Le futur de la GRC : Nouveaux challenges, nouvelles approches - 1ère partie - InSight Analysis - France
Nov 27, 2017 | InSight Analysis
0
Nov 27, 2017
InSight Analysis
0
Ce rapport fait le point sur les problématiques qui se posent aux organisations pour répondre aux exigences règlementaires dans un contexte de plus en plus tendu, où la cyber-conformité se rajoute aux règlementations spécifiques. Dans une seconde partie nous ferons le point sur les types de solutions technologiques et les services de GRC (Governance Risk and Compliance) disponibles sur le marché. Cette étude s’adresse aux DSI, aux RSSI et plus généralement aux responsables des risque...
Analyst : 
Downloads : 
38
19 pages
IoT Security in Healthcare - InBrief Analysis - Europe
Oct 18, 2017 | InBrief Analysis
0
Oct 18, 2017
InBrief Analysis
0
Healthcare services across the world are under increased pressure to provide more effective care to ageing populations, and work within constrained budgets. This is particularly true of publicly funded or subsidized health organizations like the NHS in the UK. Healthcare funding and management is under review in many advanced nations. Like other verticals, the healthcare sector is increasingly looking at digital opportunities to find new efficiencies, better response rates and perhaps mo...
Analyst : 
Downloads : 
136
9 pages
Leadership Compass: Database Security - Product Benchmark - Worldwide
Oct 04, 2017 | Product & Supplier Benchmarks
0
Oct 04, 2017
Product & Supplier Benchmarks
0
Database security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability. It covers various security controls for the information itself stored and processed in database systems, underlying computing and network infrastructures, as well as applications accessing the data.   Contents: 1 Management Summary 1.1 Overall Leadership 1.2 Product Leadership 1.3 M...
Analyst : 
Downloads : 
27
49 pages
Leadership Compass: Identity as a Service: Cloud-based Provisioning, Access Governance and Federation - Product Benchmark - Worldwide
Oct 04, 2017 | Product & Supplier Benchmarks
0
Oct 04, 2017
Product & Supplier Benchmarks
0
Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting full Identity and Access Management and Governance capabilities for employees in hybrid environments, but also delivering Single Sign-On to the Cloud and providing support for other groups of users. Your compass for finding the right path in the market. Contents: 1 Introduction 1.1 Market Segment 1.2 Delivery models 1.3 Required Capabilities 2 Leadership 2.1 Ove...
Analyst : 
Downloads : 
33
66 pages
Leadership Compass: CIAM Platforms - Product Benchmark - Worldwide
Oct 02, 2017 | Product & Supplier Benchmarks
0
Oct 02, 2017
Product & Supplier Benchmarks
0
This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing CIAM solutions.   Contents: 1 Introduction 1.1 Market Segment 1.2 Delivery models 1.3 Required Capabilities...
Analyst : 
Downloads : 
30
53 pages
Leadership Compass: Identity as a Service: Single Sign-on to the Cloud - Product Benchmark - Worldwide
Oct 02, 2017 | Product & Supplier Benchmarks
0
Oct 02, 2017
Product & Supplier Benchmarks
0
Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting Single Sign-On to the Cloud for all types of users, with primary focus on cloud services but some support for on-premise web applications. Your compass for finding the right path in the market. Contents: 1 Introduction 1.1 Market Segment 1.2 Delivery models 1.3 Required Capabilities 2 Leadership 2.1 Overall Leadership 2.2 Product Leadership 2.3 Innovation Le...
Analyst : 
Downloads : 
27
53 pages
Leadership Compass: Adaptive Authentication - Product Benchmark - Worldwide
Oct 02, 2017 | Product & Supplier Benchmarks
0
Oct 02, 2017
Product & Supplier Benchmarks
0
Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.   Contents: 1 Management Summary 1.1 Overall Leadership 1.2 Product Leadership 1.3 Market Leadership 1.4 Innovation Leadership 2 Methodology 3 Product Rating 4 Vendor Rating 5 Vendor Coverage 6 Market Segment 7 Specific features analyzed 8 Market Leaders 9 Product Leaders ...
Analyst : 
Downloads : 
15
49 pages
Leadership Compass: Privilege Management - Product Benchmark - Worldwide
Oct 02, 2017 | Product & Supplier Benchmarks
0
Oct 02, 2017
Product & Supplier Benchmarks
0
Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and optimised day to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management product that best meets your needs.   Contents: 1 Introduction 1.1 Market Segment 1.2 Requ...
Analyst : 
Downloads : 
49
55 pages
Leadership Compass: Cloud Access Security Brokers - Product Benchmark - Worldwide
Oct 02, 2017 | Product & Supplier Benchmarks
0
Oct 02, 2017
Product & Supplier Benchmarks
0
How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.   Contents: 1 Introduction 1.1 Market Segment 1.2 Required capabilities 1.2.1 Discovery of Cloud Usage 1.2.2 Access Control 1.2.3 Securing Data in the Cloud 1.2.4 Compliance 1...
Analyst : 
Downloads : 
34
47 pages
Expert View: DevOps und API: Wie kann die digitale Transformation abgesichert werden?
Sep 25, 2017 | Expert View
0
Sep 25, 2017
Expert View
0
Cyber-Attacken wie WannaCry haben die Risiken und die Verwundbarkeit der digitalen Welt deutlich vor Augen geführt. In einer hochgradig vernetzten Welt braucht IT-Sicherheit einen neuen Stellenwert – genau darauf zielen auch neue regulatorische Verordnungen ab. Click here for the English version. Click here for the French version.
Analyst : 
Downloads : 
35
2 pages
Expert View: Was kann Blockchain im industriellen Umfeld leisten?
Sep 20, 2017 | Expert View
0
Sep 20, 2017
Expert View
0
Immer dann, wenn Waren oder immaterielle Werte (wie etwa Digital Twins oder 3DDruckdateien) zwischen verschiedenen Geschäftspartnern bewegt werden, kann die verteilte Datenbanktechnik Blockchain auch der Industrie helfen. Erste Projekte zeigen das vielversprechende Potential, weisen aber auch auf offene Fragen hin, etwa hinsichtlich der bevorzugten Plattform. Click here for the English version. Click here for the French version.
Analyst : 
Downloads : 
88
2 pages
Expert View: What can blockchain do in an industrial environment?
Sep 20, 2017 | Expert View
0
Sep 20, 2017
Expert View
0
Whenever goods or intangible assets (such as digital twins, 3D print files) are moved between different business partners, the distributed database technology blockchain can also help the industry. Initial projects show promising potential, but also highlight an open question regarding the preferred platform. Click here for the German version. Click here for the French version.
Analyst : 
Downloads : 
116
2 pages
Security and Connected Vehicles - InBrief Analysis - Europe
Aug 31, 2017 | InBrief Analysis
0
Aug 31, 2017
InBrief Analysis
0
The global car industry is going through a sustained period of change. It is likely that most of the US, Japanese and European auto giants will still exist in 20 years from now but their products will be very different. They will be all electric, possibly self-driving and hyper connected. However, is there a flaw in the grand plan of all motor manufacturers – old and new? Super connected and autonomous become vulnerable to hacks and cyber attacks once they are online – just as any co...
Analyst : 
Downloads : 
148
12 pages
Expert View: DevOps et API : Comment sécuriser la transformation digitale ?
Jul 06, 2017 | Expert View
0
Jul 06, 2017
Expert View
0
Avec Wannacry et autres attaques, le monde prend directement conscience des risques encourus et de la vulnérabilité globale de la sphère numérique. Dans un monde hyperconnecté la sécurisation se pose en termes totalement nouveaux pour l’informatique. C’est aussi ce à quoi poussent toutes les nouvelles règlementations. Click here for the English version. Click here for the German version.
Analyst : 
Downloads : 
41
2 pages
Security Operations Centers and Analytic Developments - InSight Analysis - Worldwide
Jul 03, 2017 | InSight Analysis
0
Jul 03, 2017
InSight Analysis
0
The security services space is still at various stages of maturity across global markets - the UK is more mature than Germany for example. It also remains one that is fragmented and serving different requirements to different organizations based on size and sector, and within that, security services players may even offer different options within the same organization. One defining characteristic of security services players is whether they can boast either their own, or access to a Secu...
Analyst : 
Downloads : 
30
12 pages
Expert View: NUMERIQUE ET ETHIQUE : Quelles questions se poser ?
Jun 26, 2017 | Expert View
0
Jun 26, 2017
Expert View
0
Dans le domaine des RH, comme dans de nombreux domaines, l’utilisation des nouvelles technologies ouvre de nouvelles possibilités dans l’analyse des données. Big data, small data, analyses croisées, analyses prédictives, choix, aide à la décision, automatisation… que souhaitons-nous réaliser avec l’utilisation des nouvelles technologies mise à notre disposition ? Les possibilités semblent infinies et pourtant, au plan systémique, la même ligne directrice est toujours mise en place : défi...
Downloads : 
48
2 pages
Expert View: Wie können Versicherungen von der Blockchain profitieren?
May 05, 2017 | Expert View
0
May 05, 2017
Expert View
0
Die verteilte Datenbank Blockchain bietet eine technische Basis für die Integrität digitaler Informationen. Dadurch lassen sich zum Beispiel Besitzverhältnisse und Transaktionen eindeutig belegen. Erste InsurTechs nutzen die Blockchain für neue Geschäftsmodelle und weitreichende Automatisierung. Was bedeutet das für die Geschäfte klassischer Versicherer?   Click here for the English version. Click here for the French version.
Analyst : 
Downloads : 
70
2 pages
Securing the Cloud - InSight Analysis - Worldwide
Mar 07, 2017 | InSight Analysis
4
Average: 4 (1 vote)
Mar 07, 2017
InSight Analysis
4
Average: 4 (1 vote)
This report focuses on the following topics: Analysis of the worldwide offshore market for cyber security Identification of the drivers and obstacles that are shaping the offshore market of cyber security Recommendations for end users Recommendations for offshore security service providers
Analyst : 
Downloads : 
154
22 pages
Security for ICS (Industrial Control Systems) and IoT (Internet of Things) - Market InSight - Worldwide
Feb 20, 2017 | InSight Analysis
0
Feb 20, 2017
InSight Analysis
0
This report should be of interest for all players acting in the complex (industrial) ecosystems in manufacturing, utility, transport, and telecommunications: Equipment and automation manufacturers, infrastructure technology and IT service providers, security specialists and last but not least the asset owner operators belong to these target groups. This report: Helps to understand the challenge to protect the ICS environment considering most important tech trends and regula...
Analyst : 
Downloads : 
146
26 pages
Expert View: How relevant is edge computing for IoT projects?
Feb 17, 2017 | Expert View
0
Feb 17, 2017
Expert View
0
Edge computing refers to a technology that allocates central Cloud functions to peripheral devices such as gateways and microcomputers. Amongst other things, the aim of edge computing is to provide IoT functionality even in the absence of connectivity.   Click here for the French version. Click here for the German version.
Analyst : 
Joachim Hackmann, Milos Milojevic
Downloads : 
76
2 pages
Expert View: Quelle est la pertinence du Edge Computing pour les projets IoT ?
Feb 15, 2017 | Expert View
0
Feb 15, 2017
Expert View
0
L’expression « Edge Computing » désigne une technologie qui répartit des fonctions centrales du Cloud sur des appareils décentralisés comme des capteurs et des microordinateurs. L’objectif étant, entre autres, d’assurer le fonctionnement de l’environnement IoT même en cas d’absence de connectivité.   Click here for the English version. Click here for the German version.
Analyst : 
Downloads : 
30
2 pages
UK Government Cyber Policy and Its Impact on Investment and Innovation - Market InBrief
Feb 14, 2017 | InBrief Analysis
0
Feb 14, 2017
InBrief Analysis
0
This report focuses on how the UK government is focusing efforts on building its cyber capability as part of national defence by investing billions into new research and educational facilities to make the UK a world leader. At the same time, this activity of central government may be having a positive knock on effect for the private cyber security industry. Currently, like most European countries, the UK’s indigenous cyber security industry is small and consists of a multitude of mostl...
Analyst : 
Downloads : 
37
10 pages
Expert View: Wie relevant ist Edge Computing für IoT-Projekte?
Feb 02, 2017 | Expert View
5
Average: 5 (1 vote)
Feb 02, 2017
Expert View
5
Average: 5 (1 vote)
Edge Computing bezeichnet eine Technologie, die zentrale Cloud-Funktionen auf dezentrale Geräte wie Sensoren und Mikrocomputer verteilt. Damit soll unter anderem die Funktionsfähigkeit der IoT-Umgebung auch bei fehlender Konnektivität sichergestellt werden.   Click here for the English version. Click here for the French version.
Analyst : 
Downloads : 
47
2 pages