Please choose your search criteria and click on "search" or browse all reports

Leadership_Brief

Leadership Brief

The Information Protection Life Cycle and Framework: Control Access

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the third in the series introducing the Information Protection Life Cycle and Framework. [...]

Executive_View

Executive View

Vectra Cognito

Vectra Cognito is a Network Detection and Response (NDR) platform supported by threat research and Artificial Intelligence (AI) in the form machine learning (ML) and Deep Learning for analyzing enterprise network traffic on premise and in the cloud to detect and respond to malicious activity by adversaries, with threat investigation and threat hunting capability. [...]

Leadership_Brief

Leadership Brief

What strategic role should Azure AD play in your org?

As access management and governance becomes more important for security and compliance reasons, businesses are looking for a single solution to manage both on-prem and cloud access. This Leadership Brief considers and strengths and weaknesses of Microsoft’s Azure Active Directory to help organizations decide whether or not this is a good strategic option to meet their specific needs. [...]

Executive_View

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Transparente, datenzentrische Sicherheit in nicht vertrauenswürdigen Infrastrukturen. Zuverlässige Kontrolle und Überwachung von sensiblen Informationen, die in öffentlichen Clouds und Kollaborationswerkzeugen (z.B. Microsoft Office 365, SharePoint, Teams) gespeichert sind. Virtualisierung, Verschlüsselung und Aufteilung von Daten, um eine sichere und bequeme Zusammenarbeit für Multi-Cloud-, firmeninterne und hybride Speicherumgebungen und echte Datensouveränität zu ermöglichen. [...]

top