Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
Brace Yourselves: A New HeatWave is Coming
I’ve always been a bit baffled by the enduring popularity of MySQL. I mean, it’s great and we have been using it in many internal projects for years, but what makes it so popular even...
Learn more
Leadership Compass
Leadership Compass
Secrets Management
Secrets Management is a broad subject that covers any protected data or information that must not be divulged to others. In this document the term ‘secret’ refers to a software token, a key pair or...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #169: The Future of Data Security
In a world where data breaches are becoming more and more frequent, keeping data secure has become an increasingly challenging task. Join Matthias and Alexei Balaganski in this episode as they...
Learn more
Frances Zelazny: Enabling the Future of IAM with Zero Knowledge Authentication
Event Recording
Frances Zelazny: Enabling the Future of IAM with Zero Knowledge Authentication
Database and Big Data Security
Buyer's Compass
Database and Big Data Security
As more and more companies are embracing digital transformation, the challenges of securely storing, processing, and exchanging digital data continue to multiply. This KuppingerCole Buyer's Compass...
Analyst Chat #70: AdTech and Future Alternatives to 3rd Party Cookies
Analyst Chat
Analyst Chat #70: AdTech and Future Alternatives to 3rd Party Cookies
Annie Bailey and Matthias continue their conversation around privacy, targeted marketing and the end of the era of the 3rd party cookie, that they started two weeks ago. They discuss the...
Fighting Data Friction, One Battle at a Time
Blog
Fighting Data Friction, One Battle at a Time
Data friction is arguably the biggest obstacle for every organization on its journey to achieve optimal business productivity. Even if you have not heard the term before, you’ve definitely...
Analyst Chat #68: FloC and the Death of the 3rd Party Cookie
Analyst Chat
Analyst Chat #68: FloC and the Death of the 3rd Party Cookie
Tracking of users via 3rd party cookies has been a constant issue regarding compliance and user privacy. This is about to change, as 3rd party cookies are being more and more blocked in browsers...
Symphony Technology Group (STG) Acquires McAfee Enterprise Business
Blog
Symphony Technology Group (STG) Acquires McAfee Enterprise Business
STG announced that they intend to acquire McAfee’s enterprise business for around $4B. The McAfee brand will continue to operate and focus on consumer cybersecurity. STG will pick up...
Oracle’s Crypto-Secure Data Management
Blog
Oracle’s Crypto-Secure Data Management
Oracle has unveiled new interesting capabilities in the Oracle database today, which they refer to as Immutable and Blockchain tables . While I am not entirely convinced by the names they have...
Analyst Chat #65: A First Look at Homomorphic Encryption
Analyst Chat
Analyst Chat #65: A First Look at Homomorphic Encryption
Alexei Balaganski covers a broad range of security-related topics: from database, application and API security to information protection, cryptography and AI-based security automation. He joins...
Privacy Seekers Are Really Looking for Life Management Platforms
Blog
Privacy Seekers Are Really Looking for Life Management Platforms
Privacy-sensitive users are drawn to solutions with certain features: end-to-end encryption, granular consent, data ownership, and secure storage. But what is it that privacy can really do for...
Does Microsoft Double Key Encryption Help with Schrems II?
Blog
Does Microsoft Double Key Encryption Help with Schrems II?
On July 16 th , 2020 the European Court of Justice issued its decision on the adequacy of the protection provided by the EU-US Data Protection Shield for the transfer of personal data for...
Database and Big Data Security
Leadership Compass
Database and Big Data Security
This Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection and...
Encrypt Everything
Interview
Encrypt Everything
Watch this Videocast with our Analyst Alexei and Todd Moore from Thales to learn why and how to encrypt everything!
Previous
2 3 4 5 6 7 8 Next