Insights

Cloud Security

As more and more organizations use cloud services cyber security and compliance has taken center stage. The benefits of using the cloud for business-critical applications can be undermined if this leads to cyber-attacks, data breaches and compliance failure.

Guide
Guide
Stairway to Cloud Security
Read the complete step-by-step guide to help you make the right decisions to minimize risk and achieve high cloud security.
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
Google Cloud Digital Sovereignty Announcement
On September 8 th , 2021 Google and T-Systems announced their intention to build and deliver sovereign cloud services for German enterprises, the public sector, and healthcare...
Learn more
Buyer's Compass
Buyer's Compass
Hybrid Cloud Backup and Disaster Recovery
This Buyer's Compass covers solutions that provide backup and restoration of IT service data into the cloud in the context of the hybrid IT service delivery environment that is now commonly found...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #80: AI Service Clouds
Anne Bailey has just completed extensive research into the new market segment of AI Service Clouds. In this episode, she explains this innovative concept, which aims to overcome the lack of...
Learn more
Ditch Siloed IAM: Convergence, a Must For Identity Threat Detection & Response
Event Recording
Ditch Siloed IAM: Convergence, a Must For Identity Threat Detection & Response
An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these...
Ceremonies
Event Recording
Ceremonies
The act of identifying oneself to a website or service is a ceremony so common that we don’t often pay attention to it. The muscle memory we have built up over years of performing this...
Cloud Backup for Ransomware Protection
Leadership Compass
Cloud Backup for Ransomware Protection
This report provides an overview of the Cloud Backup for Ransomware Protection market and a compass to help you find a solution that best meets your needs. It examines solutions that provide...
Understanding the Value of Upgrading to Cloud-Based Identity Security
Whitepaper
Understanding the Value of Upgrading to Cloud-Based Identity Security
Organizations are facing ever increasing challenges maintaining and modernizing legacy identity security solutions. The shift from on-premises legacy solutions to SaaS based identity security...
A New Pamocracy is Growing Inside Your Organization
Blog
A New Pamocracy is Growing Inside Your Organization
OK everybody is doing it right now, so I asked the analyst’s new best friend, Chat GPT, to define Privileged Access Management. Here is what it said: “Privileged Access Management (PAM) is a...
Analyst Chat #161: Managing Network Connectivity and Security with SASE Solutions
Analyst Chat
Analyst Chat #161: Managing Network Connectivity and Security with SASE Solutions
With the rapid expansion of IT environments, adoption of the cloud, and the ongoing Digital Transformation, the need to provide secure access to organizational resources has become paramount....
SASE Integration Suites
Leadership Compass
SASE Integration Suites
This report provides an overview of the market for Secure Access Service Edge (SASE) Integration Suites. In this Leadership Compass, we examine the market segment, vendor service functionality,...
ShardSecure Microshard Technology
Executive View
ShardSecure Microshard Technology
Organizations find themselves at the crossroads of data sovereignty and data privacy, resulting from cloud adoption. This has led to compliance with cross-border data protection laws and...
Effects of Malware Hunting in Cloud Environments
Event Recording
Effects of Malware Hunting in Cloud Environments
Oracle CloudWorld Impressions
Blog
Oracle CloudWorld Impressions
Last week, I had an opportunity to visit Oracle CloudWorld, the company’s new flagship conference for customers and partners. Here is what has caught my eye among many announcements.
Considerations for Reducing the Risk of Ransomware
Whitepaper
Considerations for Reducing the Risk of Ransomware
In this paper, we will expand our view of ransomware and demonstrate how treating it as an isolated security challenge is not a sustainable approach. We will show why prevention is the best...
Analyst Chat #145: How Does Using Cloud Services Alter Risk?
Analyst Chat
Analyst Chat #145: How Does Using Cloud Services Alter Risk?
The question whether using a cloud service alters risk is not simple to answer. Mike Small sits down with Matthias and explains, that every organization has its own set of circumstances, and the...
Previous
1 2 3 4 5 6 7 Next