Information Protection

Executive View

Executive View: Druva inSync - 71131

Druva’s approach to information protection is quite unique among traditional solutions, since instead of maintaining a centralized data storage and enabling secure access to it from outside, inSync maintains a centralized snapshot of data backed up from all endpoints and operates on…

Webinar

Jul 30, 2014: Identity Managed Data Loss Prevention – sleep well at night

It’s never been easier to control who has access to what, who authorised it, who’s access hasn’t been removed and to generate reports on it all. We’ll look at the direction of technological and standards development and discuss the ramifications – what do you have to do to exploit the potential?

Webcast

Life Management Platforms - How to Reach the Critical Mass

Marcel van Galen, Qiy Foundation Peter Mark Graham, Verizon Enterprise Solutions Dr. Maciej Machulak, Cloud Identity Limited Drummond Reed, Connect.Me

Advisory Note

Advisory Note: Connected Enterprise Step-by-step - 70999

Extending your current Access Management infrastructure gradually to support the emerging requirements of the new ABC – Agile Businesses: Connected – with a standard infrastructure. Supporting Cloud Services, APIs, and more.

Leadership Compass

Leadership Compass: Enterprise Key and Certificate Management - 70961

Enterprise Key and Certificate Management (EKCM) is made up of two niche markets that are converging. This process still continues, and as with all major change of IT market segments, is driven by customer requirements. These customer requirements are driven by security and compliance…

Executive View

Executive View: NextLabs Control Center - 70847

NextLabs is a US-based vendor with headquarters in San Mateo, CA, and a strong footprint as well in the APAC (Asia/Pacific) region. The company focuses on what they call “Information Risk Management”. In fact, the focus is more on Information Risk Mitigation, i.e. practical…

Webcast

Secure Information Sharing: Microsoft Azure RMS Enabling your Organisation to Securely Share Any Document with Anyone

KuppingerCole Webinar recording

Executive View

Executive View: Venafi Enterprise Key and Certificate Management - 70995

Unlike the majority of their competitors, Venafi came from an ECM background to become a market leader in their field. Their main competition evolved from EKM devices and HSM manufacturers’ acquisition and consolidation of products. As a result Venafi has a well-developed software…

Blog

Secure Information Sharing: Which approach to choose?

There are various approaches to Secure Information Sharing (SIS), as I have explained in previous posts. However, which one is the best? As always, there is no simple answer. It depends on the requirements of the customers. Nevertheless, the various product categories have their strengths…

Blog

The need for Secure Information Sharing

A while ago, I wrote about the changing market for Secure Information Sharing. I also recently published a report on Microsoft Azure RMS, one of the most important products in that market segment, and further reports will follow. The first question is: What is Secure Information Sharing…

Blog

Microsoft RMS Security and Confidentiality

Microsoft Rights Management Services (RMS) is a solution that might help Secure Information Sharing become a topic for the masses, at least at the enterprise level. I just recently wrote a report on the product. However, as with any Information Security technology – especially ones that are…

Webinar

Mar 11, 2014: Secure Information Sharing: Microsoft Azure RMS enabling your organization to securely share any document with anyone

The challenge of all organizations in these days of connected businesses and their need for agility in changing markets – the new ABC: Agile Business, Connected – is creating new challenges for IT. One of these challenges is securely sharing information.

Executive View

Executive View: Exostar Services for Life Sciences - 70878

Industry networks for secure collaboration are not a new thing. The evolution of these networks started back in the late ‘90s for some industries. While the initial focus sometimes was more about B2B marketplaces, enabling secure collaboration and managing the identities of the…

Executive View

Executive View: Microsoft Azure RMS - 70976

Secure Information Sharing is the number one challenge these days in Information Security. Organizations on the one hand must enable flexible collaboration with business partners as part of their evolution towards agile, connected businesses. On the other hand, the increasing Information…

Advisory Note

Advisory Note: Enterprise Key and Certificate Management - 70885

Issues faced by CISOs when looking for Enterprise Key and Certificate Management systems, and how to address them.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

How to Train Your AI to Mis-Identify Dragons

This week Skylight Cyber disclosed that they were able to fool a popular “AI”-based Endpoint Protection (EPP) solution into incorrectly marking malware as safe. While trying to reverse-engineer the details of the solution's Machine Learning (ML) engine, the researchers found that it contained a secondary ML model added specifically to whitelist certain types of software like popular games. Supposedly, it was added to reduce the number of false positives their "main engine" was [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00