Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
SQL vs NoSQL? Why Not Both?
Is the decade-old argument between fans of SQL and NoSQL databases still relevant? With the recent announcement from Oracle, developers no longer need to make a choice: switch between relational...
Learn more
Leadership Compass
Leadership Compass
Data Security Platforms
This report provides an overview of the Data Security Platforms market, along with guidance and recommendations for finding the sensitive data protection and governance products that meet your...
Learn more
Event Recording
Event Recording
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Organizations nowadays are agile and tech-dependent, deploying updates frequently and relying ons 3rd parties. This leads to dynamic and complex digital systems with exposed and vulnerable assets....
Learn more
Analyst Chat #35: An Overview of Enterprise Information Protection
Analyst Chat
Analyst Chat #35: An Overview of Enterprise Information Protection
Anne Bailey and Matthias Reinwarth talk about the technologies that enable employees working remotely or from home access sensible corporate information from personal devices without compromises...
Analyst Chat #32: Data Management and Data Lineage - The Foundation for Big Data Governance and Security
Analyst Chat
Analyst Chat #32: Data Management and Data Lineage - The Foundation for Big Data Governance and Security
Matthias Reinwarth and Martin Kuppinger talk about governance and security of data across a variety of sources and formats and the need for maintaining data lineage across its complete life cycle.
The Latest Twitter “Hack” Raises Inconvenient Questions
Blog
The Latest Twitter “Hack” Raises Inconvenient Questions
It looks like the whole world is currently talking (at least, tweeting) about the latest large-scale Twitter hack. High profile accounts of the likes of Barack Obama, Joe Biden, Bill Gates, and...
Analyst Chat #30: Consent Management Done Right
Analyst Chat
Analyst Chat #30: Consent Management Done Right
Graham Williamson and Matthias Reinwarth talk about consent: what does it mean for identity professionals, service providers or lawyers and how to reconcile all those different views in modern...
Getting a Grip on Your Big Data – Informatica Announces Acquisition of Compact Solutions
Blog
Getting a Grip on Your Big Data – Informatica Announces Acquisition of Compact Solutions
Informatica just announced that they agreed to acquire Compact Solutions, a vendor of Enterprise Metadata Management with engineering and professional services being based out of Krakow, Poland....
The Information Protection Life Cycle and Framework: Monitor and Detect
Leadership Brief
The Information Protection Life Cycle and Framework: Monitor and Detect
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...
Analyst Chat #16: Enterprise Databases in the Cloud
Analyst Chat
Analyst Chat #16: Enterprise Databases in the Cloud
Matthias Reinwarth and Alexei Balaganski talk about making the right choice of a database engine to power your next cloud project.
Analyst Chat #1: How to Protect Data in a Hostile World
Analyst Chat
Analyst Chat #1: How to Protect Data in a Hostile World
In the first official episode of the KuppingerCole Analyst Chat podcast,  Matthias Reinwarth and John Tolbert are talking about the challenges of data protection in modern times.
High Assurance MFA Options for Mobile Devices
Blog
High Assurance MFA Options for Mobile Devices
In recent years much of the focus in the authentication space has been on MFA, mobile devices, and biometrics. Many technical advances have been made which also serve to increase usability and...
Will 2020 Be the Year of Oracle Cloud?
Blog
Will 2020 Be the Year of Oracle Cloud?
Recently I had an opportunity to attend the Next Generation Cloud Summit, an event organized by Oracle in Seattle, WA for industry analysts to learn about the latest developments in Oracle Cloud...
Applying the Information Protection Life Cycle and Framework to CCPA
Blog
Applying the Information Protection Life Cycle and Framework to CCPA
The California Consumer Privacy Act (CCPA) became effective on January 1, 2020. Enforcement is slated to start by July 1, 2020. CCPA is complex regulation which does bear some similarities with EU...
The Information Protection Life Cycle and Framework
Blog
The Information Protection Life Cycle and Framework
The Information Protection Life Cycle (IPLC) and Framework describes the phases, methods, and controls associated with the protection of information. Though other IT and cybersecurity frameworks...
Previous
4 5 6 7 8 9 10 Next