Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
Is “Why Not Both?” Oracle’s New Product Strategy?
Whenever a customer is facing a supposed dichotomy, having to choose between a solution from Oracle or from a competitor, the company’s answer now boils down to a well-known meme: why not both? The...
Learn more
Leadership Brief
Leadership Brief
The Information Protection Life Cycle and Framework: Monitor and Detect
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...
Learn more
Tools Choice
Tools Choice
Anne Bailey: Market Overview
Learn more
Fighting Data Friction, One Battle at a Time
Blog
Fighting Data Friction, One Battle at a Time
Data friction is arguably the biggest obstacle for every organization on its journey to achieve optimal business productivity. Even if you have not heard the term before, you’ve definitely...
Symphony Technology Group (STG) Acquires McAfee Enterprise Business
Blog
Symphony Technology Group (STG) Acquires McAfee Enterprise Business
STG announced that they intend to acquire McAfee’s enterprise business for around $4B. The McAfee brand will continue to operate and focus on consumer cybersecurity. STG will pick up...
Oracle’s Crypto-Secure Data Management
Blog
Oracle’s Crypto-Secure Data Management
Oracle has unveiled new interesting capabilities in the Oracle database today, which they refer to as Immutable and Blockchain tables . While I am not entirely convinced by the names they have...
Privacy Seekers Are Really Looking for Life Management Platforms
Blog
Privacy Seekers Are Really Looking for Life Management Platforms
Privacy-sensitive users are drawn to solutions with certain features: end-to-end encryption, granular consent, data ownership, and secure storage. But what is it that privacy can really do for...
Does Microsoft Double Key Encryption Help with Schrems II?
Blog
Does Microsoft Double Key Encryption Help with Schrems II?
On July 16 th , 2020 the European Court of Justice issued its decision on the adequacy of the protection provided by the EU-US Data Protection Shield for the transfer of personal data for...
This Is Why We Can’t Have Nice Things
Blog
This Is Why We Can’t Have Nice Things
I had no intention to write any blog posts during the holidays or, God forbid, do any predictions for the next year (look how relevant last year’s predictions turned out to be). However, an...
The Latest Twitter “Hack” Raises Inconvenient Questions
Blog
The Latest Twitter “Hack” Raises Inconvenient Questions
It looks like the whole world is currently talking (at least, tweeting) about the latest large-scale Twitter hack. High profile accounts of the likes of Barack Obama, Joe Biden, Bill Gates, and...
Getting a Grip on Your Big Data – Informatica Announces Acquisition of Compact Solutions
Blog
Getting a Grip on Your Big Data – Informatica Announces Acquisition of Compact Solutions
Informatica just announced that they agreed to acquire Compact Solutions, a vendor of Enterprise Metadata Management with engineering and professional services being based out of Krakow, Poland....
High Assurance MFA Options for Mobile Devices
Blog
High Assurance MFA Options for Mobile Devices
In recent years much of the focus in the authentication space has been on MFA, mobile devices, and biometrics. Many technical advances have been made which also serve to increase usability and...
Will 2020 Be the Year of Oracle Cloud?
Blog
Will 2020 Be the Year of Oracle Cloud?
Recently I had an opportunity to attend the Next Generation Cloud Summit, an event organized by Oracle in Seattle, WA for industry analysts to learn about the latest developments in Oracle Cloud...
Applying the Information Protection Life Cycle and Framework to CCPA
Blog
Applying the Information Protection Life Cycle and Framework to CCPA
The California Consumer Privacy Act (CCPA) became effective on January 1, 2020. Enforcement is slated to start by July 1, 2020. CCPA is complex regulation which does bear some similarities with EU...
The Information Protection Life Cycle and Framework
Blog
The Information Protection Life Cycle and Framework
The Information Protection Life Cycle (IPLC) and Framework describes the phases, methods, and controls associated with the protection of information. Though other IT and cybersecurity frameworks...