Executive View
ManageEngine Log360
Log360 from ManageEngine is a tightly integrated suite of log management and network security analytics tools. Complementing SIEM capabilities with EDR, DLP, and even SOAR function...
Buyer's Compass
Endpoint Detection & Response (EDR)
Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help de...
Leadership Brief
Top Cyber Threats
The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using...
Buyer's Compass
Endpoint Protection
Malware remains a global cybersecurity threat. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements f...
Executive View
Vormetric Application Crypto Suite
Encryption, tokenization, and data masking are essential capabilities needed in today’s highly regulated environments. Protecting sensitive information requires these capabilities,...
Executive View
ObserveIT Insider Threat Management
ObserveIT Insider Threat Management is a platform that combines the functionality of traditional User Behavior Analytics (UBA) and Data Loss Prevention (DLP) products in a lightwei...
Executive View
MinerEye Data Tracker
MinerEye DataTracker is an AI-based application that identifies, classifies, and tracks unstructured information. It creates cluster of similar content across data sources and anal...
Executive View
Exploring the Microsoft Azure Information Protection Landsca...
Microsoft Azure Information Protection creates a viable user experience for data classification and labeling of Office documents and emails. It enables sensitive data discovery; in...
Whitepaper
Protecting the keys to your kingdom against cyber-attacks an...
All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due...