Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
No Security Without Confirmation
Many organizations still do not implement certificates to authenticate, encrypt data, or sign documents. Although it highly increases security. But nothing comes without challenges. Large-scale...
Learn more
Leadership Compass
Leadership Compass
Database and Big Data Security
This Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection and...
Learn more
Event Recording
Event Recording
Reduce Certification Fatigue with Effective Role Management
IAM and security leaders end up certifying far more access than necessary, owing to a failure to classify business resources. Furthermore, business users pay the price because they must spend an...
Learn more
Patrick Parker - The AI and Robotic Process Automation Revolution and the Upcoming Redesign of IAM
Event Recording
Patrick Parker - The AI and Robotic Process Automation Revolution and the Upcoming Redesign of IAM
The AI and Robotic Process Automation revolutions are in full swing with record growth in both sectors as well as an explosion of new startups in this space. Not to be left behind, existing...
Jason Rose - Realizing the full potential of Consumer Identity
Event Recording
Jason Rose - Realizing the full potential of Consumer Identity
Customer Experience is Everything and Everything is Digital. Digital transformation is now the center of marketing, advertising and sales strategy across every industry and region, with...
Jackson Shaw - Fire Safety and Cyber-Security – Smoke Detectors are Not Enough
Event Recording
Jackson Shaw - Fire Safety and Cyber-Security – Smoke Detectors are Not Enough
It takes most businesses over 6 months to detect a breach on their network. And while smoke detectors are proven to halve the death rate by fire, saving thousands of lives each year, detection is...
Eve Maler - The Evolution of Identity and its Importance for our Digital Lives
Event Recording
Eve Maler - The Evolution of Identity and its Importance for our Digital Lives
Identity is as old as mankind and adapted very well to its changing environments. From a simple look that determines who you are to a high frequency of multi-factor vehicle-to-vehicle...
Carmine Auletta - Identity & Digital Trust
Event Recording
Carmine Auletta - Identity & Digital Trust
Trust is essential for a society to function. It’s even more critical in a digital society where transactions take place between parties that can only rely on each other supplied digital...
Lukas Praml - Your Mobile Identity: Blockchain Ain't no Swiss Army Knife
Event Recording
Lukas Praml - Your Mobile Identity: Blockchain Ain't no Swiss Army Knife
Digital identity solutions are very wide spread and everybody is using them on a day to day basis. Mainly it can be distinguished between state issued IDs/eIDs which lack usability and are...
Christopher Spanton - Blockchain and the Business of Identity
Event Recording
Christopher Spanton - Blockchain and the Business of Identity
Identity and Access Management (IAM) within an enterprise environment presents complex challenges for any business. While new technologies, such as blockchain, have the potential to help solve...
Mo Ahddoud - SGN Securing Shared Credentials at The Heart of Digital Transformation
Event Recording
Mo Ahddoud - SGN Securing Shared Credentials at The Heart of Digital Transformation
The future of IT security will depend on CISOs who are brave enough to build a new security model that is both innovative and unconventional. Gas distribution company, SGN, is blazing a trail that...
An overview of the Leadership Compass: Endpoint Security Anti-Malware
Webinar Recording
An overview of the Leadership Compass: Endpoint Security Anti-Malware
Malware has been on the rise. Ransomware continues to grab the headlines. New malware variants proliferate by the millions. Old style manual malware analysis can't keep pace. But organizations are...
Cloud Data Protection Done Right: When Bringing Your Own Key Just Isn’t Enough
Webinar Recording
Cloud Data Protection Done Right: When Bringing Your Own Key Just Isn’t Enough
Data encryption is undoubtedly the most popular technology for securing data in the cloud, but also one of the most misunderstood ones. Although most cloud service providers offer their own...
Database Security: Protecting Your Company’s Core Competence in the Age of Digital Transformation
Webinar Recording
Database Security: Protecting Your Company’s Core Competence in the Age of Digital Transformation
Relational databases are still the most widespread technology for storing and managing business-critical digital information. Manufacturing process parameters, sensitive financial transactions or...
From Dumb Cookies to Informed Consent: Privacy-by-design as a Strategic Requirement
Event Recording
From Dumb Cookies to Informed Consent: Privacy-by-design as a Strategic Requirement
This panel includes a look at the GDPR requirements, with an emphasis on the business opportunities for creating closer customer relationships when moving to informed consent; including the...
Previous
4 5 6 7 8 9 10 Next