Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Data protection

Below you will find reports with the tag of “Data protection”

image from 2021 Zero Trust Progress Report

2021 Zero Trust Progress Report

The 2021 zero trust report reveals how enterprises are implementing zero trust security in their organizations, including key drivers, adaption trends, technologies, investments, and benefits. (more available)
Added: October 18, 2022
image from Insider Risk Report 2022

Insider Risk Report 2022

The 2022 Insider Risk Report is driven by real data observed as part of actual investigations of real customers with whom DTEX detected and responded to potential insider risk incidents before a breach occurred. (more available)
Added: July 5, 2022
image from Survey Report: Evolution of the CASB

Survey Report: Evolution of the CASB

A survey-driven report of over 200 IT and security professionals on the practices and the objectives in their use of cloud access security broker (CASB) technologies. (more available)
Added: August 21, 2020
image from Worldwide Security Spending Guide

Worldwide Security Spending Guide

The Worldwide Security Spending Guide examines the security opportunity from a technology, industry, company size, and geography perspective. This comprehensive database delivered via IDC’s Customer Insights query tool allows the user to easily extract meaningful information about the security technology market by viewing data trends and relationships and making data comparisons. (more available)
Added: February 14, 2020
image from Data Security Portfolio Vendors, Q2 2019

Data Security Portfolio Vendors, Q2 2019

In our 25-criterion evaluation of data security portfolio providers, we identified the 13 most significant ones — Dell, Digital Guardian, Forcepoint, Google, GTB Technologies, IBM, Imperva, McAfee, Micro Focus, Microsoft, Oracle, Symantec, and Varonis — and researched, analyzed, and scored them. (more available)
Added: February 12, 2020
image from Cloud Adoption and Risk Report: Business Growth Edition

Cloud Adoption and Risk Report: Business Growth Edition

A survey-based review of how and why organizations are adopting cloud technologies, specifically from a business growth perspective. Makes some specific recommendations and has discussion on CASB solutions. (more available)
Added: February 12, 2020
image from 2019 Data Exposure Report

2019 Data Exposure Report

The 2019 Data Exposure Report is based on our survey of 1,028 information security leaders, as well as 615 business decision-makers, all with budgetary decision-making power. (more available)
Added: February 6, 2020
image from A Visual Guide to Insider Threat Investigations

A Visual Guide to Insider Threat Investigations

In this eBook, they’ll cover: • The Insider Threat investigation process with security solutions like Security Information and Event Management (SIEMs) • What an investigation looks like within ObserveIT, a dedicated insider threat management platform, including: – Proactive threat hunting – Reactive alert investigations after a known incident
Added: September 18, 2019
image from Guardians Of The Cloud - 2019 Cloud Security Report

Guardians Of The Cloud - 2019 Cloud Security Report

This paper uses a unique and MARVEL-ous approach to provide insight into maintaining a robust cybersecurity posture in today’s fast-paced world. (more available)
Added: September 18, 2019
image from Threatbusters: BitGlass' 2019 Insider Threat Report

Threatbusters: BitGlass' 2019 Insider Threat Report

Insider threats constitute a legitimate danger to enterprise security. While protecting data from malicious external actors is typically top of mind for most organizations, the fact remains that they must also defend against negligent and disgruntled insiders. (more available)
Added: April 19, 2019
image from Worldwide Semiannual Security Spending Guide

Worldwide Semiannual Security Spending Guide

The Worldwide Semiannual Security Spending Guide examines the security spending opportunity from a country, industry, and technology perspective. This comprehensive database delivered via pivot table format or IDC’s Customer Insights query tool allows users to easily extract meaningful information about the core and next-generation security markets by viewing data trends and relationships and making data comparisons. (more available)
Added: March 26, 2019
image from The Six Inconvenient Truths of Data-Centric Security (and What to Do About Them)

The Six Inconvenient Truths of Data-Centric Security (and What to Do About Them)

According to IDC’s 2018 Data Services for Hybrid Cloud Survey: » 65% of enterprise IT security, line-of-business IT, and data management specialists cited a medium to robust digital rights management deployment in their organization. (more available)
Added: March 1, 2019
image from The State of Enterprise Encryption and How to Improve It

The State of Enterprise Encryption and How to Improve It

A new survey by UBM and Vera Security explores the use of encryption and access controls to understand how organizations currently use these technologies and to identify their top priorities in file security. (more available)
Added: January 17, 2019
image from The Impact Of Cloud On ERP

The Impact Of Cloud On ERP

The “Impact of Cloud on ERP” survey report was designed to assess the impact of ERP solutions on organizations and better understand cloud preparation and data migration needs to implement ERP solutions in the cloud. (more available)
Added: January 15, 2019
image from Expanding Machine Learning Applications on the Endpoint

Expanding Machine Learning Applications on the Endpoint

This paper discusses one possible avenue for improving EDR which is the broader adoption of machine learning techniques.
Added: December 29, 2018
image from The State Of Cloud And Data Protection 2018

The State Of Cloud And Data Protection 2018

This report provides 10 findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption.
Added: November 30, 2018
image from A New Era Of Network Attacks: 2018 EfficientIP Global DNS Threat Report

A New Era Of Network Attacks: 2018 EfficientIP Global DNS Threat Report

We live in a new era of network attacks. Increasing frequency and varieties, together with the latest regulations which have global impact, makes 2018 the most important year in recent times for public and private sector organizations. (more available)
Added: November 23, 2018
image from Healthcare's Most Wired: National Trends 2018

Healthcare's Most Wired: National Trends 2018

Historically, the annual Most Wired research has focused on measuring adoption of healthcare information technology to highlight those organizations with the broadest, deepest IT infrastructure. (more available)
Added: November 21, 2018
image from Deployment Architectures For The Top 20 CASB Use Cases

Deployment Architectures For The Top 20 CASB Use Cases

This document reviews the primary CASB deployment modes and then describes the 20 most common CASB use cases, revealing which deployment mode best supports each of the use cases. (more available)
Added: October 26, 2018
image from The 2018 Global Cloud Data Security Study

The 2018 Global Cloud Data Security Study

This year’s study reveals the increasing risk of noncompliance with new global privacy and data protection regulations. Another important trend over the past three years is IT security’s continuing loss of control over cloud security practices and budget. (more available)
Added: October 26, 2018
image from Cross Domain Security Rising To The Clouds

Cross Domain Security Rising To The Clouds

This report asks the question, “The US Government is beginning the migration to cloud services with FedRAMP providers and other dedicated resources – what’s the best approach for your agency? (more available)
Added: October 25, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 1, 2023 20:09 UTC (build 051771c)