Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
High Assurance MFA Options for Mobile Devices
In recent years much of the focus in the authentication space has been on MFA, mobile devices, and biometrics. Many technical advances have been made which also serve to increase usability and...
Learn more
Leadership Compass
Leadership Compass
Data Leakage Prevention
This KuppingerCole Leadership Compass provides an overview of the market for Data Leakage Prevention (DLP) and provides you with a compass to help you to find the solution that best meets your...
Learn more
Event Recording
Event Recording
Reduce Certification Fatigue with Effective Role Management
IAM and security leaders end up certifying far more access than necessary, owing to a failure to classify business resources. Furthermore, business users pay the price because they must spend an...
Learn more
Life Management Platforms: Players, Technologies, Standards
Blog
Life Management Platforms: Players, Technologies, Standards
When KuppingerCole outlined the concept of Life Management Platforms several years ago, the perspective of numerous completely new business models based on user-centric management of personal data...
Consent – Context – Consequence
Blog
Consent – Context – Consequence
Consent and Context: They are about to change the way we do IT. This is not only about security, where context already is of growing relevance. It is about the way we have to construct most...
De-Mail: Now with End-to-end Encryption?
Blog
De-Mail: Now with End-to-end Encryption?
In case you don’t know (and unless you live in Germany, you most probably don’t), De-Mail is an electronic communications service maintained by several German providers in accordance...
UMA and Life Management Platforms
Blog
UMA and Life Management Platforms
Back in 2012, KuppingerCole introduced the concept of Life Management Platforms . This concept aligns well with the VRM (Vendor Relationship Management) efforts of ProjectVRM , however it goes...
Secure Information Sharing: Which approach to choose?
Blog
Secure Information Sharing: Which approach to choose?
There are various approaches to Secure Information Sharing (SIS), as I have explained in previous posts . However, which one is the best? As always, there is no simple answer. It depends on the...
The need for Secure Information Sharing
Blog
The need for Secure Information Sharing
A while ago, I wrote about the changing market for Secure Information Sharing . I also recently published a report on Microsoft Azure RMS , one of the most important products in that market...
Microsoft RMS Security and Confidentiality
Blog
Microsoft RMS Security and Confidentiality
Microsoft Rights Management Services (RMS) is a solution that might help Secure Information Sharing become a topic for the masses, at least at the enterprise level. I just recently wrote a report...
Secure Information Sharing – a lot of new momentum
Blog
Secure Information Sharing – a lot of new momentum
During the last few months, we have seen – especially here in Europe – a massive increase in demand for methods to securely share information, beyond the Enterprise. The challenge is not new. I...
Avoiding Data Breaches and Managing Big Data
Blog
Avoiding Data Breaches and Managing Big Data
Today information is the foundation upon which businesses are built and organizations need to prosper.  However, given its value, information is not treated with sufficient respect by everyone in...
Information Rights Management: Microsoft gives it a new push – just in time to succeed
Blog
Information Rights Management: Microsoft gives it a new push – just in time to succeed
Information Rights Management is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source: The single file. Files...
What will it mean when Windows operating systems reject encryption keys smaller than 1024 bit soon?
Blog
What will it mean when Windows operating systems reject encryption keys smaller than 1024 bit soon?
Microsoft will soon release an update to its current operating systems (Windows XP and higher; Windows Server 2003 and higher), which will block the use of cryptographic keys that are less than...
Datensicherheit durch Life Management Platforms
Blog
Datensicherheit durch Life Management Platforms
Über eine Life Management Platform kann ein Anwender seine persönlichen Daten im Web vor unerwünschten Zugriffen schützen. In diesem Beitrag widmen wir uns der Frage, wie das Konzept funktioniert...