Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

Webinar
Webinar
Bringing Data Back Under Control
Data is your organization’s most important asset, and yet it is increasingly held and processed outside of your control. Data security, resilience and storage is becoming increasingly challenging...
Learn more
Blog
Blog
The Latest Twitter “Hack” Raises Inconvenient Questions
It looks like the whole world is currently talking (at least, tweeting) about the latest large-scale Twitter hack. High profile accounts of the likes of Barack Obama, Joe Biden, Bill Gates, and...
Learn more
Executive View
Executive View
ShardSecure Microshard Technology
Organizations find themselves at the crossroads of data sovereignty and data privacy, resulting from cloud adoption. This has led to compliance with cross-border data protection laws and...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #65: A First Look at Homomorphic Encryption
Alexei Balaganski covers a broad range of security-related topics: from database, application and API security to information protection, cryptography and AI-based security automation. He joins...
Learn more
Analyst Chat #158: The Crown Jewels Are a Lie
Analyst Chat
Analyst Chat #158: The Crown Jewels Are a Lie
Is digital data really every organization's most precious possession, its "crown jewels"? Alexei Balaganski takes a different perspective towards a widely accepted opinion. He instead claims that...
Analyst Chat #157: How to Refine Data like Oil - Data Quality and Integration Solutions
Analyst Chat
Analyst Chat #157: How to Refine Data like Oil - Data Quality and Integration Solutions
Who has not heard of the statement that "Data is the new Oil". But oil needs to be refined and so does data. The challenge of gathering, integrating, cleansing, improving, and enriching data...
Data Quality and Integration Solutions
Leadership Compass
Data Quality and Integration Solutions
This report provides an overview of the market for Data Quality and Data Integration solutions that help in gathering, integrating, cleansing, improving, and enriching data across the complete...
ShardSecure Microshard Technology
Executive View
ShardSecure Microshard Technology
Organizations find themselves at the crossroads of data sovereignty and data privacy, resulting from cloud adoption. This has led to compliance with cross-border data protection laws and...
The HeatWave is Spreading
Blog
The HeatWave is Spreading
MySQL HeatWave is a managed database service created by Oracle that extends the standard MySQL engine with support for in-database high-performance transactional workloads, analytics, machine...
IAM Projects Done Right: Everything as a Service
Whitepaper
IAM Projects Done Right: Everything as a Service
Delivering on IAM is not always easy. Many organizations have experienced IAM projects stalling. An approach for one-stop-shopping can help, where the implementation, the IDaaS style deployment...
Why Your Organization Needs Data-centric Security
Whitepaper
Why Your Organization Needs Data-centric Security
Data-centric security is an alternative approach towards information protection that has emerged as a direct response to the increasingly obvious failure of traditional measures focusing on...
Analyst Chat #129: Market Compass Secure Collaboration
Analyst Chat
Analyst Chat #129: Market Compass Secure Collaboration
Secure Collaboration solutions focus on enabling data-centric security to facilitate virtual collaboration. Annie Bailey talks with Matthias about this market segment that provides increasingly...
Secure Collaboration
Market Compass
Secure Collaboration
This KuppingerCole Market Compass provides an overview of the products or service offerings in a certain market segment. This Market Compass covers Secure Collaboration solutions, focusing on...
Fully Homomorphic Encryption at a Glance
Blog
Fully Homomorphic Encryption at a Glance
With today's technology, we can effectively encrypt data in rest and data in motion. What about data in use? There the Fully Homomorphic Encryption (FHE) comes into play. This guide shows you how...
1 2 3 4 5 6 7 Next