Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
No Security Without Confirmation
Many organizations still do not implement certificates to authenticate, encrypt data, or sign documents. Although it highly increases security. But nothing comes without challenges. Large-scale...
Learn more
Buyer's Compass
Buyer's Compass
Database and Big Data Security
As more and more companies are embracing digital transformation, the challenges of securely storing, processing, and exchanging digital data continue to multiply. This KuppingerCole Buyer's Compass...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #205: From Indelible Ink to Quantum-Safe Computing - Digital Signatures
In this episode, Mike Small discusses the history and role of digital signatures. He explains that digital signatures are the modern-day equivalent of indelible ink and are fundamental to the...
Learn more
Blog
"Archive != Delete": Bring Back the Delete Button
Why does it seem to be getting harder to delete information online? GDPR will take effect in just a few days. GDPR empowers EU people to take control of their personal information. When in force,...
Martin Kuppinger - Microservices Architectures: Making IAM Hybrid
Event Recording
Martin Kuppinger - Microservices Architectures: Making IAM Hybrid
In recent times, an increasing number of vendors announced a migration of their products towards microservices architectures. Some renovate their existing on premises IAM tools, others build new...
Jeff Jonas - Do you Know What You Know About the Data Subject?
Event Recording
Jeff Jonas - Do you Know What You Know About the Data Subject?
GDPR obligates organizations to provide data subjects with access to their personal data. To comply, companies must be able to answer a seemingly innocuous but frighteningly difficult question:...
Tim Hobbs - What Connects DevOps & IAM
Event Recording
Tim Hobbs - What Connects DevOps & IAM
IAM products are highly configurable systems tailored to the diverse needs of customer environments and applications. Modern applications require short development cycles and IAM systems that can...
Joy Chik - Planning for Tomorrow: Connecting Identities for People, Processes, and Things
Event Recording
Joy Chik - Planning for Tomorrow: Connecting Identities for People, Processes, and Things
Social, economic and technological changes are creating urgent new requirements for enterprise identity that enable interconnected digital systems. These new use cases require a governance...
Dr. Torsten George - Zero Trust: Solving IT Security’s Identity Crisis
Event Recording
Dr. Torsten George - Zero Trust: Solving IT Security’s Identity Crisis
Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of...
Naresh Persaud - How to Enable Trust with Interoperable & Shared Credentials
Event Recording
Naresh Persaud - How to Enable Trust with Interoperable & Shared Credentials
The focus of digital identity for consumers and enterprise is to remove silos, minimize redundant effort, enable better collaboration and provide a foundation for regulatory compliance. The...
Prof. Dr. Heiko Beier - Is it Facebook's End Game? Why Social Networks as we know them Today will not Survive
Event Recording
Prof. Dr. Heiko Beier - Is it Facebook's End Game? Why Social Networks as we know them Today will not Survive
The real problem behind the recent Facebook scandal is not primarily that a company like Cambridge Analytica has "gained" access to the personal information of millions of Facebook users and...
European Identity & Cloud Awards Ceremony
Event Recording
European Identity & Cloud Awards Ceremony
European Identity & Cloud Awards Ceremony
Martin Kuppinger - The Future Model of Identity: Blockchain ID and the Digital Transformation
Event Recording
Martin Kuppinger - The Future Model of Identity: Blockchain ID and the Digital Transformation
Distributed Ledger Technologies ("Blockchain") are the foundation for the most disruptive changes to business we are either already observing or that are on the road to becoming a reality. Based...
Prof. Dr. Hans Ulrich Buhl - Unchaining Blockchain
Event Recording
Prof. Dr. Hans Ulrich Buhl - Unchaining Blockchain
Blockchain is much more than the technology behind its still most successful application – the Bitcoin. One of its key attributes is the immutable storage of information. Besides other...
Ralf Oestereich - We will Disrupt You
Event Recording
Ralf Oestereich - We will Disrupt You
We will Disrupt You - Are AI, Blockchain, IoT a Blessing or Curse for an Insurance Company?
Previous
7 8 9 10 11 12 13 Next