IT security and data protection: what blockchain can and cannot do - InSight Analysis - Worldwide
Mar 18, 2019 | InSight Analysis
0
Mar 18, 2019
InSight Analysis
0
Objectives of the report: Blockchain is a secure and reliable technology for distributed databases and ledgers. There are different versions that work with different protocols and procedures to verify transactions and entries. This report will not look at those protocols (for example Ethereum, Hyperledger, Ripple, Quorum, Multichain, etc.) in detail but focus on evaluating the security-relevant basic principles of the blockchain technology: The basic functions of blockchain...
Analyst : 
Downloads : 
1
20 pages
 
In the spirit of partnership: insights from the first Cyber Security Tech Summit Europe in Bonn
Mar 18, 2019 | Blog Post
Mar 18, 2019
Blog Post
In the spirit of partnership: insights from the first Cyber Security Tech Summit Europe in Bonn

Published: Mar 18, 2019 Type: Blog Post
Expert View: Why is IT/OT integration important, and what are the challenges?
Mar 14, 2019 | Expert View
0
Mar 14, 2019
Expert View
0
Operational Technology (OT) and Information Technology (IT) used to be separate for decades, as there was simply no reason to integrate those two areas. Stable OT systems were basically left untouched during the lifetime of a production plant, while IT has always had the reputation of needing frequent changes and being vulnerable to cyber security issues. Nowadays, the concepts of digitalization, Industry 4.0 and IIoT make the convergence of IT/OT mandatory, in order to optimize business m...
Analyst : 
Wolfgang Schwab, Stefanie Naujoks
Downloads : 
9
2 pages
Cyber Security - McAfee - Vendor Profile - Worldwide
Mar 14, 2019 | Vendor Profile - Cluster-specific
0
Mar 14, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy's Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
6
13 pages
Cyber Security - DXC - Vendor Profile - Worldwide
Mar 13, 2019 | Vendor Profile - Cluster-specific
0
Mar 13, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy's Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
6
13 pages
Expert View: What should edge computing users look out for?
Feb 25, 2019 | Expert View
0
Feb 25, 2019
Expert View
0
Edge computing is one of the most recent hype topics in IT. In general, edge computing solutions are interesting for user organizations for which central data center infrastructures or cloud computing solutions are not sufficient. The main reasons to consider edge computing are latency issues, network availability, security, confidentiality and connection costs. Before a decision for edge computing is made, it is important to calculate a business case and evaluate the technical need. It is...
Analyst : 
Wolfgang Schwab, Stefanie Naujoks
Downloads : 
16
2 pages
Expert View: Offering and using smart products – what should be considered in the context of security?
Feb 22, 2019 | Expert View
0
Feb 22, 2019
Expert View
0
Smart products are the key element of many digitalization strategies. They often enable new services and business models and by that strengthen customer loyalty. The users of smart products are offered the benefit of e.g. predictive maintenance functionality or are provided new features during the life time of a product. One important aspect to be considered before offering (and buying) smart products is, however, a thorough analysis of their inherent data protection and security functions...
Analyst : 
Wolfgang Schwab, Stefanie Naujoks
Downloads : 
12
2 pages
 
The Value of Immersive Experiences in Cyber Security
Jan 25, 2019 | Blog Post
Jan 25, 2019
Blog Post
The Value of Immersive Experiences in Cyber Security

Published: Jan 25, 2019 Type: Blog Post
Cyber Security - HCL Technologies - Vendor Profile - Worldwide
Jan 17, 2019 | Vendor Profile - Cluster-specific
0
Jan 17, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy's Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
9
14 pages
 
Les 10 concepts qui feront buzzer l'IT en 2019
Jan 16, 2019 | Blog Post
Jan 16, 2019
Blog Post
Les 10 concepts qui feront buzzer l'IT en 2019

Published: Jan 16, 2019 Type: Blog Post
IT Security by Segments - Market Figures - Western Europe Consolidation
Dec 19, 2018 | Market Figures & Forecast
0
Dec 19, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the Western European IT security market for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Ple...
Analyst : 
Downloads : 
5
IT Security by Segments - Market Figures - Rest of Western Europe including Portugal
Dec 19, 2018 | Market Figures & Forecast
0
Dec 19, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the Rest of Western European IT security market in for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. ...
Analyst : 
Downloads : 
1
IT Security by Segments - Market Figures - Western Europe by Countries
Dec 19, 2018 | Market Figures & Forecast
0
Dec 19, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the Western European IT security market for the 2016-2022 period. It covers 14 countries (Austria, Belgium, Denmark, Finland, France, Germany, Italy, Netherlands, Norway, Portugal, Spain, Sweden, Switzerland, UK) and Rest of Western Europe (Greece, Iceland, Ireland, Liechtenstein, Luxembourg, Malta). The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity &...
Analyst : 
Downloads : 
9
IT Security by Segments - Market Figures - Denmark
Dec 17, 2018 | Market Figures & Forecast
0
Dec 17, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Denmark for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cl...
Analyst : 
Downloads : 
1
IT Security by Segments - Market Figures - Sweden
Dec 17, 2018 | Market Figures & Forecast
0
Dec 17, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Sweden for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cli...
Analyst : 
Downloads : 
1
IT Security by Segments - Market Figures - Norway
Dec 17, 2018 | Market Figures & Forecast
0
Dec 17, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Norway for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cli...
Analyst : 
Downloads : 
1
IT Security by Segments - Market Figures - Spain
Dec 17, 2018 | Market Figures & Forecast
0
Dec 17, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Spain for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please clic...
Analyst : 
Downloads : 
3
IT Security by Segments - Market Figures - Italy
Dec 14, 2018 | Market Figures & Forecast
0
Dec 14, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Italy for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please clic...
Analyst : 
Cyber Security - IBM Security - Vendor Profile - Worldwide
Dec 14, 2018 | Vendor Profile - Cluster-specific
0
Dec 14, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
10
15 pages
Cyber Security - secunet - Vendor Profile - Worldwide
Dec 13, 2018 | Vendor Profile - Cluster-specific
0
Dec 13, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
6
12 pages

Pages