Article No. / Date
Articles
bc80198

Buyer's Compass

Buyer’s Compass: Core Features of Privacy and Consent Manage...

Building a trust-filled and transparent relationship with end-users depends now more than ever on Privacy and Consent Management solutions. These services accomplish many tasks suc...

lb80377

Leadership Brief

The Information Protection Life Cycle and Framework: Dispose

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

lb80374

Leadership Brief

The Information Protection Life Cycle and Framework: Monitor...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

ev80178

Executive View

Indeed Certificate Manager

Indeed Certificate Manager is a platform for centralized management of enterprise public key infrastructures. Its modular, hardware-agnostic architecture and innovative remote mana...

ev71313

Executive View

IRM-Prot-On

Sharing enterprise information is both a security risk and a necessity of the modern enterprise. IRM-Prot-On of Grupo CMC is a strong provider of enterprise information protection...

ev80400

Executive View

R&S®Trusted Gate by Rohde & Schwarz Cybersecurity

Transparent, data-centric security for untrusted infrastructures. Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (e.g. Mic...

lb80370

Leadership Brief

Introduction to the Information Protection Life Cycle and Fr...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

lb80260

Leadership Brief

Optimizing your Cybersecurity Spending

Prioritizing cybersecurity portfolio expenditures can be a very complex process. At best, the investments should be as low as needed but high enough to be prepared for future attac...

bc80213

Buyer's Compass

Endpoint Detection & Response (EDR)

Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help de...

an80263

Advisory Note

The Future of Cryptocurrencies

Cryptocurrencies remain a speculative asset, but the launch of Facebook’s Libra could upset the status quo. There are many business opportunities which would stem from widespread a...

lb72574

Leadership Brief

Top Cyber Threats

The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using...

an80110

Buyer's Compass

Endpoint Protection

Malware remains a global cybersecurity threat. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements f...

ev80036de

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Verlässliche Kontrolle und Monitoring sensibler Informationen, die in öffentlichen Clouds und Kollaborationstools (Microsoft SharePoint, Office 365) gespeichert sind, durch Virtual...

ev70365

Executive View

AWS Certificate and Key Management

A suite of fully managed encryption key and TLS certificate management services natively integrated with over 50 other AWS services to ensure data protection and regulatory complia...

ev79069

Executive View

Vormetric Application Crypto Suite

Encryption, tokenization, and data masking are essential capabilities needed in today’s highly regulated environments. Protecting sensitive information requires these capabilities,...

ev80036

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (SharePoint, Office 365) through virtualization, encryption and fragmentati...

ev80007

Executive View

comforte AG SecurDPS Enterprise

comforte AG SecurDPS Enterprise is a highly scalable data protection platform that combines stateless tokenization technology and hardened fault-tolerant architecture to ensure sec...

lc70967

Leadership Compass

Cloud-based MFA Solutions

This report provides an overview of the market for Cloud-based Multi-Factor Authentication (MFA) Solutions and provides you with a compass to help you to find the service that best...

ev79038

Executive View

ObserveIT Insider Threat Management

ObserveIT Insider Threat Management is a platform that combines the functionality of traditional User Behavior Analytics (UBA) and Data Loss Prevention (DLP) products in a lightwei...

ev79057

Executive View

WidasConcepts cidaas

WidasConcepts offers a complete consumer identity and access management solution: cidaas. cidaas is developed and hosted in Germany. cidaas contains most standard and many innova...

ev79063

Executive View

MinerEye Data Tracker

MinerEye DataTracker is an AI-based application that identifies, classifies, and tracks unstructured information. It creates cluster of similar content across data sources and anal...

ev72540

Executive View

Exploring the Microsoft Azure Information Protection Landsca...

Microsoft Azure Information Protection creates a viable user experience for data classification and labeling of Office documents and emails. It enables sensitive data discovery; in...

wp70327de

Whitepaper

Datenschutz-Grundverordnung (DSGVO): Mehr als nur Consent Ma...

Die DSGVO oder EU GDPR (General Data Protection Regulation), die ab dem 28. Mai 2018 voll wirksam ist, wird derzeit vor allem mit den Zustimmungsregeln zur Nutzung personenbezogene...

wp72613

Whitepaper

Protecting the keys to your kingdom against cyber-attacks an...

All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due...

ev71320

Executive View

TITUS Classification for Mobile

TITUS Classification for Mobile is a solution that not only supports classification of documents and email on both iOS and Android platforms, but also delivers a secure document st...

ev70619

Executive View

eperi Encryption Gateway

eperi provides an encryption gateway for data stored in the cloud, based on a unique flexible approach based on templates that specify which data should be encrypted and how. Combi...

ev70294

Executive View

PingIdentity’s PingDirectory

PingDirectory provides a flexible and scalable base for IAM and customer IAM. With advanced functions for encryption, load-balancing, and virtual directory, PingDirectory can meet...

ev71256

Executive View

Indeed AirKey Enterprise

AirKey Enterprise is a software smart card platform that is 100% compatible with existing standards and APIs for traditional smart cards, enabling high security, low cost, and unif...

an71606

Advisory Note

The Blockchain and Life Management Platforms

The core features of blockchains - decentralization and algorithmic consensus – can enable the creation of Life Management Platforms (LMPs) with better security and availability, a...

lb72013

Leadership Brief

Information Rights Management – Ready for Prime Time?

Information Rights Management (IRM) is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source -...

top