Advisory Note: Information Security Predictions and Recommendations 2015 and beyond - 71045

Report Details

Recommendations for investing in Information Security in 2015 and beyond. Predictions of the trends and hypes in Information Security in 2015. Advice on which of these trends and hypes to follow.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
May 05, 2015

Advisory Note: Information Security Predictions and Recommendations 2015 and beyond - 71045

Recommendations for investing in Information Security in 2015 and beyond. Predictions of the trends and hypes in Information Security in 2015. Advice on which of these trends and hypes to follow.

€995.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

Latest Related Reports

Leadership Compass

Leadership Compass: Cloud Access Security Brokers - 72534

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

Leadership Brief

Leadership Brief: Securing PSD2 APIs - 72513

The Revised Payment Service Directive (PSD2) mandates that banks provide APIs for Account Information Service Providers (AISPs), Payment Initiation Service Providers (PISPs) and any Third Party Providers (TPPs) to use.

Executive View

Executive View: Watchful Software RightsWatch - 70848

RightsWATCH automatically classifies and protects any file format in accordance with corporate policy based on content, context or metadata-aware policy rules, extending the Microsoft Right Management facility to ensure that sensitive and confidential information is identified and…

Executive View

Executive View: CipherCloud Trust Platform - 72530

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services.…

Leadership Compass

Leadership Compass: Cloud Access Security Brokers - 71138

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

Executive View

Executive View: Sophos Protection for Amazon Web Services - 71680

Sophos UTM is a suite of integrated security applications that provides the same layered protection for applications and data hosted in the AWS cloud as for on premise deployments. This report provides a review of the functionality provided by this set of products and an assessment of its…

Executive View

Executive View: Forum Systems Sentry and Identity Federation - 72511

Sentry, Forum Systems flagship product, implements a wide range of features: support for a wide range of federation use case scenarios are complemented with API Gateway functionality and mature Web Access Management services.

Executive View

Executive View: Signicat Connect, Assure, Sign & Preserve - 72504

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. With these services, Signicat supports organizations in transforming paper-based processes to cloud-based services, while…

Executive View

Executive View: PointSharp Mobile Gateway - 71508

PointSharp Mobile Gateway is an enterprise mobility solution that provides strong authentication and easy, yet secure, mobile access to Microsoft Exchange and Skype for Business, both on-premise and in the cloud.  

Executive View

Executive View: AirWatch Content Locker - 71505

For organizations trying to provide an attractive user experience while protecting corporate information, the continuing rise in popularity of mobile devices, connecting from both inside and outside the corporate network, is a trend that can be frustrating. For organizations with…