Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
Fighting Data Friction, One Battle at a Time
Data friction is arguably the biggest obstacle for every organization on its journey to achieve optimal business productivity. Even if you have not heard the term before, you’ve definitely...
Learn more
Whitepaper
Whitepaper
Why Your Organization Needs Data-centric Security
Data-centric security is an alternative approach towards information protection that has emerged as a direct response to the increasingly obvious failure of traditional measures focusing on...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #16: Enterprise Databases in the Cloud
Matthias Reinwarth and Alexei Balaganski talk about making the right choice of a database engine to power your next cloud project.
Learn more
GPTs, Databases, and AI Agility
Blog
GPTs, Databases, and AI Agility
How to reconcile Generative AI proliferation with security and compliance requirements? Let's have a look at several potential approaches...
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
Blog
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
Dive into the enigmatic realm of quantum computing, where advanced technology parallels magic. While space exploration and AI seamlessly integrate into daily life, quantum computing remains a...
Future Cybersecurity Threats: Advanced Disinformation Campaigns
Blog
Future Cybersecurity Threats: Advanced Disinformation Campaigns
Cyberspace greatly enhances an actor's ability to engage in activities that can yield geopolitical and economic gains without resorting to the use of force. With the advent of cyberspace, various...
The HeatWave is Spreading
Blog
The HeatWave is Spreading
MySQL HeatWave is a managed database service created by Oracle that extends the standard MySQL engine with support for in-database high-performance transactional workloads, analytics, machine...
Fully Homomorphic Encryption at a Glance
Blog
Fully Homomorphic Encryption at a Glance
With today's technology, we can effectively encrypt data in rest and data in motion. What about data in use? There the Fully Homomorphic Encryption (FHE) comes into play. This guide shows you how...
Is “Why Not Both?” Oracle’s New Product Strategy?
Blog
Is “Why Not Both?” Oracle’s New Product Strategy?
Whenever a customer is facing a supposed dichotomy, having to choose between a solution from Oracle or from a competitor, the company’s answer now boils down to a well-known meme: why not both? The...
No Security Without Confirmation
Blog
No Security Without Confirmation
Many organizations still do not implement certificates to authenticate, encrypt data, or sign documents. Although it highly increases security. But nothing comes without challenges. Large-scale...
Privacy and Consent Management
Blog
Privacy and Consent Management
As discussed in the previous edition of KC Navigator, data is the lifeblood of the modern enterprise. However, that data needs to be well managed to deliver value to the business, and at the same...
SQL vs NoSQL? Why Not Both?
Blog
SQL vs NoSQL? Why Not Both?
Is the decade-old argument between fans of SQL and NoSQL databases still relevant? With the recent announcement from Oracle, developers no longer need to make a choice: switch between relational...
Predictions for 2022: Decentralized Technologies
Blog
Predictions for 2022: Decentralized Technologies
KuppingerCole Analysts pay close attention to all topics at the intersection of identity and security. Decentralized technologies often cross paths with these domains and, since it is a dynamic...
Finding a Setting Worthy of Your “Crown Jewels”
Blog
Finding a Setting Worthy of Your “Crown Jewels”
Modern businesses depend on digital information. For quite a few years already, it’s been considered the world’s most valuable commodity, worth more than oil, gold, or even printer...
Brace Yourselves: A New HeatWave is Coming
Blog
Brace Yourselves: A New HeatWave is Coming
I’ve always been a bit baffled by the enduring popularity of MySQL. I mean, it’s great and we have been using it in many internal projects for years, but what makes it so popular even...
1 2 3 4 5 6 7 Next