To contact Cabling Installation & Maintenance:

About Cabling Installation & Maintenance:

Bringing practical business and technical intelligence to today's structured cabling professionals.

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on:

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Distributed Firms Deploy New Cybersecurity Approaches

Companies with remote workers, cloud-based resources flock to access management, zero trust architectures, ISG Provider Lens® report says

Enterprises are moving beyond traditional cybersecurity architectures, adopting more flexible tools to defend increasingly distributed operations, according to a new research report published today by Information Services Group (ISG) (Nasdaq: III), a global AI-centered technology research and advisory firm.

The 2025 ISG Provider Lens® global Cybersecurity — Services and Solutions report finds use of three major types of broad-based security platforms is on the rise worldwide and constantly advancing through AI and other technologies. Identity and access management (IAM) secures cloud-based and remote work environments by rigorously authenticating users. Extended detection and response (XDR) unifies several kinds of cybersecurity tools for visibility and protection across attack surfaces, and secure service edge (SSE) applies zero trust architecture through cloud-based security functions.

“Traditional security perimeters are obsolete, so enterprises are integrating defenses throughout their digital environments,” said Doug Saylors, partner and leader of ISG Cybersecurity. “Modern approaches are gaining new capabilities that let organizations constantly adapt to evolving threats.”

A growing number of enterprises are adopting biometric authentication techniques such as facial recognition and fingerprint scanning as part of IAM, the report says. Decentralized identity systems, which use blockchain technology to allow users to control their digital identities, represent another rising IAM trend. Many companies shifting to cloud-first architectures are embracing identity as a service (IDaaS), which IAM vendors are enhancing to enable smooth integration with SaaS applications and hybrid and multicloud infrastructure.

Companies that once relied on siloed threat detection tools are turning to XDR for automation and analytics that span endpoints, identities, networks and cloud workloads, ISG says. XDR has emerged from endpoint detection and response (EDR) to become a core component of enterprise security operations. It includes proactive threat hunting, rapid containment and coordinated responses. Organizations are beginning to seek open, modular XDR architectures they can integrate into other security tools. Increasingly, they also integrate behavioral analytics for detection of insider threats based on deviations from typical user behavior.

Enterprises are also adopting zero trust principles, based on verifying every user and device before granting access, to reduce breach risks and protect sensitive data, the report says. They are implementing SSE to enforce these principles through cloud-based security functions that include continuous monitoring and verification of sessions and application-level controls that focus on protecting resources rather than networks.

The role of AI is expanding in all three emerging security approaches, ISG says. It enables IAM solutions to automatically adjust access controls based on real-time analysis of unusual user behavior. AI and ML power many detection, correlation and prioritization engines in XDR platforms, and providers are embedding AI-enabled threat detection in SSE solutions for real-time policy enforcement.

“Enterprises are recognizing that zero trust principles are crucial to securing modern, distributed operations,” said Yash Jethani, principal analyst at ISG and an author of the report. “Working with service providers and solution vendors, they are building flexible, identity-centric approaches that will allow them to adapt to new threats and requirements.”

The report also explores other global cybersecurity technology trends, including the use of IAM for compliance with complex regulatory standards and the expansion of XDR solutions from IT to operational technology in industrial systems.

For more insights into the cybersecurity challenges facing enterprises, along with ISG’s advice on overcoming them, see the ISG Provider Lens® Focal Points briefing here.

The 2025 ISG Provider Lens® global Cybersecurity — Services and Solutions report evaluates the capabilities of 61 providers across three quadrants: Identity and Access Management, Extended Detection and Response and Security Service Edge.

The report names Broadcom, Fortinet, IBM, Microsoft and Palo Alto Networks as Leaders in two quadrants each. It names Cato Networks, Check Point Software, Cisco, CrowdStrike, CyberArk, Forcepoint, ManageEngine, Netskope, Okta, One Identity (OneLogin), Ping Identity, SailPoint, Saviynt, SentinelOne, Trellix, Trend Micro, Versa Networks and Zscaler as Leaders in one quadrant each.

In addition, BeyondTrust, HPE (Aruba) and Sophos are named as Rising Stars — companies with a “promising portfolio” and “high future potential” by ISG’s definition — in one quadrant each.

In the area of customer experience, PwC is named the global ISG CX Star Performer for 2025 among cybersecurity service and solution providers. PwC earned the highest customer satisfaction scores in ISG's Voice of the Customer survey, part of the ISG Star of Excellence™ program, the premier quality recognition for the technology and business services industry.

The 2025 ISG Provider Lens® global Cybersecurity — Services and Solutions report is available to subscribers or for one-time purchase on this webpage.

About ISG Provider Lens® Research

The ISG Provider Lens® Quadrant research series is the only service provider evaluation of its kind to combine empirical, data-driven research and market analysis with the real-world experience and observations of ISG's global advisory team. Enterprises will find a wealth of detailed data and market analysis to help guide their selection of appropriate sourcing partners, while ISG advisors use the reports to validate their own market knowledge and make recommendations to ISG's enterprise clients. The research currently covers providers offering their services globally, across Europe, as well as in the U.S., Canada, Mexico, Brazil, the U.K., France, Benelux, Germany, Switzerland, the Nordics, Australia and Singapore/Malaysia, with additional markets to be added in the future. For more information about ISG Provider Lens research, please visit this webpage.

About ISG

ISG (Nasdaq: III) is a global AI-centered technology research and advisory firm. A trusted partner to more than 900 clients, including 75 of the world’s top 100 enterprises, ISG is a long-time leader in technology and business services that is now at the forefront of leveraging AI to help organizations achieve operational excellence and faster growth. The firm, founded in 2006, is known for its proprietary market data, in-depth knowledge of provider ecosystems, and the expertise of its 1,600 professionals worldwide working together to help clients maximize the value of their technology investments.

Traditional security perimeters are obsolete, so enterprises are integrating defenses throughout their digital environments. Modern approaches are gaining new capabilities that let organizations constantly adapt to evolving threats.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.