Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
Fighting Data Friction, One Battle at a Time
Data friction is arguably the biggest obstacle for every organization on its journey to achieve optimal business productivity. Even if you have not heard the term before, you’ve definitely...
Learn more
Whitepaper
Whitepaper
IAM Projects Done Right: Everything as a Service
Delivering on IAM is not always easy. Many organizations have experienced IAM projects stalling. An approach for one-stop-shopping can help, where the implementation, the IDaaS style deployment...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #158: The Crown Jewels Are a Lie
Is digital data really every organization's most precious possession, its "crown jewels"? Alexei Balaganski takes a different perspective towards a widely accepted opinion. He instead claims that...
Learn more
Tim Hobbs - What Connects DevOps & IAM
Event Recording
Tim Hobbs - What Connects DevOps & IAM
IAM products are highly configurable systems tailored to the diverse needs of customer environments and applications. Modern applications require short development cycles and IAM systems that can...
Joy Chik - Planning for Tomorrow: Connecting Identities for People, Processes, and Things
Event Recording
Joy Chik - Planning for Tomorrow: Connecting Identities for People, Processes, and Things
Social, economic and technological changes are creating urgent new requirements for enterprise identity that enable interconnected digital systems. These new use cases require a governance...
Dr. Torsten George - Zero Trust: Solving IT Security’s Identity Crisis
Event Recording
Dr. Torsten George - Zero Trust: Solving IT Security’s Identity Crisis
Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of...
Naresh Persaud - How to Enable Trust with Interoperable & Shared Credentials
Event Recording
Naresh Persaud - How to Enable Trust with Interoperable & Shared Credentials
The focus of digital identity for consumers and enterprise is to remove silos, minimize redundant effort, enable better collaboration and provide a foundation for regulatory compliance. The...
Prof. Dr. Heiko Beier - Is it Facebook's End Game? Why Social Networks as we know them Today will not Survive
Event Recording
Prof. Dr. Heiko Beier - Is it Facebook's End Game? Why Social Networks as we know them Today will not Survive
The real problem behind the recent Facebook scandal is not primarily that a company like Cambridge Analytica has "gained" access to the personal information of millions of Facebook users and...
European Identity & Cloud Awards Ceremony
Event Recording
European Identity & Cloud Awards Ceremony
European Identity & Cloud Awards Ceremony
Martin Kuppinger - The Future Model of Identity: Blockchain ID and the Digital Transformation
Event Recording
Martin Kuppinger - The Future Model of Identity: Blockchain ID and the Digital Transformation
Distributed Ledger Technologies ("Blockchain") are the foundation for the most disruptive changes to business we are either already observing or that are on the road to becoming a reality. Based...
Prof. Dr. Hans Ulrich Buhl - Unchaining Blockchain
Event Recording
Prof. Dr. Hans Ulrich Buhl - Unchaining Blockchain
Blockchain is much more than the technology behind its still most successful application – the Bitcoin. One of its key attributes is the immutable storage of information. Besides other...
Ralf Oestereich - We will Disrupt You
Event Recording
Ralf Oestereich - We will Disrupt You
We will Disrupt You - Are AI, Blockchain, IoT a Blessing or Curse for an Insurance Company?
Drs. Jacoba C. Sieders - Digital Identities and Blockchain: Experiments and Use Cases @ ABNAMRO
Event Recording
Drs. Jacoba C. Sieders - Digital Identities and Blockchain: Experiments and Use Cases @ ABNAMRO
ABNAMRO runs over 30 blockchain experiments, also involving digital identity capabilities. Co-operation has been set –up across various coalitions, and use cases are running a lot wider than...
Kim Cameron - The Laws of Identity on the Blockchain
Event Recording
Kim Cameron - The Laws of Identity on the Blockchain
Keynote at the European Identity & Cloud Conference 2018
Dr. Sridhar Muppidi - Identity Meets Fraud Protection to Establish Digital Trust
Event Recording
Dr. Sridhar Muppidi - Identity Meets Fraud Protection to Establish Digital Trust
In this session, we will introduce a framework to establish digital trust based on capabilities from fraud protection and Identity. This will quickly and transparently establish a trusted,...
Previous
3 4 5 6 7 8 9 Next