Global-scale scandals around sensitive data losses have highlighted the need for effective data protection, especially from insider attacks. Data masking, which is focused on protecting data from insiders and outsiders, is a must-have technology in enterprises’ and governments’ security portfolios.
Data masking (DM) is a technology aimed at preventing the abuse of sensitive data by giving users fictitious (yet realistic) data instead of real sensitive data. It aims to deter the misuse of data at rest, typically in nonproduction databases (static data masking [SDM]), and data in transit, typically in production databases (dynamic data masking [DDM]).
SDM for relational databases remains the most demanded technology, and, in this research, we highly value vendors’ ability to execute in the SDM space (that is, to demonstrate maturity, quality and scalability of SDM technology, as well as the high revenue from and broad adoption of it). From a visionary’s viewpoint, we highly value vendors’ ability to offer DDM, the masking of the big data platform and suites with multiple data security technologies.
Read more at: Magic Quadrant for Data Masking Technology
The endpoint protection platform provides a collection of security capabilities to protect PCs, smartphones and tablets. Buyers of endpoint protection should investigate the quality of protection capabilities, the depth and breadth of features, and the ease of administration.
The enterprise endpoint protection platform (EPP) is an integrated solution that emerged in the 2006 time frame composed of previously separate capabilities. These include:
- Personal firewalls
- Host-based intrusion prevention
- Port and device control
EPP solutions also will often include:
- Vulnerability assessment
- Application control (see Note 1) and application sandboxing
- Mobile device management (MDM)
- Memory protection
- Behavioral monitoring
- Endpoint detection and remediation technology (see “Market Guide for Endpoint Detection and Response Solutions”)
- Full-disk and file encryption, also known as mobile data protection
- Endpoint data loss prevention (DLP)
Read the Report at: Gartner- Magic Quadrant for Endpoint Protection Platforms
Enterprise content management offerings address a range of user constituencies and business requirements, an increasingly common one being for delivery of personalized content in context. In light of this and other demands, we assess 22 vendors to help you identify the right one for your needs.
The term “enterprise content management” (ECM) describes both a strategic framework and a technical architecture that supports all types of content (and format) throughout the content life cycle.
As a strategic framework, ECM can help enterprises take control of their content, and thereby boost productivity, encourage collaboration, help meet compliance initiatives, enable better content-centric processes and make information easier to share.
As a technical architecture, ECM consists of a platform or a set of applications that interoperate but that can be sold and used separately.
An ECM platform’s core components, and their associated functional weightings for the purpose of scoring in this Magic Quadrant, are as follows:
- Document management (20%),
- Web content management (WCM, 5%),
- Records management (10%),
- Image-processing applications (15%),
- Social content (15%),
- Content workflow (20%),
- Extended components (15%),.
Read the report at: Gartner Magic Quadrant for Enterprise Content Management