Please choose your search criteria and click on "search" or browse all reports

Whitepaper

Whitepaper

California Consumer Privacy Act: The Need for Data-Centric Security

CCPA is the latest in a series of global privacy regulations. It comes with new requirements for dealing with personal data and is accompanied by severe penalties. Thus, businesses must take appropriate action to comply with CCPA. While handling consent and opt-outs are at the forefront, successful mitigation of risks starts with data-centric security – it is about understanding where personal data resides and encrypting or anonymizing that data whenever possible. This is where technology, such as data tokenization becomes an essential element for every business. [...]

Advisory_Note

Advisory Note

Future of Identity Management

Digital identities are at the core of Digital Transformation, Information Security and Privacy, and therefore it has never been more important for enterprises to ensure they have the capability to manage identities effectively and efficiently in a rapidly changing business, regulatory and IT environment. This Advisory Note looks at the main trends and challenges to help businesses evolve their Identity Management strategies to become well-placed to meet existing, new, emerging and future requirements. [...]

Executive_View

Executive View

Axiomatics APS

Axiomatics provides a complete enterprise-grade dynamic authorization solution that can address an organization's breadth of access control needs. The Axiomatics Policy Server (APS) makes available a suite of tools and services to manage an Attribute Based Access Control (ABAC) policy life-cycle efficiently both on-premises and in the cloud. [...]

Executive_View

Executive View

TrueFort Fortress XDR

TrueFort Fortress XDR is an application detection and response platform offering integrated application behavior analysis and security for real-time visibility into critical business applications, early detection of anomalous and malicious behaviors, and proactive tuning of security policies to prevent them from turning into data breaches. [...]

top