Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
No Security Without Confirmation
Many organizations still do not implement certificates to authenticate, encrypt data, or sign documents. Although it highly increases security. But nothing comes without challenges. Large-scale...
Learn more
Leadership Brief
Leadership Brief
The Information Protection Life Cycle and Framework: Monitor and Detect
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...
Learn more
Event Recording
Event Recording
Reduce Certification Fatigue with Effective Role Management
IAM and security leaders end up certifying far more access than necessary, owing to a failure to classify business resources. Furthermore, business users pay the price because they must spend an...
Learn more
Zero Trust Reality Check: Secure Access for Hybrid IT
Webinar Recording
Zero Trust Reality Check: Secure Access for Hybrid IT
Workforce mobility and widespread adoption of distributed data center and cloud environments have introduced significant access control complexities and threats. Organizations are questioning the...
How to Handle Consent to Be Compliant With the GDPR and the Upcoming ePrivacy Regulation
Webinar Recording
How to Handle Consent to Be Compliant With the GDPR and the Upcoming ePrivacy Regulation
GDPR is here to stay and the new ePrivacy regulation is on the horizon, but many organizations are still not yet in full state of compliance. A core requirement for compliance with GDPR is the...
Impressions from the Oracle OpenWorld
Blog
Impressions from the Oracle OpenWorld
Recently I was in San Francisco again, attending the Oracle OpenWorld for the second time. Just like last year , I cannot but commend the organizers for making the event even bigger, more...
Buying Into Zero Trust? What You Need to Consider to Be Successful
Webinar Recording
Buying Into Zero Trust? What You Need to Consider to Be Successful
As organizations take on the digital transformation, trends such as mobility, proliferation of SaaS applications and cloud infrastructure are driving up the number of connected entities and...
Making Sense of the Top Cybersecurity Trends
Blog
Making Sense of the Top Cybersecurity Trends
With each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of their IT infrastructures...
Consumer Identity World (CIW) USA 2018 - Report
Blog
Consumer Identity World (CIW) USA 2018 - Report
Fall is Consumer Identity Season at KuppingerCole, just in time for holiday shopping. Last week we kicked off our 2018 tour in Seattle. The number of attendees and sponsors was well up over last...
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Webinar Recording
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
The Internet of Things is disrupting all industries and use cases; from customer IoT, to Industrial IoT. Companies are forced to become more innovative with their products whilst their services...
Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)
Webinar Recording
Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)
It is all about providing your customer a great experience so that they return to you and not to your competitor, who has never before been that close to your business. Anticipating, maybe even in...
The Digital Transformation and the Role of the CISO
Blog
The Digital Transformation and the Role of the CISO
Cybersecurity needs to be at the heart of the digital transformation, but organisational models will have to evolve Cybersecurity is in the process of becoming an essential component of any...
Securing your Hybrid IT Environment with Privileged Access Management
Webinar Recording
Securing your Hybrid IT Environment with Privileged Access Management
As your business grows, so does your IT footprint – both on-premises and in the cloud. This adds to the overall complexity of managing access to the newly acquired IT assets and applications...
Datendiebstahl, Malware, DSGVO - Unstrukturierte Daten Zwischen Kollaboration & Compliance
Webinar Recording
Datendiebstahl, Malware, DSGVO - Unstrukturierte Daten Zwischen Kollaboration & Compliance
Die Mengen an digitalen Daten, die Organisationen nun speichern und verarbeiten müssen, wachsen exponentiell. Dabei geht es nicht nur um die Digitalisierung bestehender Geschäftsprozesse...
Classification - the Intelligent Way to Ensure Strong Data Protection
Webinar Recording
Classification - the Intelligent Way to Ensure Strong Data Protection
As businesses are increasingly embracing the digital transformation, the volumes of information that a typical company has to collect, keep, transport and process is growing exponentially. Massive...
Previous
6 7 8 9 10 11 12 Next