Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

Blog
Blog
Symphony Technology Group (STG) Acquires McAfee Enterprise Business
STG announced that they intend to acquire McAfee’s enterprise business for around $4B. The McAfee brand will continue to operate and focus on consumer cybersecurity. STG will pick up...
Learn more
Executive View
Executive View
ShardSecure Microshard Technology
Organizations find themselves at the crossroads of data sovereignty and data privacy, resulting from cloud adoption. This has led to compliance with cross-border data protection laws and...
Learn more
Webinar Recording
Webinar Recording
The Evolution of Encryption: Getting Ready for the Quantum Watershed
The relentless move towards the digital transformation seems unstoppable. Organizations must secure their trust and reputation in the face of increasing attacks, advances in technology, increased...
Learn more
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
Blog
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
Dive into the enigmatic realm of quantum computing, where advanced technology parallels magic. While space exploration and AI seamlessly integrate into daily life, quantum computing remains a...
Future Cybersecurity Threats: Advanced Disinformation Campaigns
Blog
Future Cybersecurity Threats: Advanced Disinformation Campaigns
Cyberspace greatly enhances an actor's ability to engage in activities that can yield geopolitical and economic gains without resorting to the use of force. With the advent of cyberspace, various...
Pros & Cons of Anonymity and ZKP -  Do we Know Them?
Event Recording
Pros & Cons of Anonymity and ZKP - Do we Know Them?
Within the digital identity wallet-movement (and especially SSI), there is a lot of focus on proving something about yourself, without revealing anything else, also known as ZKP (Zero-Knowledge...
Defending Cross-Device flows against Illicit Consent Grant Attacks
Event Recording
Defending Cross-Device flows against Illicit Consent Grant Attacks
Cross device flows lets a user initiate an action on one device (e.g. a SmartTV) and authenticate or authorize that action on a trusted personal device (e.g. a mobile phone). Examples includes...
Reduce Certification Fatigue with Effective Role Management
Event Recording
Reduce Certification Fatigue with Effective Role Management
IAM and security leaders end up certifying far more access than necessary, owing to a failure to classify business resources. Furthermore, business users pay the price because they must spend an...
EU-US Data Transfers - Where are we now?
Event Recording
EU-US Data Transfers - Where are we now?
Secrets Management
Leadership Compass
Secrets Management
Secrets Management is a broad subject that covers any protected data or information that must not be divulged to others. In this document the term ‘secret’ refers to a software token, a key pair or...
Analyst Chat #169: The Future of Data Security
Analyst Chat
Analyst Chat #169: The Future of Data Security
In a world where data breaches are becoming more and more frequent, keeping data secure has become an increasingly challenging task. Join Matthias and Alexei Balaganski in this episode as they...
Data Security Platforms
Leadership Compass
Data Security Platforms
This report provides an overview of the Data Security Platforms market, along with guidance and recommendations for finding the sensitive data protection and governance products that meet your...
Analyst Chat #167: The Top 5 Ways to Protect Data
Analyst Chat
Analyst Chat #167: The Top 5 Ways to Protect Data
Protecting data is a responsibility for any company, regardless of whether it is considered their most valuable asset or not. Data loss can occur due to human error or malicious intent,...
Data Leakage Prevention
Leadership Compass
Data Leakage Prevention
This KuppingerCole Leadership Compass provides an overview of the market for Data Leakage Prevention (DLP) and provides you with a compass to help you to find the solution that best meets your...
Bringing Data Back Under Control
Webinar Recording
Bringing Data Back Under Control
Join experts from KuppingerCole Analysts and data security firm ShardSecure as they discuss data confidentiality in the context of modern infrastructures, quantum computing, and data protection...
Previous
1 2 3 4 5 6 7 Next