Article No. / Date
Articles
bc80213

Buyer's Compass

Endpoint Detection & Response (EDR)

Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help de...

lb72574

Leadership Brief

Top Cyber Threats

The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using...

an80110

Buyer's Compass

Endpoint Protection

Malware remains a global cybersecurity threat. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements f...

ev79069

Executive View

Vormetric Application Crypto Suite

Encryption, tokenization, and data masking are essential capabilities needed in today’s highly regulated environments. Protecting sensitive information requires these capabilities,...

ev79038

Executive View

ObserveIT Insider Threat Management

ObserveIT Insider Threat Management is a platform that combines the functionality of traditional User Behavior Analytics (UBA) and Data Loss Prevention (DLP) products in a lightwei...

ev79063

Executive View

MinerEye Data Tracker

MinerEye DataTracker is an AI-based application that identifies, classifies, and tracks unstructured information. It creates cluster of similar content across data sources and anal...

ev72540

Executive View

Exploring the Microsoft Azure Information Protection Landsca...

Microsoft Azure Information Protection creates a viable user experience for data classification and labeling of Office documents and emails. It enables sensitive data discovery; in...

wp72613

Whitepaper

Protecting the keys to your kingdom against cyber-attacks an...

All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due...

top