Remove Big data Remove Marketing Remove Technology
article thumbnail

2021 KuppingerCole Leadership Compass names Imperva an overall leader for Database and Big Data Security

Security Boulevard

It is my pleasure to report that in their 2021 overview of the market for Database and Big Data Security solutions, leading technology analyst KuppingerCole has identified Imperva as an Overall Leader for the first time.

article thumbnail

SHARED INTEL Q&A: Everything the Cisco-Splunk merger tells us about the rise of SIEMs

The Last Watchdog

Nayyar: Many security vendors want a piece of the SIEM market, even if their technology isn’t necessarily purpose-built. Gurucul pioneered UEBA technology a decade ago – in fact our company was built around this capability. LW: How should a company leader at a mid-market enterprise think about all this?

Marketing 306
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: The Top 5 myths about SIEM –‘security information and event management’

The Last Watchdog

With all that said, there are some aspects of the SIEM that have improved significantly over the past 20 years, despite a barrage of security marketing suggesting otherwise. Further, there are innovations happening in the market today to bring forth a new era for the SIEM. SIEMs don’t scale. SIEMs don’t scale. SIEM is dead.

Marketing 230
article thumbnail

GUEST ESSAY: Here’s why managed security services — MSS and MSSP — are catching on

The Last Watchdog

Managed security services (MSS) refer to a service model that enable the monitoring and managing of security technologies, systems, or even software-as-a-service (SaaS) products. Here’s more on the various types and benefits of MSS, as well as the state of the MSS(P) market in 2022! What happens on the market? MSSPs in 2022.

Marketing 247
article thumbnail

Emerging security challenges for Europe’s emerging technologies

Thales Cloud Protection & Licensing

With many of these transformations, it is not just the premise of keeping up that drives the huge levels of investment we see organisations making – but also the promise of what’s possible, if the right technologies and approaches can be harnessed to disrupt or differentiate in the face of fierce competition. Blockchain. Containers.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. Public-interest technology isn't new. We need public-interest technologists.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. Public-interest technology isn't new. We need public-interest technologists.