Expert View: What is the impact of the CLOUD Act?
May 20, 2019 | Expert View
0
May 20, 2019
Expert View
0
Last year, the Trump administration launched the CLOUD (Clarifying Lawful Overseas Use of Data) Act, a new law permitting unprecedented access to US and non-US data stored by US companies in the US but also in data centers across the world. Though the mere choice of words may seem off-putting, it is important for both enterprises and administrations to familiarize themselves with what the CLOUD Act entails.
Analyst : 
Mathieu Poujol, Wolfgang Schwab
Downloads : 
1
2 pages
Expert View: What’s the maturity of security rating platforms, and are they worthwhile?
May 13, 2019 | Expert View
0
May 13, 2019
Expert View
0
The first rating platforms could not do much more than collect open security data from the internet and apply analytics features to it to calculate a scorecard. Since then, much has changed: today’s platforms are developed fully in the cloud, use microservices architectures and are powered by artificial intelligence and big data. They are able to assess highly complex companies and their ecosystems, can be customized and detect new, hidden vulnerabilities with contextual and behavioral ana...
Analyst : 
Mathieu Poujol, Wolfgang Schwab
Downloads : 
6
2 pages
 
Hits the European cyber security market like a thunderbolt: Orange Cyber Defense to acquire SecureLink
May 09, 2019 | Blog Post
May 09, 2019
Blog Post
Hits the European cyber security market like a thunderbolt: Orange Cyber Defense to acquire SecureLink

Published: May 09, 2019 Type: Blog Post
Expert View: How can mobile data be secured?
Apr 25, 2019 | Expert View
0
Apr 25, 2019
Expert View
0
Internal company networks or cloud environments need to be secured to protect the company’s most valuable asset: data. This data should remain under the company's control at all times, so damage due to data leaks, loss or hacking is prevented. And yet, it remains a fact that mobile storage devices such as flash drives are an indispensable part of people’s every-day work life. As useful as ”data mobility” is, several aspects need to be considered to not jeopardize a company’s integrity
Analyst : 
Tom Schultheiß, Wolfgang Schwab
Downloads : 
10
2 pages
 
IT / OT Security 2019
Apr 10, 2019 | Event
Apr 10, 2019
Event
IT / OT Security 2019

Published: Apr 10, 2019 Type: Event
Expert View: Is Microsoft uberizing the cyber security market?
Apr 10, 2019 | Expert View
0
Apr 10, 2019
Expert View
0
At the end of February 2019, Microsoft shook up the cyber security market by unveiling a new cloud security service, SIEM (Security Information and Event Management) as a Service, based on Azure. What is the company’s motivation behind this move, and will it lead to an uberization of cyber security?
Analyst : 
Mathieu Poujol, Wolfgang Schwab
Downloads : 
15
2 pages
 
Identities are the new perimeter: why IAM is more important than ever
Apr 09, 2019 | Blog Post
Apr 09, 2019
Blog Post
Identities are the new perimeter: why IAM is more important than ever

Published: Apr 09, 2019 Type: Blog Post
 
Key issues in cyber security for utilities
Apr 02, 2019 | Blog Post
Apr 02, 2019
Blog Post
Key issues in cyber security for utilities

Published: Apr 02, 2019 Type: Blog Post
 
Endpoint security for the workplace of the future
Apr 02, 2019 | Blog Post
Apr 02, 2019
Blog Post
Endpoint security for the workplace of the future

Published: Apr 02, 2019 Type: Blog Post
Simplifying Identity and Access Management (IAM) - InSight Analysis - Worldwide
Mar 29, 2019 | InSight Analysis
0
Mar 29, 2019
InSight Analysis
0
Objectives of the report: Making end users aware that identity and access management will gain in importance due to the growing complexity of IT infrastructures and the application landscape; Analyzing the most common challenges users are faced with when they want to secure identities and access; Defining the requirements for implementing a modern IAM strategy to meet tomorrow’s challenges.   Contents: teknowlogy’s analysis Managemen...
Analyst : 
Tom Schultheiß, Mathieu Poujol
Downloads : 
20
20 pages
Endpoint security for the workplace of the future - InBrief Analysis - Worldwide
Mar 22, 2019 | InBrief Analysis
0
Mar 22, 2019
InBrief Analysis
0
Workplaces and their related endpoint security have changed dramatically in the last two years and will continue to do so in the nearer future. While traditional virus and malware protection are ubiquitous security measures, additional means are available and needed to protect endpoints in a holistic manner. This is because workplaces have become increasingly sophisticated and more and more assets have been added, ranging from smartphones to shop floor workstations, all of which are increa...
Analyst : 
Downloads : 
13
12 pages
Key issues in cyber security for utilities - InBrief Analysis - Worldwide
Mar 20, 2019 | InBrief Analysis
0
Mar 20, 2019
InBrief Analysis
0
Utility companies across the world are in the midst of their digital transformation process. Predictive and condition-based maintenance, an increase in efficiency and line/pipe loss reductions are often based on IIoT solutions and IT/OT integrations, while other improvements rely on artificial intelligence, big data analytics and customer experience improvements. All of this introduces new cyber security risks. To make matters worse, the number of cyber attacks in the utility sector, and e...
Analyst : 
Downloads : 
13
10 pages
IT security and data protection: what blockchain can and cannot do - InSight Analysis - Worldwide
Mar 18, 2019 | InSight Analysis
0
Mar 18, 2019
InSight Analysis
0
Objectives of the report: Blockchain is a secure and reliable technology for distributed databases and ledgers. There are different versions that work with different protocols and procedures to verify transactions and entries. This report will not look at those protocols (for example Ethereum, Hyperledger, Ripple, Quorum, Multichain, etc.) in detail but focus on evaluating the security-relevant basic principles of the blockchain technology: The basic functions of blockchain...
Analyst : 
Downloads : 
13
20 pages
 
In the spirit of partnership: insights from the first Cyber Security Tech Summit Europe in Bonn
Mar 18, 2019 | Blog Post
Mar 18, 2019
Blog Post
In the spirit of partnership: insights from the first Cyber Security Tech Summit Europe in Bonn

Published: Mar 18, 2019 Type: Blog Post
Expert View: Why is IT/OT integration important, and what are the challenges?
Mar 14, 2019 | Expert View
0
Mar 14, 2019
Expert View
0
Operational Technology (OT) and Information Technology (IT) used to be separate for decades, as there was simply no reason to integrate those two areas. Stable OT systems were basically left untouched during the lifetime of a production plant, while IT has always had the reputation of needing frequent changes and being vulnerable to cyber security issues. Nowadays, the concepts of digitalization, Industry 4.0 and IIoT make the convergence of IT/OT mandatory, in order to optimize business m...
Analyst : 
Wolfgang Schwab, Stefanie Naujoks
Downloads : 
22
2 pages
Cyber Security - McAfee - Vendor Profile - Worldwide
Mar 14, 2019 | Vendor Profile - Cluster-specific
0
Mar 14, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy's Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
8
13 pages
Cyber Security - DXC - Vendor Profile - Worldwide
Mar 13, 2019 | Vendor Profile - Cluster-specific
0
Mar 13, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy's Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
10
13 pages
Expert View: What should edge computing users look out for?
Feb 25, 2019 | Expert View
0
Feb 25, 2019
Expert View
0
Edge computing is one of the most recent hype topics in IT. In general, edge computing solutions are interesting for user organizations for which central data center infrastructures or cloud computing solutions are not sufficient. The main reasons to consider edge computing are latency issues, network availability, security, confidentiality and connection costs. Before a decision for edge computing is made, it is important to calculate a business case and evaluate the technical need. It is...
Analyst : 
Wolfgang Schwab, Stefanie Naujoks
Downloads : 
22
2 pages
Expert View: Offering and using smart products – what should be considered in the context of security?
Feb 22, 2019 | Expert View
0
Feb 22, 2019
Expert View
0
Smart products are the key element of many digitalization strategies. They often enable new services and business models and by that strengthen customer loyalty. The users of smart products are offered the benefit of e.g. predictive maintenance functionality or are provided new features during the life time of a product. One important aspect to be considered before offering (and buying) smart products is, however, a thorough analysis of their inherent data protection and security functions...
Analyst : 
Wolfgang Schwab, Stefanie Naujoks
Downloads : 
15
2 pages
 
The Value of Immersive Experiences in Cyber Security
Jan 25, 2019 | Blog Post
Jan 25, 2019
Blog Post
The Value of Immersive Experiences in Cyber Security

Published: Jan 25, 2019 Type: Blog Post

Pages