Expert View: Wie relevant ist Edge Computing für IoT-Projekte?
Feb 02, 2017 | Expert View
5
Average: 5 (1 vote)
Feb 02, 2017
Expert View
5
Average: 5 (1 vote)
Edge Computing bezeichnet eine Technologie, die zentrale Cloud-Funktionen auf dezentrale Geräte wie Sensoren und Mikrocomputer verteilt. Damit soll unter anderem die Funktionsfähigkeit der IoT-Umgebung auch bei fehlender Konnektivität sichergestellt werden.   Click here for the English version. Click here for the French version.
Analyst : 
Downloads : 
47
2 pages
Securing the Cloud - InSight Analysis - Worldwide
Mar 07, 2017 | InSight Analysis
4
Average: 4 (1 vote)
Mar 07, 2017
InSight Analysis
4
Average: 4 (1 vote)
This report focuses on the following topics: Analysis of the worldwide offshore market for cyber security Identification of the drivers and obstacles that are shaping the offshore market of cyber security Recommendations for end users Recommendations for offshore security service providers
Analyst : 
Downloads : 
154
22 pages
Expert View: Quelle est la pertinence du Edge Computing pour les projets IoT ?
Feb 15, 2017 | Expert View
0
Feb 15, 2017
Expert View
0
L’expression « Edge Computing » désigne une technologie qui répartit des fonctions centrales du Cloud sur des appareils décentralisés comme des capteurs et des microordinateurs. L’objectif étant, entre autres, d’assurer le fonctionnement de l’environnement IoT même en cas d’absence de connectivité.   Click here for the English version. Click here for the German version.
Analyst : 
Downloads : 
30
2 pages
Expert View: How relevant is edge computing for IoT projects?
Feb 17, 2017 | Expert View
0
Feb 17, 2017
Expert View
0
Edge computing refers to a technology that allocates central Cloud functions to peripheral devices such as gateways and microcomputers. Amongst other things, the aim of edge computing is to provide IoT functionality even in the absence of connectivity.   Click here for the French version. Click here for the German version.
Analyst : 
Joachim Hackmann, Milos Milojevic
Downloads : 
76
2 pages
Expert View: Wie können Versicherungen von der Blockchain profitieren?
May 05, 2017 | Expert View
0
May 05, 2017
Expert View
0
Die verteilte Datenbank Blockchain bietet eine technische Basis für die Integrität digitaler Informationen. Dadurch lassen sich zum Beispiel Besitzverhältnisse und Transaktionen eindeutig belegen. Erste InsurTechs nutzen die Blockchain für neue Geschäftsmodelle und weitreichende Automatisierung. Was bedeutet das für die Geschäfte klassischer Versicherer?   Click here for the English version. Click here for the French version.
Analyst : 
Downloads : 
70
2 pages
Expert View: NUMERIQUE ET ETHIQUE : Quelles questions se poser ?
Jun 26, 2017 | Expert View
0
Jun 26, 2017
Expert View
0
Dans le domaine des RH, comme dans de nombreux domaines, l’utilisation des nouvelles technologies ouvre de nouvelles possibilités dans l’analyse des données. Big data, small data, analyses croisées, analyses prédictives, choix, aide à la décision, automatisation… que souhaitons-nous réaliser avec l’utilisation des nouvelles technologies mise à notre disposition ? Les possibilités semblent infinies et pourtant, au plan systémique, la même ligne directrice est toujours mise en place : défi...
Downloads : 
48
2 pages
Security Operations Centers and Analytic Developments - InSight Analysis - Worldwide
Jul 03, 2017 | InSight Analysis
0
Jul 03, 2017
InSight Analysis
0
The security services space is still at various stages of maturity across global markets - the UK is more mature than Germany for example. It also remains one that is fragmented and serving different requirements to different organizations based on size and sector, and within that, security services players may even offer different options within the same organization. One defining characteristic of security services players is whether they can boast either their own, or access to a Secu...
Analyst : 
Downloads : 
30
12 pages
Expert View: DevOps et API : Comment sécuriser la transformation digitale ?
Jul 06, 2017 | Expert View
0
Jul 06, 2017
Expert View
0
Avec Wannacry et autres attaques, le monde prend directement conscience des risques encourus et de la vulnérabilité globale de la sphère numérique. Dans un monde hyperconnecté la sécurisation se pose en termes totalement nouveaux pour l’informatique. C’est aussi ce à quoi poussent toutes les nouvelles règlementations. Click here for the English version. Click here for the German version.
Analyst : 
Downloads : 
41
2 pages
Expert View: Was kann Blockchain im industriellen Umfeld leisten?
Sep 20, 2017 | Expert View
0
Sep 20, 2017
Expert View
0
Immer dann, wenn Waren oder immaterielle Werte (wie etwa Digital Twins oder 3DDruckdateien) zwischen verschiedenen Geschäftspartnern bewegt werden, kann die verteilte Datenbanktechnik Blockchain auch der Industrie helfen. Erste Projekte zeigen das vielversprechende Potential, weisen aber auch auf offene Fragen hin, etwa hinsichtlich der bevorzugten Plattform. Click here for the English version. Click here for the French version.
Analyst : 
Downloads : 
88
2 pages
Expert View: What can blockchain do in an industrial environment?
Sep 20, 2017 | Expert View
0
Sep 20, 2017
Expert View
0
Whenever goods or intangible assets (such as digital twins, 3D print files) are moved between different business partners, the distributed database technology blockchain can also help the industry. Initial projects show promising potential, but also highlight an open question regarding the preferred platform. Click here for the German version. Click here for the French version.
Analyst : 
Downloads : 
116
2 pages
Expert View: DevOps und API: Wie kann die digitale Transformation abgesichert werden?
Sep 25, 2017 | Expert View
0
Sep 25, 2017
Expert View
0
Cyber-Attacken wie WannaCry haben die Risiken und die Verwundbarkeit der digitalen Welt deutlich vor Augen geführt. In einer hochgradig vernetzten Welt braucht IT-Sicherheit einen neuen Stellenwert – genau darauf zielen auch neue regulatorische Verordnungen ab. Click here for the English version. Click here for the French version.
Analyst : 
Downloads : 
35
2 pages
Leadership Compass: Cloud Access Security Brokers - Product Benchmark - Worldwide
Oct 02, 2017 | Product & Supplier Benchmarks
0
Oct 02, 2017
Product & Supplier Benchmarks
0
How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.   Contents: 1 Introduction 1.1 Market Segment 1.2 Required capabilities 1.2.1 Discovery of Cloud Usage 1.2.2 Access Control 1.2.3 Securing Data in the Cloud 1.2.4 Compliance 1...
Analyst : 
Downloads : 
34
47 pages
Leadership Compass: Privilege Management - Product Benchmark - Worldwide
Oct 02, 2017 | Product & Supplier Benchmarks
0
Oct 02, 2017
Product & Supplier Benchmarks
0
Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and optimised day to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management product that best meets your needs.   Contents: 1 Introduction 1.1 Market Segment 1.2 Requ...
Analyst : 
Downloads : 
49
55 pages
Leadership Compass: Adaptive Authentication - Product Benchmark - Worldwide
Oct 02, 2017 | Product & Supplier Benchmarks
0
Oct 02, 2017
Product & Supplier Benchmarks
0
Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.   Contents: 1 Management Summary 1.1 Overall Leadership 1.2 Product Leadership 1.3 Market Leadership 1.4 Innovation Leadership 2 Methodology 3 Product Rating 4 Vendor Rating 5 Vendor Coverage 6 Market Segment 7 Specific features analyzed 8 Market Leaders 9 Product Leaders ...
Analyst : 
Downloads : 
15
49 pages
Leadership Compass: Identity as a Service: Single Sign-on to the Cloud - Product Benchmark - Worldwide
Oct 02, 2017 | Product & Supplier Benchmarks
0
Oct 02, 2017
Product & Supplier Benchmarks
0
Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting Single Sign-On to the Cloud for all types of users, with primary focus on cloud services but some support for on-premise web applications. Your compass for finding the right path in the market. Contents: 1 Introduction 1.1 Market Segment 1.2 Delivery models 1.3 Required Capabilities 2 Leadership 2.1 Overall Leadership 2.2 Product Leadership 2.3 Innovation Le...
Analyst : 
Downloads : 
27
53 pages
Leadership Compass: CIAM Platforms - Product Benchmark - Worldwide
Oct 02, 2017 | Product & Supplier Benchmarks
0
Oct 02, 2017
Product & Supplier Benchmarks
0
This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing CIAM solutions.   Contents: 1 Introduction 1.1 Market Segment 1.2 Delivery models 1.3 Required Capabilities...
Analyst : 
Downloads : 
30
53 pages
Leadership Compass: Identity as a Service: Cloud-based Provisioning, Access Governance and Federation - Product Benchmark - Worldwide
Oct 04, 2017 | Product & Supplier Benchmarks
0
Oct 04, 2017
Product & Supplier Benchmarks
0
Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting full Identity and Access Management and Governance capabilities for employees in hybrid environments, but also delivering Single Sign-On to the Cloud and providing support for other groups of users. Your compass for finding the right path in the market. Contents: 1 Introduction 1.1 Market Segment 1.2 Delivery models 1.3 Required Capabilities 2 Leadership 2.1 Ove...
Analyst : 
Downloads : 
33
66 pages
Leadership Compass: Database Security - Product Benchmark - Worldwide
Oct 04, 2017 | Product & Supplier Benchmarks
0
Oct 04, 2017
Product & Supplier Benchmarks
0
Database security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability. It covers various security controls for the information itself stored and processed in database systems, underlying computing and network infrastructures, as well as applications accessing the data.   Contents: 1 Management Summary 1.1 Overall Leadership 1.2 Product Leadership 1.3 M...
Analyst : 
Downloads : 
27
49 pages
IoT Security in Healthcare - InBrief Analysis - Europe
Oct 18, 2017 | InBrief Analysis
0
Oct 18, 2017
InBrief Analysis
0
Healthcare services across the world are under increased pressure to provide more effective care to ageing populations, and work within constrained budgets. This is particularly true of publicly funded or subsidized health organizations like the NHS in the UK. Healthcare funding and management is under review in many advanced nations. Like other verticals, the healthcare sector is increasingly looking at digital opportunities to find new efficiencies, better response rates and perhaps mo...
Analyst : 
Downloads : 
136
9 pages
Le futur de la GRC : Nouveaux challenges, nouvelles approches - 1ère partie - InSight Analysis - France
Nov 27, 2017 | InSight Analysis
0
Nov 27, 2017
InSight Analysis
0
Ce rapport fait le point sur les problématiques qui se posent aux organisations pour répondre aux exigences règlementaires dans un contexte de plus en plus tendu, où la cyber-conformité se rajoute aux règlementations spécifiques. Dans une seconde partie nous ferons le point sur les types de solutions technologiques et les services de GRC (Governance Risk and Compliance) disponibles sur le marché. Cette étude s’adresse aux DSI, aux RSSI et plus généralement aux responsables des risque...
Analyst : 
Downloads : 
38
19 pages
Le futur de la GRC : Nouveaux challenges, nouvelles approches - 2ème partie - InSight Analysis - France
Nov 27, 2017 | InSight Analysis
0
Nov 27, 2017
InSight Analysis
0
Après avoir décrit, dans la première partie, les problématiques qui se posent aux organisations pour répondre aux exigences règlementaires dans le contexte de la cybersécurité, ce rapport fait maintenant le point sur les types de solutions technologiques et les services de GRC (Governance Risk and Compliance) disponibles sur le marché. Cette étude s’adresse aux DSI, aux RSSI et plus généralement aux responsables des risques et des projets de mise en conformité dans les entreprises, a...
Analyst : 
Downloads : 
50
15 pages
The Future of GRC: New Challenges, New Approaches - Part 1 - InSight Analysis - Worldwide
Jan 05, 2018 | InSight Analysis
0
Jan 05, 2018
InSight Analysis
0
This report takes stock of the challenges faced by organizations to meet regulatory requirements in an increasingly tense context, where cyber compliance is added to specific regulations. In a second part we will review the different types of technology solutions and GRC (Governance, Risk and Compliance) services currently available on the market. This study is intended for CIOs, CISOs and more generally those responsible for risk and compliance projects in companies as well as decis...
Analyst : 
Downloads : 
23
19 pages
The Future of GRC: New Challenges, New Approaches - Part 2 - InSight Analysis - Worldwide
Jan 05, 2018 | InSight Analysis
0
Jan 05, 2018
InSight Analysis
0
Having described the challenges faced by organizations in order to meet regulatory requirements with regard to cyber security in the first part, this report will now review the types of technology solutions and GRC (Governance, Risk and Compliance) services that are available on the market. This study is intended for CIOs, CISOs and more generally those responsible for risk and compliance projects in companies as well as decision makers in charge of dealing with these service offerin...
Analyst : 
Downloads : 
27
15 pages
Expert View: DevOps and API: how can digital transformation be made secure?
Jan 11, 2018 | Expert View
0
Jan 11, 2018
Expert View
0
Wannacry and other attacks have laid bare how vulnerable the digital world is. In a hyperconnected and agile world, the cyber-security game has completely changed. The new data compliance regulations such as GDPR are adding new pressures. Click here for the German version. Click here for the French version.
Analyst : 
Downloads : 
60
2 pages
Expert View: How can insurance companies benefit from blockchain?
Feb 06, 2018 | Expert View
0
Feb 06, 2018
Expert View
0
The distributed blockchain database provides a technical basis for the integrity of digital information. This enables ownership and transactions to be clearly documented. The first wave of InsurTechs is using blockchain to support new business models and drive far-reaching automation. But what does blockchain mean for the business of classic insurers?   Click here for the German version. Click here for the French version.
Analyst : 
Downloads : 
86
2 pages
Expert View: Comment les compagnies d’assurances peuvent-elles bénéficier de la blockchain ?
Feb 06, 2018 | Expert View
0
Feb 06, 2018
Expert View
0
La blockchain, une base de données partagée, fournit une base technique pour certifier l’intégrité des renseignements numériques. Elle permet notamment de tracer de façon claire les régimes de propriété et les transactions. Les premières InsurTech utilisent la blockchain dans le cadre de nouveaux modèles économiques et de démarches d’automatisation étendue. Quelles sont les implications pour les assureurs classiques ? Click here for the English version. Click here for the Germa...
Analyst : 
Joachim Hackmann, David Gautier
Downloads : 
30
2 pages
Positioning of Major Security Software Vendors - InBrief Analysis - France
Feb 26, 2018 | InBrief Analysis
0
Feb 26, 2018
InBrief Analysis
0
2017 has been an active year for cyber security. The French government has passed a series of legislation, aiming to protect "vital operational infrastructures" (VIO), forcing the dematerialization of procedures and severely tightening fraud controls. Combined with the European regulation on digital identity (e-IDAS), the Network and Information System Directive, and the protection of personal data (GDPR) (not to mention various financial and business regulations), this is clearly driving ...
Analyst : 
Downloads : 
86
23 pages
Impact of Cyber Security on Digital Innovation - InSight Analysis - Worldwide
Mar 20, 2018 | InSight Analysis
0
Mar 20, 2018
InSight Analysis
0
This report answers the following questions: What is digital innovation and what are the major stages of digital transformation? How does digital innovation reflect on the cyber security of companies and vice versa, what is the impact of cyber security on moving forward with digital innovation? What are major developments in cyber security in the public sector? What are major developments in cyber security across private sectors?   Contents: ...
Analyst : 
Paul Fisher, Milos Milojevic
Downloads : 
113
17 pages
Expert View: Quel impact les blockchains peuvent-elles avoir sur un environnement industriel ?
Mar 26, 2018 | Expert View
0
Mar 26, 2018
Expert View
0
Dès lors que plusieurs partenaires commerciaux partagent des ressources non tangibles (jumeaux numériques, fichiers d'impression 3D, etc.), les technologies de registres distribués ou « blockchain » présentent un intérêt. Des projets initiaux montrent le potentiel prometteur de cette technologie, mais soulèvent également une question ouverte concernant le choix de la plateforme la plus appropriée.   Click here for the English version. Click here for the German versio...
Analyst : 
Joachim Hackmann, Mathieu Poujol
Downloads : 
40
2 pages
Artificial Intelligence (AI) & Machine Learning in Cyber Security Applications - InBrief Analysis - Europe
Apr 04, 2018 | InBrief Analysis
0
Apr 04, 2018
InBrief Analysis
0
Objectives of the report: Identify the current and future scale of AI and machine learning in cyber security applications Explore what the options for buyers of AI-driven cyber security applications may be Analyze the proposed advantages of AI and machine learning Discuss some potential disadvantages of intelligent security systems and how hackers could use the same technology Predict the market growth for intelligent security systems   ...
Analyst : 
Downloads : 
146
12 pages
Cloud & Security - The Yin & Yang of Digital Transformation - InSight Analysis - Worldwide
Apr 13, 2018 | InSight Analysis
0
Apr 13, 2018
InSight Analysis
0
This report has four main objectives: to make (1) end users aware that cloud computing is not only the sum of all fears in cyber security, but also (2) the most powerful weapon they have for securing digital enterprises. We will (3) analyze the relationship between two of the most important catalysts of digital transformation — security and cloud — and (4) look at how these two opposing concepts are in fact complementary.   Contents: Introduction: The importance of t...
Analyst : 
Downloads : 
81
27 pages
Expert View: Welche Technologien können Unternehmen bei der Umsetzung der EU-DSGVO/GDPR-Anforderungen unterstützen?
Apr 20, 2018 | Expert View
0
Apr 20, 2018
Expert View
0
Die Datenschutz-Grundverordnung (DSGVO/General Data Protection Regulation, GDPR) ist eine Verordnung der EU, durch die die Regeln für die Verarbeitung personenbezogener Daten durch private Unternehmen und öffentliche Stellen EU-weit vereinheitlicht werden. Dadurch soll u.a. der Schutz von personenbezogenen Daten innerhalb der EU sichergestellt werden. Bei fehlender Compliance oder Missachtung der Verordnung drohen Unternehmen Strafen von bis zu 4% ihres Gesamtumsatzes. Diese Expert View b...
Analyst : 
Downloads : 
24
2 pages
Presenting the GDPR Toolbox - InBrief Analysis - Worldwide
Apr 20, 2018 | InBrief Analysis
0
Apr 20, 2018
InBrief Analysis
0
The GDPR is just around the corner. By May 25, 2018, every organization will need to have put in place adequate mechanisms to ensure the proper protection of personally identifiable information within IT systems and processes. During the last 12 months, members of the IT industry have gathered to put together a useful set of tools for implementing a new system of records for organizations. This paper provides a first glimpse at what should go into the GDPR Toolbox, and the type of ...
Analyst : 
Downloads : 
32
9 pages
The Cyber Insurance Market - InBrief Analysis - Worldwide
May 03, 2018 | InBrief Analysis
0
May 03, 2018
InBrief Analysis
0
The "WannaCry” ransomware outbreaks across Europe had IT security chiefs scrambling to deal with the threat, but it also focused minds in other departments too. Previously only a peripheral consideration for many companies and institutions, cyber insurance and risk management are now being considered in a new serious light by organizations across the world. This report looks at the options available to these organizations, and the state of the cyber insurance and risk market in Europ...
Analyst : 
Downloads : 
45
8 pages
Cyber Security – Trend and Vendor Analysis - InBrief Analysis - UK
May 18, 2018 | InBrief Analysis
0
May 18, 2018
InBrief Analysis
0
This report gives an overview of the latest trends and relevant vendors on the UK market for cyber security software and services.   Contents: Trends in Security Software The shift to advanced firewalls Application Security Testing & Secure DevOps Identity & Access Management (IAM) Privileged Account Management Security Incident and Event Management (SIEM) Trends in Security Services Threat intelligence and ...
Analyst : 
Downloads : 
71
16 pages
Cyber Security - BAE Systems - Vendor Profile - Worldwide
May 28, 2018 | Vendor Profile - Cluster-specific
0
May 28, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
14
12 pages
Cyber Security - Symantec - Vendor Profile - Worldwide
May 28, 2018 | Vendor Profile - Cluster-specific
0
May 28, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
12
12 pages
CxO Survey - Investment Priorities - Cyber Security - InSight Analysis - Worldwide
Jun 05, 2018 | CxO Survey - Investment Priorities
0
Jun 05, 2018
CxO Survey - Investment Priorities
0
PAC conducted the 2017 edition of its annual 'SITSI® CxO Investment Survey,' interviewing IT decision-makers in user companies all over the world to get their views on current IT trends, key requirements, and investment plans. This report presents and discusses the key results of the study for the topic of cyber & information security. The potential of new technologies is a mixed blessing for cyber security as some like mobility and the IoT are huge vulnerability generators, whil...
Analyst : 
Downloads : 
67
31 pages
Cloud Access Security Brokers - InBrief Analysis - Worldwide
Jun 27, 2018 | InBrief Analysis
0
Jun 27, 2018
InBrief Analysis
0
This report has two main objectives: (1) to make end users aware that cloud computing needs a new approach to cyber security and (2) that Cloud Access Security Brokers (CASB) can be a suitable response, but that it will not solve all the issues. We will analyze today’s needs in cloud security, the different types of CASB, their main functionalities, uses cases and limitations.   Contents: PAC’s analysis Management summary PAC’s opinion PAC’s rec...
Analyst : 
Downloads : 
36
14 pages
Expert View: Is OpenStack focusing enough on cyber security?
Jul 16, 2018 | Expert View
0
Jul 16, 2018
Expert View
0
OpenStack is the de facto standard for private cloud infrastructures, and as such, one of the biggest open source communities. Due to its importance in the digital value chain of many companies, it is very important to assess and analyze its cyber security level and initiatives.
Analyst : 
Downloads : 
36
2 pages
From SOC to Integrated Security Environments - InBrief Analysis - Worldwide
Jul 27, 2018 | InBrief Analysis
0
Jul 27, 2018
InBrief Analysis
0
One defining characteristic of security services players is whether they can boast either their own security operations center (SOC) or access to one. At the same time, some organizations are willing to set up an in-house SOC with the help of outside experts to monitor traffic in and out of the organization. This report looks at the current state of the SOC market and how it is changing to adapt to the evolving and fast-paced security demands of the increasingly digital business envi...
Analyst : 
Downloads : 
38
14 pages
IT Security by Segments - Market Figures - US
Aug 28, 2018 | Market Figures & Forecast
0
Aug 28, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in US for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please click h...
Analyst : 
Downloads : 
15
Key Issues in Cyber Security for Digital Finance - InBrief Analysis - Worldwide
Aug 30, 2018 | InBrief Analysis
0
Aug 30, 2018
InBrief Analysis
0
The two key issues in cyber security in the area of digital finance are: The common cyber security issues, such as denial of service, data theft, IAM and cloud- & DevOps-related cyber security. Finance-specific cyber security issues have a lot to do with the particularities of financial institutions, such as their complexity or the critical nature of client interaction systems and financial processes, e.g. anti-money laundering. Contents: Management Summar...
Analyst : 
Downloads : 
51
10 pages
Key Issues in Cyber Security for the Aerospace & Defense Industry - InBrief Analysis - Worldwide
Aug 30, 2018 | InBrief Analysis
0
Aug 30, 2018
InBrief Analysis
0
The aerospace & defense industry increasingly has to deal with the common cyber security issues, due to its growing exposure to non-A&D, OT-based technologies; however, the impacts remain limited. The enterprises of the A&D segment have long been closely protected due to their specific systems development processes and the regulations they have been subject to. However, they now have many new digital technologies and processes at the core of their operating models.  ...
Analyst : 
Downloads : 
33
9 pages
Key Cyber Security Issues in Healthcare - InBrief Analysis - Worldwide
Sep 10, 2018 | InBrief Analysis
0
Sep 10, 2018
InBrief Analysis
0
In the following InBrief report, PAC will provide an overview of the major cyber security risks and trends in the healthcare industry and will give some crucial recommendations for IT providers as well as IT buyers.   Contents: Management Summary The Context Digital transformation in the healthcare sector The Key Issues in Cyber Security for the Healthcare Sector Special characteristics of healthcare data Major reasons for incr...
Analyst : 
Downloads : 
40
11 pages
Expert View: Anti-money laundering: what is the role of FinTech?
Oct 08, 2018 | Expert View
0
Oct 08, 2018
Expert View
0
Financial institutions now have to reconcile two opposing trends that are at the core of their activities: clients demand for more convenience with digitally enhanced systems whereas the financial institutions must comply with stringent anti-money laundering and cyber security regulations.
Analyst : 
Mathieu Poujol, Joachim Hackmann
Downloads : 
82
2 pages
Cyber Security - CyberArk Software - Vendor Profile - Worldwide
Oct 08, 2018 | Vendor Profile - Cluster-specific
0
Oct 08, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Share of Segments in Cyber Security Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentat...
Analyst : 
Downloads : 
9
12 pages
Expert View: What are the most important cyber security hygiene rules?
Oct 11, 2018 | Expert View
0
Oct 11, 2018
Expert View
0
Cyber security is too often reduced to a technology-centric activity when it is actually about common sense and simple basic tasks to be done, which are also referred to as “cyber security hygiene rules”. Sticking to those rules will not protect you from the most sophisticated of attacks, but will greatly reduce your attack surface; besides, without cyber hygiene, many of the best cyber security technologies could be rendered useless. And the concept allows you to concentrate precisely on ...
Analyst : 
Mathieu Poujol, Wolfgang Schwab
Downloads : 
46
2 pages
Expert View: Is artificial intelligence reliable and secure enough at this stage?
Oct 22, 2018 | Expert View
0
Oct 22, 2018
Expert View
0
Even though still a black box for the majority of people, artificial intelligence is considered a core component of digital transformation. It is the underlying technology of many digital trends, from smart buildings to cognitive IT. But despite being hyped as the new technological revolution, several recent incidents have cast doubt on AI’s security and liability. And they have caused fear over the risk of AI not being limited to the virtual world only.
Analyst : 
Mathieu Poujol, Elena Ndrepepa
Downloads : 
65
2 pages
Cyber Security - Tech Mahindra - Vendor Profile - Worldwide
Oct 26, 2018 | Vendor Profile - Cluster-specific
0
Oct 26, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
15
12 pages

Pages