Executive View: MinerEye Data Tracker - 79063

Report Details

MinerEye DataTracker is an AI-based application that identifies, classifies, and tracks unstructured information. It creates cluster of similar content across data sources and analyzes information about classified data in those clusters, to triggers applications such as DLP, IRM and Access control tools. It also provides deep insight into unstructured data based on sophisticated dashboards. With that, MinerEye Data Tracker can form a substantial element in a Data Governance strategy.


Date Title Price
Aug 08, 2018

Executive View: MinerEye Data Tracker - 79063

MinerEye DataTracker is an AI-based application that identifies, classifies, and tracks unstructured information. It creates cluster of similar content across data sources and analyzes information about classified data in those clusters, to triggers applications such as DLP, IRM and Access…

€190.00
excl. VAT
Get Access
Mastercard Visa PayPal INVOICE

Latest Related Reports

Executive View

Executive View: 1Kosmos BlockID - 79064

1Kosmos BlockID is one of the first commercial implementations of a blockchain-based identity solution that works for both consumers and employees. It is well thought-out and implements the fundamental concepts of Self Sovereign Identity. It integrates well with existing identity and…

Executive View

Executive View: One Identity Safeguard - 79042

One Identity is one of the leading vendors in the field of IAM. With their recent acquisition of Balabit and the integration of their Privilege Management offerings into the Safeguard product portfolio, the company positions itself among the leaders in the Privilege Management market,…

Executive View

Executive View: RSA® Identity Governance and Lifecycle - 71052

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities and their access, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to…

Advisory Note

Architecture Blueprint: Access Governance and Privilege Management - 79045

Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established governance silos within organizations enables full enforcement of Segregation of Duties rules for both business and…

Whitepaper

Whitepaper: Saviynt: IAM for the Hybrid Reality. Efficiently Managing On-Premise IT and the Cloud - 70364

Most organizations today run in a hybrid IT environment. However, their IAM solutions have repeatedly been built for the traditional on-premises IT. IAM needs to become a service that supports the hybrid IT infrastructure organizations run today. This whitepaper describes the paradigm…

Executive View

Excutive View: Axiomatics APS - 70346

Axiomatics provides a complete enterprise-grade dynamic authorization solution that can address an organization's breadth of access control needs. The Axiomatics Policy Server (APS) makes available a suite of tools and services to manage an Attribute Based Access Control (ABAC) policy…

Whitepaper

Whitepaper: GDPR Herausforderungen mit Delphix meistern - 70368

Mit der neuen Datenschutz-Grundverordnung (GDPR) führt die EU strenge Kontrollen bezüglich der Verarbeitung personenbezogener Daten von EU-Bürgern sowie hohe Geldstrafen bei Nicht-Einhaltung eben dieser ein. Die Compliance der Grundverordnung erfordert kostenintensive…

Whitepaper

Whitepaper: Meeting GDPR Challenges with Delphix - 70368

GDPR introduces stringent controls over the processing of PII relating to people resident in the EU with high penalties for non-compliance.  Compliance requires costly controls that can be justified for processing of PII with direct business benefits.  However, using PII for…

Whitepaper

Point of View Paper: One Identity - The Journey to IAM Success - 70226

Identity and Access Management (IAM) is many things. For some it’s all about streamlining the user experience through technologies and practices that make it easier for them to securely logon. For others, IAM is all about identity lifecycle management – ensuring that accounts…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Decentralized Identity 101: What It Is and Why It Matters

Guest Author: Vinny Lingham, CEO, Civic Technologies Bitcoin. Blockchain. Crypto. Decentralization. Tokens. A lot of buzzwords have emerged alongside the rise of blockchain technology. Yet, there is often a lack of context about what those terms actually mean and the impact they will have. [...]

Latest Insights

Hot Topics

Spotlight

Compliance, Risk & Security Learn more

Compliance, Risk & Security

Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical, qualitative and infrastructural conditions of the services provided. Therefore, it is difficult to meet all compliance requirements, particularly within the fields of data protection and data security. The decisive factors are transparency, controllability and influenceability of the service provider and his [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00