Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
GPTs, Databases, and AI Agility
How to reconcile Generative AI proliferation with security and compliance requirements? Let's have a look at several potential approaches...
Learn more
Leadership Compass
Leadership Compass
Secrets Management
Secrets Management is a broad subject that covers any protected data or information that must not be divulged to others. In this document the term ‘secret’ refers to a software token, a key pair or...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #70: AdTech and Future Alternatives to 3rd Party Cookies
Annie Bailey and Matthias continue their conversation around privacy, targeted marketing and the end of the era of the 3rd party cookie, that they started two weeks ago. They discuss the...
Learn more
Endpoint Detection & Response (EDR)
Buyer's Compass
Endpoint Detection & Response (EDR)
Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help detect and...
Meet the Next-Generation Oracle
Blog
Meet the Next-Generation Oracle
Oracle OpenWorld 2019 has just wrapped yesterday, and if there is a single word that can describe my impressions of it, that would be “different”. Immediately noticeable was the...
How Do You Protect Your Notebook?
Blog
How Do You Protect Your Notebook?
The other day I found a notebook on a train. It was in a compartment on the seat of a first-class car. The compartment was empty, no more passengers to see, no luggage, nothing. And no, it...
Is Multilayered Cyber-Defense Out Already? Against Rising Breaches and Vulnerabilities, Data-Centric Security to the Rescue!
Webinar Recording
Is Multilayered Cyber-Defense Out Already? Against Rising Breaches and Vulnerabilities, Data-Centric Security to the Rescue!
As the growing number of high-profile data breaches indicates, even the largest companies are still struggling with implementing consistent enterprise-wide information security measures. Setting...
Could Less Data Be More Data?
Blog
Could Less Data Be More Data?
Data, a massive amount of data, seems to be the holy grail in building more sophisticated AI’s, creating human-like chatbots and selling more products. But is more data actually better? With...
Data Security and Governance (DSG) for Big Data and BI
Blog
Data Security and Governance (DSG) for Big Data and BI
Today, organizations are capturing trillions of bytes of data every day on their employees, consumers, services and operations through multiple sources and data streams. As organizations explore...
Building Trust by Design
Blog
Building Trust by Design
Trust has somehow become a marketing buzzword recently. There is a lot of talks about “redefining trust”, “trust technologies” or even “trustless models” (the...
Can Autonomous Improve Security Posture?
Blog
Can Autonomous Improve Security Posture?
Last week I attended the Oracle Open World Europe 2019 in London. At this event Andrew Sutherland VP of technology told us that security was one of the main reasons why customers were choosing...
CCPA: GDPR as a Catalyst for Improving Data Protection Outside the EU
Blog
CCPA: GDPR as a Catalyst for Improving Data Protection Outside the EU
It wasn't too long ago that discussions and meetings on the subject of digitization and consumer identity access management (CIAM) in an international environment became more and more...
Martin Kuppinger's Top 5 IAM Topics for 2019
Blog
Martin Kuppinger's Top 5 IAM Topics for 2019
Where to put your focus on in 2019
Five Steps to Building an Effective Insider Threat Program
Webinar Recording
Five Steps to Building an Effective Insider Threat Program
The greatest cybersecurity threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders - the contractors, third-party vendors, and...
Security vs. Innovation: Why Not Choose Both?
Webinar Recording
Security vs. Innovation: Why Not Choose Both?
In a world where businesses compete and succeed on the basis of application-driven innovation, enterprises are challenged to deliver software to market faster than ever before. Simultaneously,...
Previous
5 6 7 8 9 10 11 Next