Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
Future Cybersecurity Threats: Advanced Disinformation Campaigns
Cyberspace greatly enhances an actor's ability to engage in activities that can yield geopolitical and economic gains without resorting to the use of force. With the advent of cyberspace, various...
Learn more
Leadership Brief
Leadership Brief
The Information Protection Life Cycle and Framework: Monitor and Detect
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...
Learn more
Event Recording
Event Recording
EU-US Data Transfers - Where are we now?
Learn more
Blog
"Archive != Delete": Bring Back the Delete Button
Why does it seem to be getting harder to delete information online? GDPR will take effect in just a few days. GDPR empowers EU people to take control of their personal information. When in force,...
Email Encryption Is Dead™. Or Is It?
Blog
Email Encryption Is Dead™. Or Is It?
As we all know, there is no better way for a security researcher to start a new week than to learn about another massive security vulnerability ( or two! ) that beats all previous ones and will...
Without Prosecution, There Is No Protection
Blog
Without Prosecution, There Is No Protection
The Equifax data breach saga continues to unfold. In late 2017, the company admitted it had suffered significant data loss starting in March of last year. There were likely multiple data theft...
2018 – the Turning Point for Social Networks
Blog
2018 – the Turning Point for Social Networks
The Facebook data privacy story continues to be in the headlines this week. For many of us in IT, this event is not really a surprise. The sharing of data from social media is not a data breach,...
CyberArk Acquires Vaultive to Strengthen Its Privilege Management Capabilities in Cloud
Blog
CyberArk Acquires Vaultive to Strengthen Its Privilege Management Capabilities in Cloud
CyberArk, an overall leader in privilege management according to KuppingerCole Leadership Compass on Privilege Management , announced yesterday that it has acquired certain assets in...
Free Tools That Can Save Millions? We Need More of These
Blog
Free Tools That Can Save Millions? We Need More of These
When IT visionaries give presentations about the Digital Transformation, they usually talk about large enterprises with teams of experts working on exciting stuff like heterogeneous multi-cloud...
For Oracle, the Future Is Autonomous
Blog
For Oracle, the Future Is Autonomous
Recently, I have attended the Oracle OpenWorld in San Francisco. For five days, the company has spared no expenses to inform, educate and (last but not least) entertain its customers and...
Cryptography’s Darkest Hour
Blog
Cryptography’s Darkest Hour
For anyone working in IT security, this week surely did not start well. Not one, but two major cryptography-related vulnerabilities have been disclosed, and each of them is at least as massive in...
IBM Moves Security to the Next Level – on the Mainframe
Blog
IBM Moves Security to the Next Level – on the Mainframe
In a recent press release , IBM announced that they are moving security to a new level, with “pervasively encrypted data, all the time at any scale”. That sounded cool and, after...
Follow-Up on “Managing the User's Consent Life Cycle: Challenges, GDPR Compliance and (Business) Rewards”
Blog
Follow-Up on “Managing the User's Consent Life Cycle: Challenges, GDPR Compliance and (Business) Rewards”
The GDPR continues to be a hot topic for many organizations, especially for those who store and process customer data. A core requirement for compliance to GDPR is the concept of...
GDPR as an Opportunity to Build Trusted Relationships with Consumers
Blog
GDPR as an Opportunity to Build Trusted Relationships with Consumers
During the KuppingerCole webinar run March 16 th , 2017, which has been supported by ForgeRock, several questions from attendees were left unanswered due to a huge number of questions and a lack...
What Value Certification?
Blog
What Value Certification?
In the past weeks, there have been several press releases from CSPs (Cloud Service Providers) announcing new certifications for their services.  In November, BSI announced that Microsoft...