Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
Will 2020 Be the Year of Oracle Cloud?
Recently I had an opportunity to attend the Next Generation Cloud Summit, an event organized by Oracle in Seattle, WA for industry analysts to learn about the latest developments in Oracle Cloud...
Learn more
Buyer's Compass
Buyer's Compass
Database and Big Data Security
As more and more companies are embracing digital transformation, the challenges of securely storing, processing, and exchanging digital data continue to multiply. This KuppingerCole Buyer's Compass...
Learn more
Analyst Chat
Analyst Chat
From Third-Party Cookies to FLoC to Google Topics API
Online tracking is a highly visible privacy issue that a lot of people care about. Third-party cookies are most notorious for being used in cross-site tracking, retargeting, and ad-serving. Annie...
Learn more
Big Data and Information Security Study
Blog
Big Data and Information Security Study
Since the notion of a corporate security perimeter has all but disappeared in the recent years thanks to the growing adoption of cloud and mobile services, information security has experienced a...
Know and Serve Your Customer: Why KYC is not enough
Blog
Know and Serve Your Customer: Why KYC is not enough
Know and Serve Your Customer: Why KYC is not enough Today’s connected businesses need to communicate, collaborate and interact with their customers in a way that’s more flexible...
Security & Privacy by Design is Agility by Design – time to rethink Banking IT
Blog
Security & Privacy by Design is Agility by Design – time to rethink Banking IT
81 million dollars, that was the sum hackers stole from the central bank of Bangladesh this year in April by breaching the international payment system SWIFT. Three other SWIFT hacks followed...
The Impact of the new EU Data Protection Regulation on the Finance Industry
Blog
The Impact of the new EU Data Protection Regulation on the Finance Industry
After several negotiations und multiple drafts of the General Data Protection Regulation (GDPR), its final text was adopted in April 2016. The GDPR updates the current EU Data Protection Directive...
IoT (or IoEE): Product Security Is Becoming a Strategic Risk
Blog
IoT (or IoEE): Product Security Is Becoming a Strategic Risk
For a long time, IT risks have been widely ignored by business people, including Corporate Risk Officers (CROs) and C-level management. This has changed recently with the increasing perception of...
Be careful not to DROWN
Blog
Be careful not to DROWN
On March 1 st OpenSSL published a security advisory CVE-2016-0800 , known as “DROWN”. This is described as a cross-protocol attack on TLS using SSLv2 and is classified with a High...
Information Rights Management explained
Blog
Information Rights Management explained
With the amount of digital assets a modern company has to deal with growing exponentially, the need to access them any time from any place, across various devices and platforms has become a...
Stack creep - from the network layer to the application layer
Blog
Stack creep - from the network layer to the application layer
Last year saw an unprecedented interest in protection of corporate data. With several high-profile losses of intellectual property organisations have started looking for a better way. For the...
“A Stab in the Back” of IoT Security
Blog
“A Stab in the Back” of IoT Security
Following the topic of the Internet of Things security covered in our latest Analysts’ View newsletter , I’d like to present a perfect example of how IoT device manufacturers are...
Approaching the Internet of Things Security
Blog
Approaching the Internet of Things Security
As already discussed in one of our earlier newsletters , Internet of Things as a concept is by no means new – various smart devices capable of communicating with each other and their...
Microsoft to acquire Secure Islands – a significant investment in Secure Information Sharing
Blog
Microsoft to acquire Secure Islands – a significant investment in Secure Information Sharing
Microsoft and Secure Islands today announced that Microsoft is to acquire Secure Islands. Secure Islands is a provider of automated classification for documents and further technologies for...
Who will become the Google, Facebook or Apple of Life Management Platforms?
Blog
Who will become the Google, Facebook or Apple of Life Management Platforms?
A Life Management Platform (LMP) allows individuals to access all relevant information from their daily life and manage its lifecycle, in particular data that is sensitive and typically...