Hype Cycle for Data and Collaboration Security, 2012



Purchase this Document

Price: $1,995.00 USD (PAGES: 74)

To purchase this document, you will need to register or sign in above.


Enterprise boundaries continue to blur as data is shared across the Internet between partner organizations and unmanaged endpoints, increasing concerns about data leakage and manipulation. External collaboration is encouraging greater use of application layer and data layer security controls.

Table of Contents

  • Analysis
    • What You Need to Know
    • The Hype Cycle
    • The Priority Matrix
    • Off the Hype Cycle
    • On the Rise
      • Limited Disclosure Technology
      • SaaS Delivery of Treasury and Trading Services
      • Mobile Fraud Detection
      • Internet Document Tracking
      • Time-Stamping Services
      • Trusted Viewing
      • Visual Watermarking
      • Automatic Content Recognition
      • Cloud Encryption Gateways
    • At the Peak
      • Data Wiping
      • Mobile Application Security Testing
      • Interoperable Storage Encryption
      • Data Center Storage Encryption
      • IaaS Container Encryption
      • Board of Directors Communications Systems
      • Redaction
    • Sliding Into the Trough
      • Data Encryption Technologies, HDDs and SSDs
      • Tokenization
      • Enterprise Key Management
      • Fraud Detection
      • Content-Aware Data Loss Prevention
      • Enterprise Digital Rights Management
      • Virtual Data Rooms
    • Climbing the Slope
      • Data Restoration Services
      • Database Audit and Protection
      • Email Encryption
      • Mobile Data Protection
      • Portable Storage Device Control
      • Database Encryption
      • Static Data Masking
      • Storage Tape Encryption
      • Content-Aware DLP for Email
      • Trusted Portable Storage Security
      • Managed File Transfer
      • Consumer Digital Rights Management
    • Entering the Plateau
      • E-Signatures
    • Appendixes
      • Hype Cycle Phases, Benefit Ratings and Maturity Levels
  • Recommended Reading
© 2012 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartners research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

Not a Gartner Client?

Want more research like this?
Learn the benefits of becoming a Gartner client.

Contact us online





Why Gartner

Gartner delivers the technology-related insight you need to make the right decisions, every day.

Find out more