Key Issues in Cyber Security for Retail - InBrief Analysis - Worldwide
Aug 07, 2019 | InBrief Analysis
0
Aug 07, 2019
InBrief Analysis
0
Retailers are often among the first to take advantage of new technological opportunities. However, the widespread use of IoT technologies, artificial intelligence and other opportunities also carries its very own security risks. In addition, retailers are among those businesses that have a high level of contact with a large amount of personal data, especially transaction data, and through many different channels.   Contents: Management Summary Context ...
Analyst : 
Tom Schultheiß, Mathieu Poujol
Downloads : 
4
11 pages
Industrial Control Systems (ICS) – when OT meets the IT cyber security challenge - InBrief Analysis - Worldwide
Jul 30, 2019 | InBrief Analysis
0
Jul 30, 2019
InBrief Analysis
0
Over decades the Operational Technology (OT) and the Information Technology (IT) groups had been separated, mainly because there was no need for collaboration or alignment. With new concepts like digitalization, Industry 4.0 or the Industrial IoT (IIoT), the integration of IT and OT is necessary in order to support new business models and enhance production agility. Most important is a close collaboration between IT and OT with respect to cyber security strategies and measures. Only a co...
Analyst : 
Wolfgang Schwab, Mathieu Poujol
Downloads : 
12
12 pages
DevSecOps: the new normal - InBrief Analysis - Worldwide
Jul 09, 2019 | InBrief Analysis
0
Jul 09, 2019
InBrief Analysis
0
The rise of DevOps is the latest evolution of the goal of IT/business alignment. It is an incremental evolution of agile development methodologies, which incorporates the way these developments are operated and enabled by next-gen cloud computing or edge computing technologies. However, it generates specific cyber security issues. DevOps needs to go further – it needs to become DevSecOps.   Contents: Management Summary The rise of DevOps Next-gen c...
Analyst : 
Mathieu Poujol, Wolfgang Schwab
Downloads : 
20
10 pages
Expert View: Cyber security vendors: is ESET a proper European alternative to the major global players?
Jun 25, 2019 | Expert View
0
Jun 25, 2019
Expert View
0
ESET is an Eastern European cyber security vendor with a long-standing tradition in the cyber threat defense business, who is able to provide offerings for a multitude of purposes and different customer sizes. In this Expert View, we will share our knowledge on ESET and also formulate recommendations for end users when it comes to choosing a suitable cyber security provider.
Analyst : 
Bogdan Cotovelea, Iulian Chesaru, Mathieu Poujol
Downloads : 
9
2 pages
IT Security by Segments - Market Figures - Eastern Europe by Countries
Jun 24, 2019 | Market Figures & Forecast
0
Jun 24, 2019
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the Eastern Europe IT security market for the 2016-2022 period. It covers 7 countries (Czech Republic, Hungary, Poland, Romania, Russia, Slovakia, Turkey) and Rest of Eastern Europe. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity...
Downloads : 
10
IT Security by Segments - Market Figures - Eastern Europe Consolidation
Jun 24, 2019 | Market Figures & Forecast
0
Jun 24, 2019
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Eastern Europe for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Pl...
Downloads : 
6
Expert View: What is the impact of the CLOUD Act?
May 20, 2019 | Expert View
0
May 20, 2019
Expert View
0
Last year, the Trump administration launched the CLOUD (Clarifying Lawful Overseas Use of Data) Act, a new law permitting unprecedented access to US and non-US data stored by US companies in the US but also in data centers across the world. Though the mere choice of words may seem off-putting, it is important for both enterprises and administrations to familiarize themselves with what the CLOUD Act entails.
Analyst : 
Mathieu Poujol, Wolfgang Schwab
Downloads : 
19
2 pages
Expert View: What’s the maturity of security rating platforms, and are they worthwhile?
May 13, 2019 | Expert View
0
May 13, 2019
Expert View
0
The first rating platforms could not do much more than collect open security data from the internet and apply analytics features to it to calculate a scorecard. Since then, much has changed: today’s platforms are developed fully in the cloud, use microservices architectures and are powered by artificial intelligence and big data. They are able to assess highly complex companies and their ecosystems, can be customized and detect new, hidden vulnerabilities with contextual and behavioral ana...
Analyst : 
Mathieu Poujol, Wolfgang Schwab
Downloads : 
9
2 pages
Expert View: How can mobile data be secured?
Apr 25, 2019 | Expert View
0
Apr 25, 2019
Expert View
0
Internal company networks or cloud environments need to be secured to protect the company’s most valuable asset: data. This data should remain under the company's control at all times, so damage due to data leaks, loss or hacking is prevented. And yet, it remains a fact that mobile storage devices such as flash drives are an indispensable part of people’s every-day work life. As useful as ”data mobility” is, several aspects need to be considered to not jeopardize a company’s integrity
Analyst : 
Tom Schultheiß, Wolfgang Schwab
Downloads : 
12
2 pages
Expert View: Is Microsoft uberizing the cyber security market?
Apr 10, 2019 | Expert View
0
Apr 10, 2019
Expert View
0
At the end of February 2019, Microsoft shook up the cyber security market by unveiling a new cloud security service, SIEM (Security Information and Event Management) as a Service, based on Azure. What is the company’s motivation behind this move, and will it lead to an uberization of cyber security?
Analyst : 
Mathieu Poujol, Wolfgang Schwab
Downloads : 
21
2 pages
Simplifying Identity and Access Management (IAM) - InSight Analysis - Worldwide
Mar 29, 2019 | InSight Analysis
0
Mar 29, 2019
InSight Analysis
0
Objectives of the report: Making end users aware that identity and access management will gain in importance due to the growing complexity of IT infrastructures and the application landscape; Analyzing the most common challenges users are faced with when they want to secure identities and access; Defining the requirements for implementing a modern IAM strategy to meet tomorrow’s challenges.   Contents: teknowlogy’s analysis Managemen...
Analyst : 
Tom Schultheiß, Mathieu Poujol
Downloads : 
28
20 pages
Endpoint security for the workplace of the future - InBrief Analysis - Worldwide
Mar 22, 2019 | InBrief Analysis
0
Mar 22, 2019
InBrief Analysis
0
Workplaces and their related endpoint security have changed dramatically in the last two years and will continue to do so in the nearer future. While traditional virus and malware protection are ubiquitous security measures, additional means are available and needed to protect endpoints in a holistic manner. This is because workplaces have become increasingly sophisticated and more and more assets have been added, ranging from smartphones to shop floor workstations, all of which are increa...
Analyst : 
Downloads : 
15
12 pages
Key issues in cyber security for utilities - InBrief Analysis - Worldwide
Mar 20, 2019 | InBrief Analysis
0
Mar 20, 2019
InBrief Analysis
0
Utility companies across the world are in the midst of their digital transformation process. Predictive and condition-based maintenance, an increase in efficiency and line/pipe loss reductions are often based on IIoT solutions and IT/OT integrations, while other improvements rely on artificial intelligence, big data analytics and customer experience improvements. All of this introduces new cyber security risks. To make matters worse, the number of cyber attacks in the utility sector, and e...
Analyst : 
Downloads : 
20
10 pages
IT security and data protection: what blockchain can and cannot do - InSight Analysis - Worldwide
Mar 18, 2019 | InSight Analysis
0
Mar 18, 2019
InSight Analysis
0
Objectives of the report: Blockchain is a secure and reliable technology for distributed databases and ledgers. There are different versions that work with different protocols and procedures to verify transactions and entries. This report will not look at those protocols (for example Ethereum, Hyperledger, Ripple, Quorum, Multichain, etc.) in detail but focus on evaluating the security-relevant basic principles of the blockchain technology: The basic functions of blockchain...
Analyst : 
Downloads : 
21
20 pages
Expert View: Why is IT/OT integration important, and what are the challenges?
Mar 14, 2019 | Expert View
0
Mar 14, 2019
Expert View
0
Operational Technology (OT) and Information Technology (IT) used to be separate for decades, as there was simply no reason to integrate those two areas. Stable OT systems were basically left untouched during the lifetime of a production plant, while IT has always had the reputation of needing frequent changes and being vulnerable to cyber security issues. Nowadays, the concepts of digitalization, Industry 4.0 and IIoT make the convergence of IT/OT mandatory, in order to optimize business m...
Analyst : 
Wolfgang Schwab, Stefanie Naujoks
Downloads : 
42
2 pages
Cyber Security - McAfee - Vendor Profile - Worldwide
Mar 14, 2019 | Vendor Profile - Cluster-specific
0
Mar 14, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy's Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
9
13 pages
Cyber Security - DXC - Vendor Profile - Worldwide
Mar 13, 2019 | Vendor Profile - Cluster-specific
0
Mar 13, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy's Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
12
13 pages
Expert View: What should edge computing users look out for?
Feb 25, 2019 | Expert View
0
Feb 25, 2019
Expert View
0
Edge computing is one of the most recent hype topics in IT. In general, edge computing solutions are interesting for user organizations for which central data center infrastructures or cloud computing solutions are not sufficient. The main reasons to consider edge computing are latency issues, network availability, security, confidentiality and connection costs. Before a decision for edge computing is made, it is important to calculate a business case and evaluate the technical need. It is...
Analyst : 
Wolfgang Schwab, Stefanie Naujoks
Downloads : 
32
2 pages
Expert View: Offering and using smart products – what should be considered in the context of security?
Feb 22, 2019 | Expert View
0
Feb 22, 2019
Expert View
0
Smart products are the key element of many digitalization strategies. They often enable new services and business models and by that strengthen customer loyalty. The users of smart products are offered the benefit of e.g. predictive maintenance functionality or are provided new features during the life time of a product. One important aspect to be considered before offering (and buying) smart products is, however, a thorough analysis of their inherent data protection and security functions...
Analyst : 
Wolfgang Schwab, Stefanie Naujoks
Downloads : 
21
2 pages
Cyber Security - HCL Technologies - Vendor Profile - Worldwide
Jan 17, 2019 | Vendor Profile - Cluster-specific
0
Jan 17, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy's Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
11
14 pages
teknowlogy's model for a business innovation architecture - InBrief Analysis - Worldwide
Jan 11, 2019 | InBrief Analysis
0
Jan 11, 2019
InBrief Analysis
0
Business Innovation Architecture (BIA) is referred to by teknowlogy Group as the architectural building blocks for digital business innovation, combining a business and IT technology perspective. BIA offers guidelines on what needs to be considered when defining an architecture that can support smart business, e.g. an agile and adaptive business tailored to fast-evolving and highly competitive digital contexts. This document describes only briefly what BIA is and what its benefits are. The...
Analyst : 
Frank Niemann, Olivier Rafal, Jason Stamper
Downloads : 
66
9 pages
IT Security by Segments - Market Figures - Western Europe Consolidation
Dec 19, 2018 | Market Figures & Forecast
0
Dec 19, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the Western European IT security market for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Ple...
Analyst : 
Downloads : 
12
IT Security by Segments - Market Figures - Rest of Western Europe including Portugal
Dec 19, 2018 | Market Figures & Forecast
0
Dec 19, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the Rest of Western European IT security market in for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. ...
Analyst : 
Downloads : 
5
IT Security by Segments - Market Figures - Western Europe by Countries
Dec 19, 2018 | Market Figures & Forecast
0
Dec 19, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the Western European IT security market for the 2016-2022 period. It covers 14 countries (Austria, Belgium, Denmark, Finland, France, Germany, Italy, Netherlands, Norway, Portugal, Spain, Sweden, Switzerland, UK) and Rest of Western Europe (Greece, Iceland, Ireland, Liechtenstein, Luxembourg, Malta). The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity &...
Analyst : 
Downloads : 
25
IT Security by Segments - Market Figures - Denmark
Dec 17, 2018 | Market Figures & Forecast
0
Dec 17, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Denmark for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cl...
Analyst : 
Scandinavian Research
Downloads : 
2
IT Security by Segments - Market Figures - Sweden
Dec 17, 2018 | Market Figures & Forecast
0
Dec 17, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Sweden for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cli...
Analyst : 
Scandinavian Research
Downloads : 
4
IT Security by Segments - Market Figures - Norway
Dec 17, 2018 | Market Figures & Forecast
0
Dec 17, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Norway for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cli...
Analyst : 
Scandinavian Research
Downloads : 
1
IT Security by Segments - Market Figures - Spain
Dec 17, 2018 | Market Figures & Forecast
0
Dec 17, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Spain for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please clic...
Analyst : 
Downloads : 
15
IT Security by Segments - Market Figures - Italy
Dec 14, 2018 | Market Figures & Forecast
0
Dec 14, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Italy for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please clic...
Analyst : 
Downloads : 
4
Cyber Security - IBM Security - Vendor Profile - Worldwide
Dec 14, 2018 | Vendor Profile - Cluster-specific
0
Dec 14, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
22
15 pages
Cyber Security - secunet - Vendor Profile - Worldwide
Dec 13, 2018 | Vendor Profile - Cluster-specific
0
Dec 13, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
6
12 pages
IT Security by Segments - Market Figures - Netherlands
Dec 12, 2018 | Market Figures & Forecast
0
Dec 12, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in the Netherlands for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. P...
Analyst : 
Downloads : 
18
IT Security by Segments - Market Figures - Finland
Dec 07, 2018 | Market Figures & Forecast
0
Dec 07, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Finland for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cl...
Analyst : 
Downloads : 
2
Cyber Security - Atos - Vendor Profile - Worldwide
Nov 29, 2018 | Vendor Profile - Cluster-specific
0
Nov 29, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
28
14 pages
Cyber Security - T-Systems - Telekom Security - Vendor Profile - Worldwide
Nov 28, 2018 | Vendor Profile - Cluster-specific
0
Nov 28, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
19
14 pages
Cyber Security - Orange Cyberdefense - Vendor Profile - Worldwide
Oct 30, 2018 | Vendor Profile - Cluster-specific
0
Oct 30, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Share of Segments in Cyber Security Revenue Key Offerings in Cyber Security Revenue – Software vs. IT Services Key Industries & Top Accounts ...
Analyst : 
Downloads : 
21
12 pages
Cyber Security - Tech Mahindra - Vendor Profile - Worldwide
Oct 26, 2018 | Vendor Profile - Cluster-specific
0
Oct 26, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
11
12 pages
Cyber Security - Thales Group - Vendor Profile - Worldwide
Oct 23, 2018 | Vendor Profile - Cluster-specific
0
Oct 23, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
12
12 pages
Expert View: Is artificial intelligence reliable and secure enough at this stage?
Oct 22, 2018 | Expert View
0
Oct 22, 2018
Expert View
0
Even though still a black box for the majority of people, artificial intelligence is considered a core component of digital transformation. It is the underlying technology of many digital trends, from smart buildings to cognitive IT. But despite being hyped as the new technological revolution, several recent incidents have cast doubt on AI’s security and liability. And they have caused fear over the risk of AI not being limited to the virtual world only.
Analyst : 
Mathieu Poujol, Elena Ndrepepa
Downloads : 
55
2 pages
Expert View: What are the most important cyber security hygiene rules?
Oct 11, 2018 | Expert View
0
Oct 11, 2018
Expert View
0
Cyber security is too often reduced to a technology-centric activity when it is actually about common sense and simple basic tasks to be done, which are also referred to as “cyber security hygiene rules”. Sticking to those rules will not protect you from the most sophisticated of attacks, but will greatly reduce your attack surface; besides, without cyber hygiene, many of the best cyber security technologies could be rendered useless. And the concept allows you to concentrate precisely on ...
Analyst : 
Mathieu Poujol, Wolfgang Schwab
Downloads : 
36
2 pages
IT Security - Vendor Rankings - Worldwide
Oct 09, 2018 | Vendor Rankings
0
Oct 09, 2018
Vendor Rankings
0
This Excel document provides rankings of the top 20 IT security software vendors and the top 20 IT security services providers Worldwide.
Analyst : 
Downloads : 
50
IT Security - Vendor Rankings - Germany
Oct 09, 2018 | Vendor Rankings
0
Oct 09, 2018
Vendor Rankings
0
This Excel document provides rankings of the top 15 IT security software vendors and the top 14 IT security services providers in Germany.
Analyst : 
Downloads : 
64
IT Security - Vendor Rankings - UK
Oct 09, 2018 | Vendor Rankings
0
Oct 09, 2018
Vendor Rankings
0
This Excel document provides rankings of the top 15 IT security software vendors and the top 20 IT security services providers in the UK.
Analyst : 
Downloads : 
37
IT Security - Vendor Rankings - EMEA
Oct 09, 2018 | Vendor Rankings
0
Oct 09, 2018
Vendor Rankings
0
This Excel document provides rankings of the top 20 IT security software vendors and the top 20 IT security services providers in EMEA region.
Analyst : 
Downloads : 
48
Cyber Security - CyberArk Software - Vendor Profile - Worldwide
Oct 08, 2018 | Vendor Profile - Cluster-specific
0
Oct 08, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Share of Segments in Cyber Security Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentat...
Analyst : 
Downloads : 
7
12 pages
Expert View: Anti-money laundering: what is the role of FinTech?
Oct 08, 2018 | Expert View
0
Oct 08, 2018
Expert View
0
Financial institutions now have to reconcile two opposing trends that are at the core of their activities: clients demand for more convenience with digitally enhanced systems whereas the financial institutions must comply with stringent anti-money laundering and cyber security regulations.
Analyst : 
Mathieu Poujol, Joachim Hackmann
Downloads : 
61
2 pages
IT Security - Vendor Rankings - France
Oct 08, 2018 | Vendor Rankings
0
Oct 08, 2018
Vendor Rankings
0
This Excel document provides rankings of the top 15 IT security software vendors and the top 15 IT security services providers in France.
Analyst : 
Downloads : 
63
Expert View: How can organizations protect their privileged accounts?
Sep 14, 2018 | Expert View
0
Sep 14, 2018
Expert View
0
Privileged accounts, credentials and secrets provide deep and powerful access to an organization’s high-value assets. The digital technologies have enlarged the attack surface and led to quite a few rather destructive cyber-attacks in the recent past, where privileged access was exploited.
Analyst : 
Downloads : 
20
2 pages
Key Cyber Security Issues in Healthcare - InBrief Analysis - Worldwide
Sep 10, 2018 | InBrief Analysis
0
Sep 10, 2018
InBrief Analysis
0
In the following InBrief report, PAC will provide an overview of the major cyber security risks and trends in the healthcare industry and will give some crucial recommendations for IT providers as well as IT buyers.   Contents: Management Summary The Context Digital transformation in the healthcare sector The Key Issues in Cyber Security for the Healthcare Sector Special characteristics of healthcare data Major reasons for incr...
Analyst : 
Downloads : 
29
11 pages
IT Security by Segments - Market Figures - Austria
Sep 05, 2018 | Market Figures & Forecast
0
Sep 05, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Austria for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cl...
Analyst : 
Downloads : 
13

Pages