Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
Oracle’s Crypto-Secure Data Management
Oracle has unveiled new interesting capabilities in the Oracle database today, which they refer to as Immutable and Blockchain tables . While I am not entirely convinced by the names they have...
Learn more
Leadership Compass
Leadership Compass
Database and Big Data Security
This Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection and...
Learn more
Webinar Recording
Webinar Recording
The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
In this webinar, you will:  Gain an understanding of insider threats and their implications for financial institutions.  Win best practices for creating a robust insider threat...
Learn more
Defending Cross-Device flows against Illicit Consent Grant Attacks
Event Recording
Defending Cross-Device flows against Illicit Consent Grant Attacks
Cross device flows lets a user initiate an action on one device (e.g. a SmartTV) and authenticate or authorize that action on a trusted personal device (e.g. a mobile phone). Examples includes...
Reduce Certification Fatigue with Effective Role Management
Event Recording
Reduce Certification Fatigue with Effective Role Management
IAM and security leaders end up certifying far more access than necessary, owing to a failure to classify business resources. Furthermore, business users pay the price because they must spend an...
EU-US Data Transfers - Where are we now?
Event Recording
EU-US Data Transfers - Where are we now?
Analyst Chat #169: The Future of Data Security
Analyst Chat
Analyst Chat #169: The Future of Data Security
In a world where data breaches are becoming more and more frequent, keeping data secure has become an increasingly challenging task. Join Matthias and Alexei Balaganski in this episode as they...
Analyst Chat #167: The Top 5 Ways to Protect Data
Analyst Chat
Analyst Chat #167: The Top 5 Ways to Protect Data
Protecting data is a responsibility for any company, regardless of whether it is considered their most valuable asset or not. Data loss can occur due to human error or malicious intent,...
Bringing Data Back Under Control
Webinar Recording
Bringing Data Back Under Control
Join experts from KuppingerCole Analysts and data security firm ShardSecure as they discuss data confidentiality in the context of modern infrastructures, quantum computing, and data protection...
Analyst Chat #158: The Crown Jewels Are a Lie
Analyst Chat
Analyst Chat #158: The Crown Jewels Are a Lie
Is digital data really every organization's most precious possession, its "crown jewels"? Alexei Balaganski takes a different perspective towards a widely accepted opinion. He instead claims that...
Analyst Chat #157: How to Refine Data like Oil - Data Quality and Integration Solutions
Analyst Chat
Analyst Chat #157: How to Refine Data like Oil - Data Quality and Integration Solutions
Who has not heard of the statement that "Data is the new Oil". But oil needs to be refined and so does data. The challenge of gathering, integrating, cleansing, improving, and enriching data...
Analyst Chat #129: Market Compass Secure Collaboration
Analyst Chat
Analyst Chat #129: Market Compass Secure Collaboration
Secure Collaboration solutions focus on enabling data-centric security to facilitate virtual collaboration. Annie Bailey talks with Matthias about this market segment that provides increasingly...
Analyst Chat #115: From Third-Party Cookies to FLoC to Google Topics API
Analyst Chat
Analyst Chat #115: From Third-Party Cookies to FLoC to Google Topics API
Online tracking is a highly visible privacy issue that a lot of people care about. Third-party cookies are most notorious for being used in cross-site tracking, retargeting, and ad-serving. Annie...
Analyst Chat #113: Data Catalogs and Metadata Management
Analyst Chat
Analyst Chat #113: Data Catalogs and Metadata Management
Data catalogs and metadata management solutions help capture and manage data from all enterprise data sources to enable the use of that data and support data governance and data security...
Analyst Chat #108: Privacy and Consent Management
Analyst Chat
Analyst Chat #108: Privacy and Consent Management
"Privacy and Consent Management" is an exciting topic in a continuously changing market. Annie Bailey has just completed her latest Leadership Compass, which researches this market segment. To...
Previous
1 2 3 4 5 6 7 Next