Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

Blog
Blog
Brace Yourselves: A New HeatWave is Coming
I’ve always been a bit baffled by the enduring popularity of MySQL. I mean, it’s great and we have been using it in many internal projects for years, but what makes it so popular even...
Learn more
Whitepaper
Whitepaper
IAM Projects Done Right: Everything as a Service
Delivering on IAM is not always easy. Many organizations have experienced IAM projects stalling. An approach for one-stop-shopping can help, where the implementation, the IDaaS style deployment...
Learn more
Webinar Recording
Webinar Recording
Privacy Compliance That Empowers Instead of Hinders
Protecting user privacy has become much more complicated as of late. Organizations must optimize consent rates while ensuring compliance with ever-changing global regulations and frameworks. They...
Learn more
No Security Without Confirmation
Blog
No Security Without Confirmation
Many organizations still do not implement certificates to authenticate, encrypt data, or sign documents. Although it highly increases security. But nothing comes without challenges. Large-scale...
Privacy and Consent Management
Blog
Privacy and Consent Management
As discussed in the previous edition of KC Navigator, data is the lifeblood of the modern enterprise. However, that data needs to be well managed to deliver value to the business, and at the same...
Analyst Chat #113: Data Catalogs and Metadata Management
Analyst Chat
Analyst Chat #113: Data Catalogs and Metadata Management
Data catalogs and metadata management solutions help capture and manage data from all enterprise data sources to enable the use of that data and support data governance and data security...
SQL vs NoSQL? Why Not Both?
Blog
SQL vs NoSQL? Why Not Both?
Is the decade-old argument between fans of SQL and NoSQL databases still relevant? With the recent announcement from Oracle, developers no longer need to make a choice: switch between relational...
Analyst Chat #108: Privacy and Consent Management
Analyst Chat
Analyst Chat #108: Privacy and Consent Management
"Privacy and Consent Management" is an exciting topic in a continuously changing market. Annie Bailey has just completed her latest Leadership Compass, which researches this market segment. To...
Predictions for 2022: Decentralized Technologies
Blog
Predictions for 2022: Decentralized Technologies
KuppingerCole Analysts pay close attention to all topics at the intersection of identity and security. Decentralized technologies often cross paths with these domains and, since it is a dynamic...
Implementing SASE
Advisory Note
Implementing SASE
Secure Access Service Edge (SASE) architectures promise to prevent multiple types of cyber-attacks, but deciding whether SASE is right for your organization will require understanding whether SASE...
Urgent Need to Protect the Most Critical Business Assets: Data & People
Webinar Recording
Urgent Need to Protect the Most Critical Business Assets: Data & People
Data is widely considered the “new oil" because data has great value and provides direct and secondary revenue streams. But, also like oil, data can leak from organizations that depend on...
Finding a Setting Worthy of Your “Crown Jewels”
Blog
Finding a Setting Worthy of Your “Crown Jewels”
Modern businesses depend on digital information. For quite a few years already, it’s been considered the world’s most valuable commodity, worth more than oil, gold, or even printer...
Brace Yourselves: A New HeatWave is Coming
Blog
Brace Yourselves: A New HeatWave is Coming
I’ve always been a bit baffled by the enduring popularity of MySQL. I mean, it’s great and we have been using it in many internal projects for years, but what makes it so popular even...
A Unified Approach to Modern Data Protection
Webinar Recording
A Unified Approach to Modern Data Protection
Data is the lifeblood of business and government. Therefore, data breaches can be devastating in terms of disruption, damage to reputation, remediation costs, and data protection fines. But the...
Data Governance Platforms
Market Compass
Data Governance Platforms
The KuppingerCole Market Compass Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues...
Previous
1 2 3 4 5 6 7 Next