Published: 24 July 2018
Summary
Data is a pervasive asset that crosses traditional boundaries on-premises and into cloud services. Every business needs a data-centric security strategy to prioritize datasets for mitigation of growing business risks caused by data protection and privacy laws, hacking, fraud, and ransomware.
Included in Full Research
- What You Need to Know
- The Hype Cycle
- The Priority Matrix
- Off the Hype Cycle
- On the Rise
- DataOps
- Blockchain for Data Security
- Infonomics
- Multiparty Computing
- At the Peak
- DLP for Mobile Devices
- Privacy Impact Assessments
- Data Classification
- Digital Ethics
- File Analysis
- KMaaS
- Privacy by Design
- Sliding Into the Trough
- TLS Decryption Platform
- Cloud Data Protection Gateways
- Information Dispersal Algorithms
- Privacy Management Tools
- User and Entity Behavior Analytics
- Data Sanitization
- Secure Instant Communications
- Dynamic Data Masking
- Enterprise Key Management
- Cloud Access Security Brokers
- Cloud Storage Gateways
- Climbing the Slope
- Enterprise Digital Rights Management
- Data Access Governance
- Data Loss Prevention
- Database Audit and Protection
- IaaS Container Encryption
- Self-Encrypting Mass Storage Drives
- Entering the Plateau
- Database Encryption
- DLP for Email
- Fraud Detection
- Appendixes
- Hype Cycle Phases, Benefit Ratings and Maturity Levels