Executive View
ManageEngine Log360
Log360 from ManageEngine is a tightly integrated suite of log management and network security analytics tools. Complementing SIEM capabilities with EDR, DLP, and even SOAR function...
Leadership Compass
Privacy and Consent Management
This report provides an overview of the market for Privacy and Consent Management platforms and provides you with a compass to help you to find the solution that best meets your ne...
Buyer's Compass
Buyer’s Compass: Core Features of Privacy and Consent Manage...
Building a trust-filled and transparent relationship with end-users depends now more than ever on Privacy and Consent Management solutions. These services accomplish many tasks suc...
Leadership Brief
The Information Protection Life Cycle and Framework: Dispose
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...
Leadership Brief
The Information Protection Life Cycle and Framework: Monitor...
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...
Executive View
Indeed Certificate Manager
Indeed Certificate Manager is a platform for centralized management of enterprise public key infrastructures. Its modular, hardware-agnostic architecture and innovative remote mana...
Executive View
IRM-Prot-On
Sharing enterprise information is both a security risk and a necessity of the modern enterprise. IRM-Prot-On of Grupo CMC is a strong provider of enterprise information protection...
Executive View
R&S®Trusted Gate by Rohde & Schwarz Cybersecurity
Transparent, data-centric security for untrusted infrastructures. Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (e.g. Mic...
Leadership Brief
Introduction to the Information Protection Life Cycle and Fr...
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...
Leadership Brief
Optimizing your Cybersecurity Spending
Prioritizing cybersecurity portfolio expenditures can be a very complex process. At best, the investments should be as low as needed but high enough to be prepared for future attac...
Buyer's Compass
Endpoint Detection & Response (EDR)
Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help de...
Advisory Note
The Future of Cryptocurrencies
Cryptocurrencies remain a speculative asset, but the launch of Facebook’s Libra could upset the status quo. There are many business opportunities which would stem from widespread a...
Leadership Brief
Top Cyber Threats
The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using...
Buyer's Compass
Endpoint Protection
Malware remains a global cybersecurity threat. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements f...
Executive View
R&S®Trusted Gate von Rohde & Schwarz Cybersecurity
Verlässliche Kontrolle und Monitoring sensibler Informationen, die in öffentlichen Clouds und Kollaborationstools (Microsoft SharePoint, Office 365) gespeichert sind, durch Virtual...
Executive View
AWS Certificate and Key Management
A suite of fully managed encryption key and TLS certificate management services natively integrated with over 50 other AWS services to ensure data protection and regulatory complia...
Executive View
Vormetric Application Crypto Suite
Encryption, tokenization, and data masking are essential capabilities needed in today’s highly regulated environments. Protecting sensitive information requires these capabilities,...
Executive View
R&S®Trusted Gate von Rohde & Schwarz Cybersecurity
Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (SharePoint, Office 365) through virtualization, encryption and fragmentati...
Executive View
comforte AG SecurDPS Enterprise
comforte AG SecurDPS Enterprise is a highly scalable data protection platform that combines stateless tokenization technology and hardened fault-tolerant architecture to ensure sec...
Leadership Compass
Cloud-based MFA Solutions
This report provides an overview of the market for Cloud-based Multi-Factor Authentication (MFA) Solutions and provides you with a compass to help you to find the service that best...
Executive View
ObserveIT Insider Threat Management
ObserveIT Insider Threat Management is a platform that combines the functionality of traditional User Behavior Analytics (UBA) and Data Loss Prevention (DLP) products in a lightwei...
Executive View
WidasConcepts cidaas
WidasConcepts offers a complete consumer identity and access management solution: cidaas. cidaas is developed and hosted in Germany. cidaas contains most standard and many innova...
Executive View
MinerEye Data Tracker
MinerEye DataTracker is an AI-based application that identifies, classifies, and tracks unstructured information. It creates cluster of similar content across data sources and anal...
Executive View
Exploring the Microsoft Azure Information Protection Landsca...
Microsoft Azure Information Protection creates a viable user experience for data classification and labeling of Office documents and emails. It enables sensitive data discovery; in...
Whitepaper
Datenschutz-Grundverordnung (DSGVO): Mehr als nur Consent Ma...
Die DSGVO oder EU GDPR (General Data Protection Regulation), die ab dem 28. Mai 2018 voll wirksam ist, wird derzeit vor allem mit den Zustimmungsregeln zur Nutzung personenbezogene...
Whitepaper
Protecting the keys to your kingdom against cyber-attacks an...
All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due...
Executive View
TITUS Classification for Mobile
TITUS Classification for Mobile is a solution that not only supports classification of documents and email on both iOS and Android platforms, but also delivers a secure document st...
Executive View
eperi Encryption Gateway
eperi provides an encryption gateway for data stored in the cloud, based on a unique flexible approach based on templates that specify which data should be encrypted and how. Combi...
Executive View
PingIdentity’s PingDirectory
PingDirectory provides a flexible and scalable base for IAM and customer IAM. With advanced functions for encryption, load-balancing, and virtual directory, PingDirectory can meet...
Executive View
Indeed AirKey Enterprise
AirKey Enterprise is a software smart card platform that is 100% compatible with existing standards and APIs for traditional smart cards, enabling high security, low cost, and unif...
Advisory Note
The Blockchain and Life Management Platforms
The core features of blockchains - decentralization and algorithmic consensus – can enable the creation of Life Management Platforms (LMPs) with better security and availability, a...
Leadership Brief
Information Rights Management – Ready for Prime Time?
Information Rights Management (IRM) is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source -...