Cyber Security - HCL Technologies - Vendor Profile - Worldwide
Jan 17, 2019 | Vendor Profile - Cluster-specific
0
Jan 17, 2019
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information teknowlogy's Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
3
14 pages
teknowlogy's model for a business innovation architecture - InBrief Analysis - Worldwide
Jan 11, 2019 | InBrief Analysis
0
Jan 11, 2019
InBrief Analysis
0
Business Innovation Architecture (BIA) is referred to by teknowlogy Group as the architectural building blocks for digital business innovation, combining a business and IT technology perspective. BIA offers guidelines on what needs to be considered when defining an architecture that can support smart business, e.g. an agile and adaptive business tailored to fast-evolving and highly competitive digital contexts. This document describes only briefly what BIA is and what its benefits are. The...
Analyst : 
Frank Niemann, Olivier Rafal, Jason Stamper
Downloads : 
36
9 pages
IT Security by Segments - Market Figures - Western Europe Consolidation
Dec 19, 2018 | Market Figures & Forecast
0
Dec 19, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the Western European IT security market for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Ple...
Analyst : 
Downloads : 
3
IT Security by Segments - Market Figures - Rest of Western Europe including Portugal
Dec 19, 2018 | Market Figures & Forecast
0
Dec 19, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the Rest of Western European IT security market in for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. ...
Analyst : 
IT Security by Segments - Market Figures - Western Europe by Countries
Dec 19, 2018 | Market Figures & Forecast
0
Dec 19, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the Western European IT security market for the 2016-2022 period. It covers 14 countries (Austria, Belgium, Denmark, Finland, France, Germany, Italy, Netherlands, Norway, Portugal, Spain, Sweden, Switzerland, UK) and Rest of Western Europe (Greece, Iceland, Ireland, Liechtenstein, Luxembourg, Malta). The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity &...
Analyst : 
Downloads : 
8
IT Security by Segments - Market Figures - Denmark
Dec 17, 2018 | Market Figures & Forecast
0
Dec 17, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Denmark for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cl...
Analyst : 
IT Security by Segments - Market Figures - Sweden
Dec 17, 2018 | Market Figures & Forecast
0
Dec 17, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Sweden for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cli...
Analyst : 
Downloads : 
1
IT Security by Segments - Market Figures - Norway
Dec 17, 2018 | Market Figures & Forecast
0
Dec 17, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Norway for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cli...
Analyst : 
Downloads : 
1
IT Security by Segments - Market Figures - Spain
Dec 17, 2018 | Market Figures & Forecast
0
Dec 17, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Spain for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please clic...
Analyst : 
Downloads : 
3
IT Security by Segments - Market Figures - Italy
Dec 14, 2018 | Market Figures & Forecast
0
Dec 14, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Italy for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please clic...
Analyst : 
Cyber Security - IBM Security - Vendor Profile - Worldwide
Dec 14, 2018 | Vendor Profile - Cluster-specific
0
Dec 14, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
6
15 pages
Cyber Security - secunet - Vendor Profile - Worldwide
Dec 13, 2018 | Vendor Profile - Cluster-specific
0
Dec 13, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
4
12 pages
IT Security by Segments - Market Figures - Netherlands
Dec 12, 2018 | Market Figures & Forecast
0
Dec 12, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in the Netherlands for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. P...
Analyst : 
Downloads : 
7
IT Security by Segments - Market Figures - Finland
Dec 07, 2018 | Market Figures & Forecast
0
Dec 07, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Finland for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cl...
Analyst : 
Downloads : 
2
Cyber Security - Atos - Vendor Profile - Worldwide
Nov 29, 2018 | Vendor Profile - Cluster-specific
0
Nov 29, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
13
14 pages
Cyber Security - T-Systems - Telekom Security - Vendor Profile - Worldwide
Nov 28, 2018 | Vendor Profile - Cluster-specific
0
Nov 28, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
11
14 pages
Cyber Security - Orange Cyberdefense - Vendor Profile - Worldwide
Oct 30, 2018 | Vendor Profile - Cluster-specific
0
Oct 30, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Share of Segments in Cyber Security Revenue Key Offerings in Cyber Security Revenue – Software vs. IT Services Key Industries & Top Accounts ...
Analyst : 
Downloads : 
18
12 pages
Cyber Security - Tech Mahindra - Vendor Profile - Worldwide
Oct 26, 2018 | Vendor Profile - Cluster-specific
0
Oct 26, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
9
12 pages
Cyber Security - Thales Group - Vendor Profile - Worldwide
Oct 23, 2018 | Vendor Profile - Cluster-specific
0
Oct 23, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
7
12 pages
Expert View: Is artificial intelligence reliable and secure enough at this stage?
Oct 22, 2018 | Expert View
0
Oct 22, 2018
Expert View
0
Even though still a black box for the majority of people, artificial intelligence is considered a core component of digital transformation. It is the underlying technology of many digital trends, from smart buildings to cognitive IT. But despite being hyped as the new technological revolution, several recent incidents have cast doubt on AI’s security and liability. And they have caused fear over the risk of AI not being limited to the virtual world only.
Analyst : 
Mathieu Poujol, Elena Ndrepepa
Downloads : 
39
2 pages
Expert View: What are the most important cyber security hygiene rules?
Oct 11, 2018 | Expert View
0
Oct 11, 2018
Expert View
0
Cyber security is too often reduced to a technology-centric activity when it is actually about common sense and simple basic tasks to be done, which are also referred to as “cyber security hygiene rules”. Sticking to those rules will not protect you from the most sophisticated of attacks, but will greatly reduce your attack surface; besides, without cyber hygiene, many of the best cyber security technologies could be rendered useless. And the concept allows you to concentrate precisely on ...
Analyst : 
Mathieu Poujol, Wolfgang Schwab
Downloads : 
28
2 pages
IT Security - Vendor Rankings - Worldwide
Oct 09, 2018 | Vendor Rankings
0
Oct 09, 2018
Vendor Rankings
0
This Excel document provides rankings of the top 20 IT security software vendors and the top 20 IT security services providers Worldwide.
Analyst : 
Downloads : 
36
IT Security - Vendor Rankings - UK
Oct 09, 2018 | Vendor Rankings
0
Oct 09, 2018
Vendor Rankings
0
This Excel document provides rankings of the top 15 IT security software vendors and the top 20 IT security services providers in the UK.
Analyst : 
Downloads : 
17
IT Security - Vendor Rankings - Germany
Oct 09, 2018 | Vendor Rankings
0
Oct 09, 2018
Vendor Rankings
0
This Excel document provides rankings of the top 15 IT security software vendors and the top 14 IT security services providers in Germany.
Analyst : 
Downloads : 
29
IT Security - Vendor Rankings - EMEA
Oct 09, 2018 | Vendor Rankings
0
Oct 09, 2018
Vendor Rankings
0
This Excel document provides rankings of the top 20 IT security software vendors and the top 20 IT security services providers in EMEA region.
Analyst : 
Downloads : 
28
Cyber Security - CyberArk Software - Vendor Profile - Worldwide
Oct 08, 2018 | Vendor Profile - Cluster-specific
0
Oct 08, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Share of Segments in Cyber Security Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentat...
Analyst : 
Downloads : 
6
12 pages
Expert View: Anti-money laundering: what is the role of FinTech?
Oct 08, 2018 | Expert View
0
Oct 08, 2018
Expert View
0
Financial institutions now have to reconcile two opposing trends that are at the core of their activities: clients demand for more convenience with digitally enhanced systems whereas the financial institutions must comply with stringent anti-money laundering and cyber security regulations.
Analyst : 
Mathieu Poujol, Joachim Hackmann
Downloads : 
33
2 pages
IT Security - Vendor Rankings - France
Oct 08, 2018 | Vendor Rankings
0
Oct 08, 2018
Vendor Rankings
0
This Excel document provides rankings of the top 15 IT security software vendors and the top 15 IT security services providers in France.
Analyst : 
Downloads : 
43
Expert View: How can organizations protect their privileged accounts?
Sep 14, 2018 | Expert View
0
Sep 14, 2018
Expert View
0
Privileged accounts, credentials and secrets provide deep and powerful access to an organization’s high-value assets. The digital technologies have enlarged the attack surface and led to quite a few rather destructive cyber-attacks in the recent past, where privileged access was exploited.
Analyst : 
Downloads : 
14
2 pages
Key Cyber Security Issues in Healthcare - InBrief Analysis - Worldwide
Sep 10, 2018 | InBrief Analysis
0
Sep 10, 2018
InBrief Analysis
0
In the following InBrief report, PAC will provide an overview of the major cyber security risks and trends in the healthcare industry and will give some crucial recommendations for IT providers as well as IT buyers.   Contents: Management Summary The Context Digital transformation in the healthcare sector The Key Issues in Cyber Security for the Healthcare Sector Special characteristics of healthcare data Major reasons for incr...
Analyst : 
Downloads : 
19
11 pages
IT Security by Segments - Market Figures - Austria
Sep 05, 2018 | Market Figures & Forecast
0
Sep 05, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Austria for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cl...
Analyst : 
Downloads : 
9
IT Security by Segments - Market Figures - Switzerland
Sep 03, 2018 | Market Figures & Forecast
0
Sep 03, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Switzerland for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Pleas...
Analyst : 
Downloads : 
7
IT Security by Segments - Market Figures - UK
Aug 30, 2018 | Market Figures & Forecast
0
Aug 30, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in UK for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please click h...
Analyst : 
Downloads : 
9
Key Issues in Cyber Security for the Aerospace & Defense Industry - InBrief Analysis - Worldwide
Aug 30, 2018 | InBrief Analysis
0
Aug 30, 2018
InBrief Analysis
0
The aerospace & defense industry increasingly has to deal with the common cyber security issues, due to its growing exposure to non-A&D, OT-based technologies; however, the impacts remain limited. The enterprises of the A&D segment have long been closely protected due to their specific systems development processes and the regulations they have been subject to. However, they now have many new digital technologies and processes at the core of their operating models.  ...
Analyst : 
Downloads : 
21
9 pages
Key Issues in Cyber Security for Digital Finance - InBrief Analysis - Worldwide
Aug 30, 2018 | InBrief Analysis
0
Aug 30, 2018
InBrief Analysis
0
The two key issues in cyber security in the area of digital finance are: The common cyber security issues, such as denial of service, data theft, IAM and cloud- & DevOps-related cyber security. Finance-specific cyber security issues have a lot to do with the particularities of financial institutions, such as their complexity or the critical nature of client interaction systems and financial processes, e.g. anti-money laundering. Contents: Management Summar...
Analyst : 
Downloads : 
32
10 pages
IT Security by Segments - Market Figures - Germany
Aug 28, 2018 | Market Figures & Forecast
0
Aug 28, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Germany for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cl...
Analyst : 
Downloads : 
23
IT Security by Segments - Market Figures - US
Aug 28, 2018 | Market Figures & Forecast
0
Aug 28, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in US for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please click h...
Analyst : 
Downloads : 
10
IT Security by Segments - Market Figures - France
Aug 28, 2018 | Market Figures & Forecast
0
Aug 28, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in France for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cli...
Analyst : 
Downloads : 
32
IT Security by Segments - Market Figures - Belgium
Aug 28, 2018 | Market Figures & Forecast
0
Aug 28, 2018
Market Figures & Forecast
0
This document provides market volumes, growth rates and forecasts for the IT security market in Belgium for the 2016-2022 period. The figures are broken down by the following segments: Software (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); IT Services (broken down by Infrastructure, Identity & Access Management, Data & Application, Governance); Project Services; Outsourcing. Please cl...
Analyst : 
Downloads : 
15
From SOC to Integrated Security Environments - InBrief Analysis - Worldwide
Jul 27, 2018 | InBrief Analysis
0
Jul 27, 2018
InBrief Analysis
0
One defining characteristic of security services players is whether they can boast either their own security operations center (SOC) or access to one. At the same time, some organizations are willing to set up an in-house SOC with the help of outside experts to monitor traffic in and out of the organization. This report looks at the current state of the SOC market and how it is changing to adapt to the evolving and fast-paced security demands of the increasingly digital business envi...
Analyst : 
Downloads : 
23
14 pages
Expert View: Is OpenStack focusing enough on cyber security?
Jul 16, 2018 | Expert View
0
Jul 16, 2018
Expert View
0
OpenStack is the de facto standard for private cloud infrastructures, and as such, one of the biggest open source communities. Due to its importance in the digital value chain of many companies, it is very important to assess and analyze its cyber security level and initiatives.
Analyst : 
Downloads : 
24
2 pages
Cloud Access Security Brokers - InBrief Analysis - Worldwide
Jun 27, 2018 | InBrief Analysis
0
Jun 27, 2018
InBrief Analysis
0
This report has two main objectives: (1) to make end users aware that cloud computing needs a new approach to cyber security and (2) that Cloud Access Security Brokers (CASB) can be a suitable response, but that it will not solve all the issues. We will analyze today’s needs in cloud security, the different types of CASB, their main functionalities, uses cases and limitations.   Contents: PAC’s analysis Management summary PAC’s opinion PAC’s rec...
Analyst : 
Downloads : 
28
14 pages
Cyber Security - Deloitte - Vendor Profile - Worldwide
Jun 08, 2018 | Vendor Profile - Cluster-specific
0
Jun 08, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
17
12 pages
CxO Survey - Investment Priorities - Cyber Security - InSight Analysis - Worldwide
Jun 05, 2018 | CxO Survey - Investment Priorities
0
Jun 05, 2018
CxO Survey - Investment Priorities
0
PAC conducted the 2017 edition of its annual 'SITSI® CxO Investment Survey,' interviewing IT decision-makers in user companies all over the world to get their views on current IT trends, key requirements, and investment plans. This report presents and discusses the key results of the study for the topic of cyber & information security. The potential of new technologies is a mixed blessing for cyber security as some like mobility and the IoT are huge vulnerability generators, whil...
Analyst : 
Downloads : 
45
31 pages
Cyber Security - Symantec - Vendor Profile - Worldwide
May 28, 2018 | Vendor Profile - Cluster-specific
0
May 28, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
6
12 pages
Cyber Security - BAE Systems - Vendor Profile - Worldwide
May 28, 2018 | Vendor Profile - Cluster-specific
0
May 28, 2018
Vendor Profile - Cluster-specific
0
The Cyber Security vendor profiles portray leading cyber security providers, analyzing their strategies and portfolios.   Contents: General Information Key Offerings in Cyber Security Background Information PAC’s Opinion Key Figures Share of Cyber Security in Total Revenue Key Industries & Top Accounts in Cyber Security Strategy Review in Cyber Security Segmentation
Analyst : 
Downloads : 
10
12 pages
Cyber Security – Trend and Vendor Analysis - InBrief Analysis - UK
May 18, 2018 | InBrief Analysis
0
May 18, 2018
InBrief Analysis
0
This report gives an overview of the latest trends and relevant vendors on the UK market for cyber security software and services.   Contents: Trends in Security Software The shift to advanced firewalls Application Security Testing & Secure DevOps Identity & Access Management (IAM) Privileged Account Management Security Incident and Event Management (SIEM) Trends in Security Services Threat intelligence and ...
Analyst : 
Downloads : 
39
16 pages
The Cyber Insurance Market - InBrief Analysis - Worldwide
May 03, 2018 | InBrief Analysis
0
May 03, 2018
InBrief Analysis
0
The "WannaCry” ransomware outbreaks across Europe had IT security chiefs scrambling to deal with the threat, but it also focused minds in other departments too. Previously only a peripheral consideration for many companies and institutions, cyber insurance and risk management are now being considered in a new serious light by organizations across the world. This report looks at the options available to these organizations, and the state of the cyber insurance and risk market in Europ...
Analyst : 
Downloads : 
34
8 pages
Presenting the GDPR Toolbox - InBrief Analysis - Worldwide
Apr 20, 2018 | InBrief Analysis
0
Apr 20, 2018
InBrief Analysis
0
The GDPR is just around the corner. By May 25, 2018, every organization will need to have put in place adequate mechanisms to ensure the proper protection of personally identifiable information within IT systems and processes. During the last 12 months, members of the IT industry have gathered to put together a useful set of tools for implementing a new system of records for organizations. This paper provides a first glimpse at what should go into the GDPR Toolbox, and the type of ...
Analyst : 
Downloads : 
30
9 pages
Expert View: Welche Technologien können Unternehmen bei der Umsetzung der EU-DSGVO/GDPR-Anforderungen unterstützen?
Apr 20, 2018 | Expert View
0
Apr 20, 2018
Expert View
0
Die Datenschutz-Grundverordnung (DSGVO/General Data Protection Regulation, GDPR) ist eine Verordnung der EU, durch die die Regeln für die Verarbeitung personenbezogener Daten durch private Unternehmen und öffentliche Stellen EU-weit vereinheitlicht werden. Dadurch soll u.a. der Schutz von personenbezogenen Daten innerhalb der EU sichergestellt werden. Bei fehlender Compliance oder Missachtung der Verordnung drohen Unternehmen Strafen von bis zu 4% ihres Gesamtumsatzes. Diese Expert View b...
Analyst : 
Downloads : 
17
2 pages

Pages