI Security), a comprehensive security platform targeting threats across enterprise AI ecosystems. Building upon their “Secure AI by Design” portfolio introduced last year, Prisma AIRS addresses emerging security challenges posed by the proliferation of AI applications, agents, and models.

Read More »

Research Note: Palo Alto Networks Cortex XSIAM 3.0

Palo Alto Networks recently released Cortex XSIAM 3.0, expanding its security operations platform with proactive exposure management and advanced email security capabilities. The update shifts the platform’s focus from primarily reactive to proactive security measures.

Read More »