Artificial Intelligence (AI) & Machine Learning in Cyber Security Applications - InBrief Analysis - Europe
Apr 04, 2018 | InBrief Analysis
0
Apr 04, 2018
InBrief Analysis
0
Objectives of the report: Identify the current and future scale of AI and machine learning in cyber security applications Explore what the options for buyers of AI-driven cyber security applications may be Analyze the proposed advantages of AI and machine learning Discuss some potential disadvantages of intelligent security systems and how hackers could use the same technology Predict the market growth for intelligent security systems   ...
Analyst : 
Downloads : 
146
12 pages
Cloud & Security - The Yin & Yang of Digital Transformation - InSight Analysis - Worldwide
Apr 13, 2018 | InSight Analysis
0
Apr 13, 2018
InSight Analysis
0
This report has four main objectives: to make (1) end users aware that cloud computing is not only the sum of all fears in cyber security, but also (2) the most powerful weapon they have for securing digital enterprises. We will (3) analyze the relationship between two of the most important catalysts of digital transformation — security and cloud — and (4) look at how these two opposing concepts are in fact complementary.   Contents: Introduction: The importance of t...
Analyst : 
Downloads : 
81
27 pages
Cloud Access Security Brokers - InBrief Analysis - Worldwide
Jun 27, 2018 | InBrief Analysis
0
Jun 27, 2018
InBrief Analysis
0
This report has two main objectives: (1) to make end users aware that cloud computing needs a new approach to cyber security and (2) that Cloud Access Security Brokers (CASB) can be a suitable response, but that it will not solve all the issues. We will analyze today’s needs in cloud security, the different types of CASB, their main functionalities, uses cases and limitations.   Contents: PAC’s analysis Management summary PAC’s opinion PAC’s rec...
Analyst : 
Downloads : 
36
14 pages
Customer Identity & Access Management - InBrief Analysis - Worldwide
Sep 09, 2019 | InBrief Analysis
0
Sep 09, 2019
InBrief Analysis
0
Customer Identity and Access Management (CIAM) is an Identity and Access Management (IAM) that concentrates on external users. The main emphasis is on managing the customers’ identities, but also those of other types of external parties, such as partners, contractors, shareholders, value chain members, etc. Initially, it is mostly a cyber security tool focused around Single Sign On (SSO), although some major platform vendors have shipped CIAM extensions from those SSO tools.   ...
Analyst : 
Mathieu Poujol, Tom Schultheiß
Downloads : 
12
10 pages
CxO Survey - Investment Priorities - Cyber Security - InSight Analysis - Worldwide
Jun 05, 2018 | CxO Survey - Investment Priorities
0
Jun 05, 2018
CxO Survey - Investment Priorities
0
PAC conducted the 2017 edition of its annual 'SITSI® CxO Investment Survey,' interviewing IT decision-makers in user companies all over the world to get their views on current IT trends, key requirements, and investment plans. This report presents and discusses the key results of the study for the topic of cyber & information security. The potential of new technologies is a mixed blessing for cyber security as some like mobility and the IoT are huge vulnerability generators, whil...
Analyst : 
Downloads : 
67
31 pages
Cyber Security - Accenture - Vendor Profile - Worldwide
Apr 10, 2018 | Vendor Profile - Cluster-specific
0
Apr 10, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
46
12 pages
Cyber Security - Atos - Vendor Profile - Worldwide
Nov 29, 2018 | Vendor Profile - Cluster-specific
0
Nov 29, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
42
14 pages
Cyber Security - BAE Systems - Vendor Profile - Worldwide
May 28, 2018 | Vendor Profile - Cluster-specific
0
May 28, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
14
12 pages
Cyber Security - CyberArk Software - Vendor Profile - Worldwide
Oct 08, 2018 | Vendor Profile - Cluster-specific
0
Oct 08, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Share of Segments in Cyber Security Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentat...
Analyst : 
Downloads : 
9
12 pages
Cyber Security - DXC Technology - Vendor Profile - Worldwide
Nov 21, 2019 | Vendor Profile - Cluster-specific
0
Nov 21, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy's Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
8
15 pages
Cyber Security - Deloitte - Vendor Profile - Worldwide
Jun 08, 2018 | Vendor Profile - Cluster-specific
0
Jun 08, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
36
12 pages
Cyber Security - HCL Technologies - Vendor Profile - Worldwide
Jan 17, 2019 | Vendor Profile - Cluster-specific
0
Jan 17, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy's Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
15
14 pages
Cyber Security - IBM Security - Vendor Profile - Worldwide
Oct 02, 2019 | Vendor Profile - Cluster-specific
0
Oct 02, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
23
14 pages
Cyber Security - McAfee - Vendor Profile - Worldwide
Mar 14, 2019 | Vendor Profile - Cluster-specific
0
Mar 14, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy's Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
12
13 pages
Cyber Security - Orange Cyberdefense - Vendor Profile - Worldwide
Sep 12, 2019 | Vendor Profile - Cluster-specific
0
Sep 12, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Share of Segments in Cyber Security Revenue Key Offerings in Cyber Security Revenue – Software vs. IT Services Background Information teknowlogy’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Ac...
Analyst : 
Downloads : 
19
11 pages
Cyber Security - Symantec - Vendor Profile - Worldwide
May 28, 2018 | Vendor Profile - Cluster-specific
0
May 28, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
12
12 pages
Cyber Security - T-Systems - Telekom Security - Vendor Profile - Worldwide
Oct 08, 2019 | Vendor Profile - Cluster-specific
0
Oct 08, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
11
15 pages
Cyber Security - Tech Mahindra - Vendor Profile - Worldwide
Oct 26, 2018 | Vendor Profile - Cluster-specific
0
Oct 26, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
15
12 pages
Cyber Security - Thales Group - Vendor Profile - Worldwide
Oct 14, 2019 | Vendor Profile - Cluster-specific
0
Oct 14, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy’s Opinion Key Figures Share of Cyber Security in Total Revenue Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
7
13 pages
Cyber Security - secunet - Vendor Profile - Worldwide
Sep 27, 2019 | Vendor Profile - Cluster-specific
0
Sep 27, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
6
12 pages
Cyber Security – Trend and Vendor Analysis - InBrief Analysis - UK
May 18, 2018 | InBrief Analysis
0
May 18, 2018
InBrief Analysis
0
This report gives an overview of the latest trends and relevant vendors on the UK market for cyber security software and services.   Contents: Trends in Security Software The shift to advanced firewalls Application Security Testing & Secure DevOps Identity & Access Management (IAM) Privileged Account Management Security Incident and Event Management (SIEM) Trends in Security Services Threat intelligence and ...
Analyst : 
Downloads : 
71
16 pages
DevSecOps: the new normal - InBrief Analysis - Worldwide
Jul 09, 2019 | InBrief Analysis
0
Jul 09, 2019
InBrief Analysis
0
The rise of DevOps is the latest evolution of the goal of IT/business alignment. It is an incremental evolution of agile development methodologies, which incorporates the way these developments are operated and enabled by next-gen cloud computing or edge computing technologies. However, it generates specific cyber security issues. DevOps needs to go further – it needs to become DevSecOps.   Contents: Management Summary The rise of DevOps Next-gen c...
Analyst : 
Mathieu Poujol, Wolfgang Schwab
Downloads : 
33
10 pages
Endpoint security for the workplace of the future - InBrief Analysis - Worldwide
Mar 22, 2019 | InBrief Analysis
0
Mar 22, 2019
InBrief Analysis
0
Workplaces and their related endpoint security have changed dramatically in the last two years and will continue to do so in the nearer future. While traditional virus and malware protection are ubiquitous security measures, additional means are available and needed to protect endpoints in a holistic manner. This is because workplaces have become increasingly sophisticated and more and more assets have been added, ranging from smartphones to shop floor workstations, all of which are increa...
Analyst : 
Downloads : 
28
12 pages
Europe's main cyber security service providers - InSight Analysis
Dec 09, 2019 | InSight Analysis
0
Dec 09, 2019
InSight Analysis
0
Objectives of the report: Provide an overview of the major cyber security service providers in Europe, especially: Portfolio: what exactly is offered by the different providers Sweet spot: which customer groups are mainly addressed by the different providers Discuss market developments, trends and new challenges in Europe Provide teknowlogy's long-term vision, identifying game-changing topics with a significant impact on the future deve...
Analyst : 
Wolfgang Schwab, Simon Abrahams
Downloads : 
30
24 pages
Expert View: Anti-money laundering: what is the role of FinTech?
Oct 08, 2018 | Expert View
0
Oct 08, 2018
Expert View
0
Financial institutions now have to reconcile two opposing trends that are at the core of their activities: clients demand for more convenience with digitally enhanced systems whereas the financial institutions must comply with stringent anti-money laundering and cyber security regulations.
Analyst : 
Mathieu Poujol, Joachim Hackmann
Downloads : 
82
2 pages
Expert View: Comment les compagnies d’assurances peuvent-elles bénéficier de la blockchain ?
Feb 06, 2018 | Expert View
0
Feb 06, 2018
Expert View
0
La blockchain, une base de données partagée, fournit une base technique pour certifier l’intégrité des renseignements numériques. Elle permet notamment de tracer de façon claire les régimes de propriété et les transactions. Les premières InsurTech utilisent la blockchain dans le cadre de nouveaux modèles économiques et de démarches d’automatisation étendue. Quelles sont les implications pour les assureurs classiques ? Click here for the English version. Click here for the Germa...
Analyst : 
Joachim Hackmann, David Gautier
Downloads : 
30
2 pages
Expert View: Cyber security vendors: is ESET a proper European alternative to the major global players?
Jun 25, 2019 | Expert View
0
Jun 25, 2019
Expert View
0
ESET is an Eastern European cyber security vendor with a long-standing tradition in the cyber threat defense business, who is able to provide offerings for a multitude of purposes and different customer sizes. In this Expert View, we will share our knowledge on ESET and also formulate recommendations for end users when it comes to choosing a suitable cyber security provider.
Analyst : 
Bogdan Cotovelea, Iulian Chesaru, Mathieu Poujol
Downloads : 
20
2 pages
Expert View: DevOps and API: how can digital transformation be made secure?
Jan 11, 2018 | Expert View
0
Jan 11, 2018
Expert View
0
Wannacry and other attacks have laid bare how vulnerable the digital world is. In a hyperconnected and agile world, the cyber-security game has completely changed. The new data compliance regulations such as GDPR are adding new pressures. Click here for the German version. Click here for the French version.
Analyst : 
Downloads : 
60
2 pages
Expert View: DevOps et API : Comment sécuriser la transformation digitale ?
Jul 06, 2017 | Expert View
0
Jul 06, 2017
Expert View
0
Avec Wannacry et autres attaques, le monde prend directement conscience des risques encourus et de la vulnérabilité globale de la sphère numérique. Dans un monde hyperconnecté la sécurisation se pose en termes totalement nouveaux pour l’informatique. C’est aussi ce à quoi poussent toutes les nouvelles règlementations. Click here for the English version. Click here for the German version.
Analyst : 
Downloads : 
41
2 pages
Expert View: DevOps und API: Wie kann die digitale Transformation abgesichert werden?
Sep 25, 2017 | Expert View
0
Sep 25, 2017
Expert View
0
Cyber-Attacken wie WannaCry haben die Risiken und die Verwundbarkeit der digitalen Welt deutlich vor Augen geführt. In einer hochgradig vernetzten Welt braucht IT-Sicherheit einen neuen Stellenwert – genau darauf zielen auch neue regulatorische Verordnungen ab. Click here for the English version. Click here for the French version.
Analyst : 
Downloads : 
35
2 pages
Expert View: How can insurance companies benefit from blockchain?
Feb 06, 2018 | Expert View
0
Feb 06, 2018
Expert View
0
The distributed blockchain database provides a technical basis for the integrity of digital information. This enables ownership and transactions to be clearly documented. The first wave of InsurTechs is using blockchain to support new business models and drive far-reaching automation. But what does blockchain mean for the business of classic insurers?   Click here for the German version. Click here for the French version.
Analyst : 
Downloads : 
86
2 pages
Expert View: How can mobile data be secured?
Apr 25, 2019 | Expert View
0
Apr 25, 2019
Expert View
0
Internal company networks or cloud environments need to be secured to protect the company’s most valuable asset: data. This data should remain under the company's control at all times, so damage due to data leaks, loss or hacking is prevented. And yet, it remains a fact that mobile storage devices such as flash drives are an indispensable part of people’s every-day work life. As useful as ”data mobility” is, several aspects need to be considered to not jeopardize a company’s integrity
Analyst : 
Tom Schultheiß, Wolfgang Schwab
Downloads : 
25
2 pages
Expert View: How can organizations protect their privileged accounts?
Sep 14, 2018 | Expert View
0
Sep 14, 2018
Expert View
0
Privileged accounts, credentials and secrets provide deep and powerful access to an organization’s high-value assets. The digital technologies have enlarged the attack surface and led to quite a few rather destructive cyber-attacks in the recent past, where privileged access was exploited.
Analyst : 
Downloads : 
28
2 pages
Expert View: How relevant is edge computing for IoT projects?
Feb 17, 2017 | Expert View
0
Feb 17, 2017
Expert View
0
Edge computing refers to a technology that allocates central Cloud functions to peripheral devices such as gateways and microcomputers. Amongst other things, the aim of edge computing is to provide IoT functionality even in the absence of connectivity.   Click here for the French version. Click here for the German version.
Analyst : 
Joachim Hackmann, Milos Milojevic
Downloads : 
76
2 pages
Expert View: Is Microsoft uberizing the cyber security market?
Apr 10, 2019 | Expert View
0
Apr 10, 2019
Expert View
0
At the end of February 2019, Microsoft shook up the cyber security market by unveiling a new cloud security service, SIEM (Security Information and Event Management) as a Service, based on Azure. What is the company’s motivation behind this move, and will it lead to an uberization of cyber security?
Analyst : 
Mathieu Poujol, Wolfgang Schwab
Downloads : 
32
2 pages
Expert View: Is OpenStack focusing enough on cyber security?
Jul 16, 2018 | Expert View
0
Jul 16, 2018
Expert View
0
OpenStack is the de facto standard for private cloud infrastructures, and as such, one of the biggest open source communities. Due to its importance in the digital value chain of many companies, it is very important to assess and analyze its cyber security level and initiatives.
Analyst : 
Downloads : 
36
2 pages
Expert View: Is artificial intelligence reliable and secure enough at this stage?
Oct 22, 2018 | Expert View
0
Oct 22, 2018
Expert View
0
Even though still a black box for the majority of people, artificial intelligence is considered a core component of digital transformation. It is the underlying technology of many digital trends, from smart buildings to cognitive IT. But despite being hyped as the new technological revolution, several recent incidents have cast doubt on AI’s security and liability. And they have caused fear over the risk of AI not being limited to the virtual world only.
Analyst : 
Mathieu Poujol, Elena Ndrepepa
Downloads : 
65
2 pages
Expert View: NUMERIQUE ET ETHIQUE : Quelles questions se poser ?
Jun 26, 2017 | Expert View
0
Jun 26, 2017
Expert View
0
Dans le domaine des RH, comme dans de nombreux domaines, l’utilisation des nouvelles technologies ouvre de nouvelles possibilités dans l’analyse des données. Big data, small data, analyses croisées, analyses prédictives, choix, aide à la décision, automatisation… que souhaitons-nous réaliser avec l’utilisation des nouvelles technologies mise à notre disposition ? Les possibilités semblent infinies et pourtant, au plan systémique, la même ligne directrice est toujours mise en place : défi...
Downloads : 
48
2 pages
Expert View: Offering and using smart products – what should be considered in the context of security?
Feb 22, 2019 | Expert View
0
Feb 22, 2019
Expert View
0
Smart products are the key element of many digitalization strategies. They often enable new services and business models and by that strengthen customer loyalty. The users of smart products are offered the benefit of e.g. predictive maintenance functionality or are provided new features during the life time of a product. One important aspect to be considered before offering (and buying) smart products is, however, a thorough analysis of their inherent data protection and security functions...
Analyst : 
Wolfgang Schwab, Stefanie Naujoks
Downloads : 
31
2 pages
Expert View: Quel impact les blockchains peuvent-elles avoir sur un environnement industriel ?
Mar 26, 2018 | Expert View
0
Mar 26, 2018
Expert View
0
Dès lors que plusieurs partenaires commerciaux partagent des ressources non tangibles (jumeaux numériques, fichiers d'impression 3D, etc.), les technologies de registres distribués ou « blockchain » présentent un intérêt. Des projets initiaux montrent le potentiel prometteur de cette technologie, mais soulèvent également une question ouverte concernant le choix de la plateforme la plus appropriée.   Click here for the English version. Click here for the German versio...
Analyst : 
Joachim Hackmann, Mathieu Poujol
Downloads : 
40
2 pages
Expert View: Quelle est la pertinence du Edge Computing pour les projets IoT ?
Feb 15, 2017 | Expert View
0
Feb 15, 2017
Expert View
0
L’expression « Edge Computing » désigne une technologie qui répartit des fonctions centrales du Cloud sur des appareils décentralisés comme des capteurs et des microordinateurs. L’objectif étant, entre autres, d’assurer le fonctionnement de l’environnement IoT même en cas d’absence de connectivité.   Click here for the English version. Click here for the German version.
Analyst : 
Downloads : 
30
2 pages
Expert View: Was kann Blockchain im industriellen Umfeld leisten?
Sep 20, 2017 | Expert View
0
Sep 20, 2017
Expert View
0
Immer dann, wenn Waren oder immaterielle Werte (wie etwa Digital Twins oder 3DDruckdateien) zwischen verschiedenen Geschäftspartnern bewegt werden, kann die verteilte Datenbanktechnik Blockchain auch der Industrie helfen. Erste Projekte zeigen das vielversprechende Potential, weisen aber auch auf offene Fragen hin, etwa hinsichtlich der bevorzugten Plattform. Click here for the English version. Click here for the French version.
Analyst : 
Downloads : 
88
2 pages
Expert View: Welche Technologien können Unternehmen bei der Umsetzung der EU-DSGVO/GDPR-Anforderungen unterstützen?
Apr 20, 2018 | Expert View
0
Apr 20, 2018
Expert View
0
Die Datenschutz-Grundverordnung (DSGVO/General Data Protection Regulation, GDPR) ist eine Verordnung der EU, durch die die Regeln für die Verarbeitung personenbezogener Daten durch private Unternehmen und öffentliche Stellen EU-weit vereinheitlicht werden. Dadurch soll u.a. der Schutz von personenbezogenen Daten innerhalb der EU sichergestellt werden. Bei fehlender Compliance oder Missachtung der Verordnung drohen Unternehmen Strafen von bis zu 4% ihres Gesamtumsatzes. Diese Expert View b...
Analyst : 
Downloads : 
24
2 pages
Expert View: What are the most important cyber security hygiene rules?
Oct 11, 2018 | Expert View
0
Oct 11, 2018
Expert View
0
Cyber security is too often reduced to a technology-centric activity when it is actually about common sense and simple basic tasks to be done, which are also referred to as “cyber security hygiene rules”. Sticking to those rules will not protect you from the most sophisticated of attacks, but will greatly reduce your attack surface; besides, without cyber hygiene, many of the best cyber security technologies could be rendered useless. And the concept allows you to concentrate precisely on ...
Analyst : 
Mathieu Poujol, Wolfgang Schwab
Downloads : 
46
2 pages
Expert View: What can blockchain do in an industrial environment?
Sep 20, 2017 | Expert View
0
Sep 20, 2017
Expert View
0
Whenever goods or intangible assets (such as digital twins, 3D print files) are moved between different business partners, the distributed database technology blockchain can also help the industry. Initial projects show promising potential, but also highlight an open question regarding the preferred platform. Click here for the German version. Click here for the French version.
Analyst : 
Downloads : 
116
2 pages
Expert View: What is the impact of the CLOUD Act?
May 20, 2019 | Expert View
0
May 20, 2019
Expert View
0
Last year, the Trump administration launched the CLOUD (Clarifying Lawful Overseas Use of Data) Act, a new law permitting unprecedented access to US and non-US data stored by US companies in the US but also in data centers across the world. Though the mere choice of words may seem off-putting, it is important for both enterprises and administrations to familiarize themselves with what the CLOUD Act entails.
Analyst : 
Mathieu Poujol, Wolfgang Schwab
Downloads : 
30
2 pages
Expert View: What should edge computing users look out for?
Feb 25, 2019 | Expert View
0
Feb 25, 2019
Expert View
0
Edge computing is one of the most recent hype topics in IT. In general, edge computing solutions are interesting for user organizations for which central data center infrastructures or cloud computing solutions are not sufficient. The main reasons to consider edge computing are latency issues, network availability, security, confidentiality and connection costs. Before a decision for edge computing is made, it is important to calculate a business case and evaluate the technical need. It is...
Analyst : 
Wolfgang Schwab, Stefanie Naujoks
Downloads : 
46
2 pages
Expert View: What’s the maturity of security rating platforms, and are they worthwhile?
May 13, 2019 | Expert View
0
May 13, 2019
Expert View
0
The first rating platforms could not do much more than collect open security data from the internet and apply analytics features to it to calculate a scorecard. Since then, much has changed: today’s platforms are developed fully in the cloud, use microservices architectures and are powered by artificial intelligence and big data. They are able to assess highly complex companies and their ecosystems, can be customized and detect new, hidden vulnerabilities with contextual and behavioral ana...
Analyst : 
Mathieu Poujol, Wolfgang Schwab
Downloads : 
17
2 pages
Expert View: Why is IT/OT integration important, and what are the challenges?
Mar 14, 2019 | Expert View
0
Mar 14, 2019
Expert View
0
Operational Technology (OT) and Information Technology (IT) used to be separate for decades, as there was simply no reason to integrate those two areas. Stable OT systems were basically left untouched during the lifetime of a production plant, while IT has always had the reputation of needing frequent changes and being vulnerable to cyber security issues. Nowadays, the concepts of digitalization, Industry 4.0 and IIoT make the convergence of IT/OT mandatory, in order to optimize business m...
Analyst : 
Wolfgang Schwab, Stefanie Naujoks
Downloads : 
73
2 pages
Expert View: Wie können Versicherungen von der Blockchain profitieren?
May 05, 2017 | Expert View
0
May 05, 2017
Expert View
0
Die verteilte Datenbank Blockchain bietet eine technische Basis für die Integrität digitaler Informationen. Dadurch lassen sich zum Beispiel Besitzverhältnisse und Transaktionen eindeutig belegen. Erste InsurTechs nutzen die Blockchain für neue Geschäftsmodelle und weitreichende Automatisierung. Was bedeutet das für die Geschäfte klassischer Versicherer?   Click here for the English version. Click here for the French version.
Analyst : 
Downloads : 
70
2 pages

Pages