The self-build instinct makes sense on a spreadsheet. Build it once, own it forever. The math looks compelling right up until you account for the ecosystem you’re walking away from to pursue one you’ll never have. https://lnkd.in/efATqhy3 #EnterpriseSoftware #ArtificialIntelligence #PlatformStrategy #DigitalTransformation #GothamTG
Gotham Technology Group
IT Services and IT Consulting
Montvale, New Jersey 137,379 followers
About us
Gotham Technology Group, LLC is in the business of providing guidance and direction to IT professionals. With sales offices in Connecticut, New Jersey, and New York City, Gotham serves clients based throughout the Northeastern United States, and delivers goods and services across the globe. Gotham has been Certified™ as a Great Place to Work four years in a row. Visit the link below to view our company profile. https://www.greatplacetowork.com/certified-company/7025230
- Website
-
http://www.gothamtg.com
External link for Gotham Technology Group
- Industry
- IT Services and IT Consulting
- Company size
- 51-200 employees
- Headquarters
- Montvale, New Jersey
- Type
- Privately Held
- Founded
- 2001
- Specialties
- Virtualization, Infrastructure, Security, Application Development, Technical Staff Augmentation, End User Computing, Cybersecurity, Managed Services, Cloud Services, Collaboration Solutions, Next-Gen Datacenter, and Support
Locations
-
Primary
Get directions
5 Paragon Dr., Suite 103
Montvale, New Jersey 07645, US
-
Get directions
4 Research Dr., Suite 422
Shelton, Connecticut 06484, US
-
Get directions
3 Columbus Circle
Suite 1401
New York, New York 10019, US
Employees at Gotham Technology Group
Updates
-
AI will continue to improve how software is built and secured. Models like Daybreak are designed to help accelerate vulnerability discovery, improve remediation earlier in the development lifecycle, and reduce the number of issues that reach production. Over time, that will raise the baseline for software quality and reduce a class of preventable risk. But raising the baseline does not remove the conditions that drive most breaches today. https://lnkd.in/edRSzAUy Arctic Wolf #Cybersecurity #DevOps #DevSecOps #Artificialintelligence #SecureByDesign #GothamTG
-
Cribl Lake bring your own storage (BYOS) for Microsoft Azure is now available. Connect your existing Azure storage accounts directly to Cribl Lake, create datasets, route data from Cribl Stream, and instantly search data in place with Cribl Search, all without moving, duplicating, or rehydrating a single byte. https://lnkd.in/eB_c_AzR Cribl #InformationTechnology #IT #Azure #Data #DataStorage #GothamTG
-
Because Island enforces access at the browser and endpoint layer, and not just the network layer, it applies last-mile data protections that proxy-based ZTNA cannot reach. Clipboard controls, download restrictions, print blocking, DLP policies, and screenshot controls are all enforced at the session level, independent of the application itself. https://lnkd.in/e898j8B2 Island #InformationTechnology #IT #ZeroTrust #EnterpriseBrowser #SessionMonitoring #GothamTG
-
When attackers arrive through side channels, damage containment depends on whether your SaaS administrative plane is configured tightly enough to keep a single compromised account from taking the company offline. https://lnkd.in/eAAnzFTz Abnormal AI #Cybersecurity #Microsoft365 #M365 #SaaS #SocialEngineering #GothamTG
-
CIS Safeguard 10.5: Enable Anti-Exploitation Features https://lnkd.in/e8As55SY
-
As organizations become better at defending against common phishing techniques such as multifactor authentication (MFA) phishing, cyber threat actors have expanded their capabilities to techniques like device code and OAuth phishing. When combined with LLM-generated tools and social engineering, criminals can use such techniques to target more people with new social engineering tricks at scale. https://lnkd.in/eAme-4Gh Proofpoint #Cybersecurity #Phishing #SocialEngineering #IdentityManagement #GothamTG
-
The more AI expands across the business, the harder it becomes to manage. Who has access to what models? How much is it actually costing? What happens when sensitive data ends up in a prompt that wasn’t supposed to be there? These aren’t hypothetical concerns — they’re the operational realities that organizations are running into as AI scales from a handful of pilots to something much larger. https://lnkd.in/ebA7-DmF Citrix #InformationTechnology #IT #EndUserCompute #EUC #ArtificialIntelligence #GothamTG
-
Security tools remain essential, but not every sophisticated intrusion can be reliably detected through automation alone. Techniques including credential abuse, hands-on-keyboard activity, misuse of legitimate tools, and in-memory tradecraft are too subtle, novel, or context-dependent to automate high-fidelity detections for them without generating too much noise. https://lnkd.in/d5AWiVJE CrowdStrike #Cybersecurity #Microsoft #MicrosoftDefender #EndpointSecurity #GothamTG
-
Traditional EUC was designed around scarcity: limited devices, manual configuration, and reactive support. IT teams have spent years optimizing provisioning, patching, image management, and cost control, often just to keep up. But agents introduce a different set of requirements. https://lnkd.in/ef2ZhrSw Nerdio #InformationTechnology #IT #EndUserCompute #ArtificialIntelligence #Cloud #GothamTG