Asset Type: Industry Reports

IDC Report: Data-Centric Secure Coming of Age, Enabled with Automation

This technology spotlight from IDC Analyst Frank Dickson will help your organization navigate the challenges around determining what data to protect and the appropriate security policies, in addition to how to keep security policies up-to-date and make sense of audit data for data-centric intelligence.

Gartner Report-Hype Cycle for Identity and Access Management Technologies, 2019

IGA and phone-as-a-token authentication are poised at the plateau, while other well-established technologies have mixed success climbing the slope.FIDO2 authentication protocols teeter at the peak. Additions to the HypeCycle reflect innovations with increasing client interest and market adoption. Hype Cycle for Identity and Access Management Technologies, Analyst(s): Ant Allan Use your Gartner User ID & …

Gartner Report-Hype Cycle for Identity and Access Management Technologies, 2019 Read More »

Gartner Report-Invest Implications:Hype Cycle for Data Security, 2018

Digital business risks are growing due to the increasing volume, variety, velocity and value of data. We highlight the more interesting technologies covered in this Hype Cycle and the implications to private and public vendors. Invest Implications: Hype Cycle for Data Security, Analyst(s): Frank Marsala Use your Gartner User ID & Password to download the …

Gartner Report-Invest Implications:Hype Cycle for Data Security, 2018 Read More »

Gartner Report-Market Guide for Enterprise Data Loss Prevention

The DLP market is very mature, and vendors are adding capabilities from adjacent technologies to enrich the quality of their findings instead of adding features. Security and risk management leaders should use this research to evaluate vendors and improve their data security strategies. Market Guide for Enterprise Data Loss Prevention Analyst(s): Eric Ouellet | Deborah …

Gartner Report-Market Guide for Enterprise Data Loss Prevention Read More »

Gartner Report

Recreate Desktop Security After Users Move to the Cloud Analyst(s): John Girard Published: 20 November 2018

Gartner Report – Market Guide for Information-Centric Endpoint and Mobile Protection

Security and risk management leaders must develop a security portfolio to address different aspects of protecting information. It must span multiplelocations and contexts in a world that emphasizes connectivity, mobility, sharing and cloud, and where business information flows continuously. Market Guide for Information-Centric Endpoint and Mobile Protection Analyst(s): John Girard Use your Gartner User ID …

Gartner Report – Market Guide for Information-Centric Endpoint and Mobile Protection Read More »

Gartner Report

Succeed With Enterprise Digital Rights Management, Five Steps at a Time Analyst(s): John Girard | Marc-Antonie Meunier Published: 21 November 2018

IDC Report

6 Inconvenient Truths of Data Centric Security: IDC Report

Title: The Six Inconvenient Truths of Data-Centric Security: IDC Report This IDC Technology Spotlight explores the growing need for data-centric security, associated challenges, and recommendations for how to optimize your investments. Written by: Robert Westervelt, IDC Research Director