Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
This Is Why We Can’t Have Nice Things
I had no intention to write any blog posts during the holidays or, God forbid, do any predictions for the next year (look how relevant last year’s predictions turned out to be). However, an...
Learn more
Buyer's Compass
Buyer's Compass
Database and Big Data Security
As more and more companies are embracing digital transformation, the challenges of securely storing, processing, and exchanging digital data continue to multiply. This KuppingerCole Buyer's Compass...
Learn more
Tools Choice
Tools Choice
John Tolbert: Methodology
Learn more
Five Steps to Building an Effective Insider Threat Program
Webinar Recording
Five Steps to Building an Effective Insider Threat Program
The greatest cybersecurity threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders - the contractors, third-party vendors, and...
Security vs. Innovation: Why Not Choose Both?
Webinar Recording
Security vs. Innovation: Why Not Choose Both?
In a world where businesses compete and succeed on the basis of application-driven innovation, enterprises are challenged to deliver software to market faster than ever before. Simultaneously,...
Zero Trust Reality Check: Secure Access for Hybrid IT
Webinar Recording
Zero Trust Reality Check: Secure Access for Hybrid IT
Workforce mobility and widespread adoption of distributed data center and cloud environments have introduced significant access control complexities and threats. Organizations are questioning the...
How to Handle Consent to Be Compliant With the GDPR and the Upcoming ePrivacy Regulation
Webinar Recording
How to Handle Consent to Be Compliant With the GDPR and the Upcoming ePrivacy Regulation
GDPR is here to stay and the new ePrivacy regulation is on the horizon, but many organizations are still not yet in full state of compliance. A core requirement for compliance with GDPR is the...
Buying Into Zero Trust? What You Need to Consider to Be Successful
Webinar Recording
Buying Into Zero Trust? What You Need to Consider to Be Successful
As organizations take on the digital transformation, trends such as mobility, proliferation of SaaS applications and cloud infrastructure are driving up the number of connected entities and...
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Webinar Recording
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
The Internet of Things is disrupting all industries and use cases; from customer IoT, to Industrial IoT. Companies are forced to become more innovative with their products whilst their services...
Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)
Webinar Recording
Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)
It is all about providing your customer a great experience so that they return to you and not to your competitor, who has never before been that close to your business. Anticipating, maybe even in...
Securing your Hybrid IT Environment with Privileged Access Management
Webinar Recording
Securing your Hybrid IT Environment with Privileged Access Management
As your business grows, so does your IT footprint – both on-premises and in the cloud. This adds to the overall complexity of managing access to the newly acquired IT assets and applications...
Datendiebstahl, Malware, DSGVO - Unstrukturierte Daten Zwischen Kollaboration & Compliance
Webinar Recording
Datendiebstahl, Malware, DSGVO - Unstrukturierte Daten Zwischen Kollaboration & Compliance
Die Mengen an digitalen Daten, die Organisationen nun speichern und verarbeiten müssen, wachsen exponentiell. Dabei geht es nicht nur um die Digitalisierung bestehender Geschäftsprozesse...
Classification - the Intelligent Way to Ensure Strong Data Protection
Webinar Recording
Classification - the Intelligent Way to Ensure Strong Data Protection
As businesses are increasingly embracing the digital transformation, the volumes of information that a typical company has to collect, keep, transport and process is growing exponentially. Massive...
Martin Kuppinger - Microservices Architectures: Making IAM Hybrid
Event Recording
Martin Kuppinger - Microservices Architectures: Making IAM Hybrid
In recent times, an increasing number of vendors announced a migration of their products towards microservices architectures. Some renovate their existing on premises IAM tools, others build new...
Jeff Jonas - Do you Know What You Know About the Data Subject?
Event Recording
Jeff Jonas - Do you Know What You Know About the Data Subject?
GDPR obligates organizations to provide data subjects with access to their personal data. To comply, companies must be able to answer a seemingly innocuous but frighteningly difficult question:...
Previous
2 3 4 5 6 7 8 Next