Advisory Note: Life Management Platforms: Control and Privacy for Personal Data - 70745

Report Details

Turning the Internet upside down and making privacy a fundamental layer of any networked interaction in the post Google & Facebook era. How the individuals will gain control. How social networks will have to adapt their business models. How privacy will return...

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
May 14, 2013

Advisory Note: Life Management Platforms: Control and Privacy for Personal Data - 70745

Turning the Internet upside down and making privacy a fundamental layer of any networked interaction in the post Google & Facebook era. How the individuals will gain control. How social networks will have to adapt their business models. How privacy will return...

€495.00
excl. VAT
Unavailable
Mastercard Visa PayPal INVOICE

Latest Related Reports

Executive View

Executive View: STEALTHbits® Products Overview - 70270

Securely governing access is increasingly important to ensure compliance as well as to defend against cyber-crime. STEALTHbits’ products provide a comprehensive set of solutions to address IT security risks covering Active Directory, Data Access Governance, Privileged Access…

Executive View

Executive View: VeriClouds CredVerify™ - 72567

Securely authenticating users remains a thorny problem and VeriClouds CredVerify service can provide a useful additional level of assurance.  There are many approaches, products and services for user authentication however, the CredVerify service is unique in what it offers.  

Leadership Brief

Leadership Brief: Cloud Provider Codes of Conduct and GDPR - 70276

Codes of Conduct  can help organizations choose between suppliers.   This report  compares two recently announced codes for cloud service providers and how  these relate to GDPR .

Leadership Compass

Leadership Compass: CIAM Platforms - 70305

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service…

Advisory Note

Advisory Note: The Blockchain and Life Management Platforms - 71606

The core features of blockchains - decentralization and algorithmic consensus – can enable the creation of Life Management Platforms (LMPs) with better security and availability, as well as promote wider public adoption by providing independently-verifiable proof of personal data…

Advisory Note

Advisory Note: EIC 2015 Trends and Hot Topics - 71301

10 Information Security topics that were central at European Identity & Cloud Conference 2015

Advisory Note

Advisory Note: Top Trends 2013-2014 IAM/IAG, Cloud, Privacy - 70782

As in the past years, KuppingerCole has worked out the Top Trends in IAM/IAG (Identity and Access Management/Governance), Cloud Computing, and Information Protection and Privacy. The most important trends are the massive increase in demand for support of the “Extended…

Product Report

Product Report: Qiy Independent Trust Framework - 70640

The ongoing trend of IT consumerization driven by growing adoption of mobile, social and cloud computing has made a profound impact on our society. It has brought many new challenges for both consumers and businesses, which are now struggling to adapt to the new demands for storing,…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Future-Proofing Your Cybersecurity Strategy

It’s May 25 today, and the world hasn’t ended. Looking back at the last several weeks before the GDPR deadline, I have an oddly familiar feeling. It seems that many companies have treated it as another “Year 2000 disaster” - a largely imaginary but highly publicized issue [...]

Latest Insights

Hot Topics

Spotlight

Compliance, Risk & Security Learn more

Compliance, Risk & Security

Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical, qualitative and infrastructural conditions of the services provided. Therefore, it is difficult to meet all compliance requirements, particularly within the fields of data protection and data security. The decisive factors are transparency, controllability and influenceability of the service provider and his [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00