Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Search Results

Cysiv SOCaaS

Executive View

Cysiv SOCaaS

Cysiv SOCaaS is a Security Operations Center (SOC) as a Service offering based on Cysiv's cloud-native, co-managed platform that is highly scalable, supports multi-tenancy, and ingests telemetry...

SAP Enterprise Threat Detection

Executive View

SAP Enterprise Threat Detection

In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and operating system...

R&S®Trusted Gate - Secure Glocalization by  Rohde & Schwarz Cybersecurity

Executive View

R&S®Trusted Gate - Secure Glocalization by Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity offers reliable management of regulated and sensitive information to promote compliant collaboration and file sharing in unified SharePoint platforms for organizations...

Oxyliom Solutions GAÏA Advanced Identity Management

Executive View

Oxyliom Solutions GAÏA Advanced Identity Management

The GAÏA Advanced Identity Management component of the GAÏA Trust Platform by Oxyliom Solutions integrates the key elements of identity management required for regulatory compliance and a modern...

Archer Integrated Risk Management

Executive View

Archer Integrated Risk Management

Today’s GRC solutions offer better alignment with corporate objectives, increased transparency, superior information risk management and more cost-effective compliance. This paper looks at the...

Unified Endpoint Management (UEM)

Leadership Compass

Unified Endpoint Management (UEM)

This report provides an overview of the market for Unified Endpoint Management (UEM) and provides you with a compass to help you to find the solution that best meets your needs. We examine the...

Microsoft Azure Active Directory

Executive View

Microsoft Azure Active Directory

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly delivered as...

Architecting your Security Operations Centre

Advisory Note

Architecting your Security Operations Centre

A security operations centre (SOC) is a dedicated team, usually operating 24x365, to detect and respond to cybersecurity incidents within your organisation that potentially affect your people and...

IRM-Prot-On

Executive View

IRM-Prot-On

Sharing enterprise information is both a security risk and a necessity of the modern enterprise. IRM-Prot-On of Grupo CMC is a strong provider of enterprise information protection services. The...

R&S®Trusted Gate by Rohde & Schwarz Cybersecurity

Executive View

R&S®Trusted Gate by Rohde & Schwarz Cybersecurity

Transparent, data-centric security for untrusted infrastructures. Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (e.g. Microsoft Office...

Stay Connected

KuppingerCole on social media

Related Content

Event Recording

Interview: Implications of Recent Court Ruling on EU-US Data Protection Umbrella Agreement

So I'd like to invite Mike Small with us. Hello, welcome. Hello, Annie. Thank you for inviting me. Well, thanks for showing up. We appreciate it. So I really appreciate you being willing to be here and share some of your thoughts on the fly. And so let's start at the beginning and give…

Event Recording

Dr. Matthias Artzt: Blockchain and GDPR – Tensions between Blockchain Technology and Data Protection Principles

Let's have a look at the agenda would like to talk you through a couple of, of points. Would you brief move on the next slide? Yes. So I would like to start with, with the use cases of blockchain technology and the financial sector, the now ed light on the questions, which blockchain player…

Blog

Privacy and Data Protection

As the world becomes more digital, and the right to privacy becomes enshrined in a growing number of laws and regulations around the world, organizations increasingly have to pay attention to protecting the privacy of individuals in all their data handling and processing. In the digital…

Event Recording

Privacy and Data Protection. What is this Thing Called Privacy?

Good afternoon to everybody. I will speak of privacy. I will speak of the world. Privacy. What privacy means, you know, I, I'm not a technologist. I am a psychiatrist philosopher, psycho Analyst, so that the, the worst person to speak of technological issues. And indeed, I will speak of…

Combined Session

Quantum computers: the ultimate opponent for data protection

The development of quantum computers is rapidly advancing. The threat this technology poses to existing encryption systems is becoming more and more concrete, even catching interest with the political world: Institutions such as the American NIST or the German BSI are looking for encryption…

Blog

CCPA: GDPR as a Catalyst for Improving Data Protection Outside the EU

It wasn't too long ago that discussions and meetings on the subject of digitization and consumer identity access management (CIAM) in an international environment became more and more controversial when it came to privacy and the personal rights of customers, employees and users. Back…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00