Big Data Security & Governance

Blog

Big Data and Information Security Study

Since the notion of a corporate security perimeter has all but disappeared in the recent years thanks to the growing adoption of cloud and mobile services, information security has experienced a profound paradigm shift from traditional perimeter protection tools towards monitoring and…

Press Release

Analyst Companies publish Survey about Big Data and Information Security

Wiesbaden / Wuerzburg, November 17, 2016 - KuppingerCole Ltd., an international and independent analyst organization with a strong focus on Information Security, Identity and Access Management as well as all areas concerning the Digital Transformation, together with BARC, a leading…

Survey

KuppingerCole und BARC gemeinsame Studie: Big Data und Informationssicherheit - 74001

Angesichts immer fortschrittlicherer und häufigerer Cyber-Angriffe sowie der Tatsache, dass die traditionelle Idee des Sicherheitsperimeters fast gänzlich ausgestorben ist, müssen Unternehmen ihre Strategien in Bezug auf Cyber-Sicherheit überdenken. Neue Lösungen…

Survey

KuppingerCole and BARC Joint Study: Big Data and Information Security - 74001

As cyber-attacks are becoming increasingly advanced and persistent, and the traditional notion of a security perimeter has all but ceased to exist, organizations have to rethink their cybersecurity strategies. The new Real-Time Security Intelligence solutions are combining Big Data and…

Webcast

Big Data – Bigger Risks?

Big Data technologies were invented to store and rapidly process the vast amount of data available today into useful “Smart” Information. What is common across these technologies is that their initial aims are focused on data processing capabilities rather than security and…

Webinar

Oct 13, 2016: Big Data – Bigger Risks?

Organizations are using Big Data to better understand their customers, to improve their products and to optimize their operations. However, Big Data technologies were conceived and designed for scalability and performance rather than security. You need to take steps to secure your Smart…

Webcast

Patrick Parker - Reimagining Identity and Access Management Processes with Algorithms

We are on the brink of a machine learning revolution in which computers won't just speed up existing security processes but enable the automation of processes and decisions too complex for the human mind to imagine. The machine-reengineering revolution will leverage powerful algorithms and…

Webcast

Dr. Carsten Bange - How Big Data Technology can help Increasing Cyber Attack Resilience

Big Data meets Security: Analyzing systems logs to understand behavior has become one of the main applications of big data technology. Open source initiatives as well as commercial tools and applications for big data integration, collection and analytics become more important building…

Webcast

Alles zu Consumer Identity Management

Mittlerweile sind die meisten Unternehmen in der Lage, sicher mit den Identitäten ihrer Mitarbeiter umzugehen. Doch die Handhabung von Kundenidentitäten, deren Anzahl oft in die Millionen geht, stellt noch immer eine Herausforderung für die meisten Unternehmen dar. Mehr Identitäten, der…

Webinar

Apr 21, 2016: EIC 2016: Alles zu Consumer Identity Management

Mittlerweile sind die meisten Unternehmen in der Lage, sicher mit den Identitäten ihrer Mitarbeiter umzugehen. Doch die Handhabung von Kundenidentitäten, deren Anzahl oft in die Millionen geht, stellt noch immer eine Herausforderung für die meisten Unternehmen dar. Mehr Identitäten, der…

Executive View

Executive View: Centrify for Big Data - 71531

Centrify Server Suite integrates Hadoop and NoSQL clusters into Microsoft Active Directory for user authentication, authorization and auditing.


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance

We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance

If the line "We are detective" only reminds you of "guilty pleasure" radio songs from the 1980s, despite the fact that you are responsible for cybersecurity or compliance in your company, then you should read on. In any case, you probably should read on because this is a trend that is becoming increasingly important in times of growing uncertainty and loss of trust – in contracts, in companies in the supply chain, in "the Internet", and in nation-states. Trust as the foundation for [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00