Published: 10 August 2023
Summary
CIOs and their security and risk management leaders in China face unique operational threats in identity and access management, as well as data protection. These Cool Vendors showed innovative ways to identify real-time security risks, remediate identity threats and avoid data security breaches.
Included in Full Research
Overview
Key Findings
On-premises and customized 4A (i.e., account, authentication, authorization and audit)platforms are widely used for identity and access managementin China; however they are falling short in offering capabilities that support the scale and velocity of modern, cloud-native applications.
Traditional data observability features — such as periodically maintained data inventory and manual data risk assessment — become ineffective at identifying data security gaps and risk exposures when data is constantly being generated and proliferated across distributed, hybrid environments.
Due to the perceived performance overhead and efficiency trade-offs associated with the computational demands (e.g., the cryptographic operations) of privacy-enhancing computation techniques, PEC
To view the entire document, log
in or purchase