Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
Is “Why Not Both?” Oracle’s New Product Strategy?
Whenever a customer is facing a supposed dichotomy, having to choose between a solution from Oracle or from a competitor, the company’s answer now boils down to a well-known meme: why not both? The...
Learn more
Leadership Brief
Leadership Brief
The Information Protection Life Cycle and Framework: Monitor and Detect
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...
Learn more
Webinar Recording
Webinar Recording
The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
In this webinar, you will:  Gain an understanding of insider threats and their implications for financial institutions.  Win best practices for creating a robust insider threat...
Learn more
Meet the Next-Generation Oracle
Blog
Meet the Next-Generation Oracle
Oracle OpenWorld 2019 has just wrapped yesterday, and if there is a single word that can describe my impressions of it, that would be “different”. Immediately noticeable was the...
How Do You Protect Your Notebook?
Blog
How Do You Protect Your Notebook?
The other day I found a notebook on a train. It was in a compartment on the seat of a first-class car. The compartment was empty, no more passengers to see, no luggage, nothing. And no, it...
Could Less Data Be More Data?
Blog
Could Less Data Be More Data?
Data, a massive amount of data, seems to be the holy grail in building more sophisticated AI’s, creating human-like chatbots and selling more products. But is more data actually better? With...
Data Security and Governance (DSG) for Big Data and BI
Blog
Data Security and Governance (DSG) for Big Data and BI
Today, organizations are capturing trillions of bytes of data every day on their employees, consumers, services and operations through multiple sources and data streams. As organizations explore...
Building Trust by Design
Blog
Building Trust by Design
Trust has somehow become a marketing buzzword recently. There is a lot of talks about “redefining trust”, “trust technologies” or even “trustless models” (the...
Can Autonomous Improve Security Posture?
Blog
Can Autonomous Improve Security Posture?
Last week I attended the Oracle Open World Europe 2019 in London. At this event Andrew Sutherland VP of technology told us that security was one of the main reasons why customers were choosing...
CCPA: GDPR as a Catalyst for Improving Data Protection Outside the EU
Blog
CCPA: GDPR as a Catalyst for Improving Data Protection Outside the EU
It wasn't too long ago that discussions and meetings on the subject of digitization and consumer identity access management (CIAM) in an international environment became more and more...
Martin Kuppinger's Top 5 IAM Topics for 2019
Blog
Martin Kuppinger's Top 5 IAM Topics for 2019
Where to put your focus on in 2019
Impressions from the Oracle OpenWorld
Blog
Impressions from the Oracle OpenWorld
Recently I was in San Francisco again, attending the Oracle OpenWorld for the second time. Just like last year , I cannot but commend the organizers for making the event even bigger, more...
Making Sense of the Top Cybersecurity Trends
Blog
Making Sense of the Top Cybersecurity Trends
With each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of their IT infrastructures...
Consumer Identity World (CIW) USA 2018 - Report
Blog
Consumer Identity World (CIW) USA 2018 - Report
Fall is Consumer Identity Season at KuppingerCole, just in time for holiday shopping. Last week we kicked off our 2018 tour in Seattle. The number of attendees and sponsors was well up over last...
The Digital Transformation and the Role of the CISO
Blog
The Digital Transformation and the Role of the CISO
Cybersecurity needs to be at the heart of the digital transformation, but organisational models will have to evolve Cybersecurity is in the process of becoming an essential component of any...