Analyst Reports

Nucleus Research
PKWARE Delivers Secure Enterprise Encryption

The business value of persistent data security can be measured with increased efficiencies, reduction of errors from manual migration of data, and secure risk management.
Read Report

Aberdeen Group
Encryption Alone Is Not Enough: What Makes Your Data Protection Initiative Successful?

Organizations who are thinking about data protection initiatives are overwhelmingly focused on technical controls, while paying much less attention to business context and risk. Successful enterprise data protection initiatives incorporate technology thoughtfully into the data's lifecycle and workflows.
Read Report

IDC
IDC Market Glance: Data Privacy Tools and Management

This IDC Market Glance provides an overview of the landscape of data privacy tools and management solutions. These tools and segments assist with compliance with various data privacy regulations around the globe.
Purchase Report

Gartner Research
Market Guide for Information-Centric Endpoint and Mobile Protection

Security and risk management leaders must develop a security portfolio to address different aspects of protecting information. It must span multiple locations and contexts in a world that emphasizes connectivity, mobility, sharing and cloud, and where business information flows continuously.
Purchase Report

Gartner Research
Hype Cycle for Threat-Facing Technologies

Threat-facing technologies aim to prevent and protect IT systems and applications from attack, enabling fast and effective response.
Purchase Report

IDC
Worldwide Corporate Endpoint Security Forecast

This IDC study presents a five-year forecast for the worldwide endpoint security market as of June 2018, using estimates of market actuals from calendar year 2017.
Purchase Report

IDC
Worldwide Endpoint Encryption Forecast

This IDC study provides a forecast by revenue for the worldwide endpoint encryption market. The forecast data addresses the file and folder encryption and the full disk encryption markets.
Purchase Report

451 Research
Finders, keepers: PKWARE updates Smartcrypt with sensitive-data discovery

PKWARE has updated the transparent encryption capabilities of Smartcrypt with sensitive-data discovery in an effort to help companies be more discriminate about how and where they use encryption; in other words, making Smartcrypt smarter.
Purchase Report

Gartner Research
Prioritize Enterprisewide Encryption for Critical Datasets

Security and risk management leaders face a rapidly increasing volume and variety of complex data security challenges, both on-premises and in the cloud. Datasets must be prioritized for enterprisewide encryption to mitigate certain security threats and compliance requirements.
Purchase Report

451 Research
PKWARE Looks to Ease the Pain of Application Encryption with Smartcrypt

The company’s new Smartcrypt attempts to provide the best of both worlds, with application-level encryption that eliminates the usual complexity of doing encryption and key management higher up the stack – or ‘PKI minus the headache.’
Purchase Report

Gartner Research
Hype Cycle for Infrastructure Protection, 2016

Infrastructure protection is the family of threat-facing technologies that help defend IT. Driven by persistent threat and technology changes, most of the evolution of the technologies on this Hype Cycle are concerned with virtualized environments and advanced threats.
Purchase Report

Gartner Research
Hype Cycle for Application Security

Applications, not the infrastructure, represent the main attack vector for data exfiltration. As organizations lose more control over their infrastructure with trends like mobility and cloud, applications become one of the last control points for imposing the organization’s security policy.
Purchase Report

Gartner Research
Hype Cycle for Data Security

Data security must evolve to treat data as a pervasive asset that crosses traditional data silo boundaries on-premises and in big data platforms and public clouds. Hacking, fraud, data residency and changing compliance landscapes are challenging the implementation of data-centric security policies.
Purchase Report

Gartner Research
Simplify Operations & Compliance in the Cloud by Protecting Sensitive Data.

Public clouds offer attractive, fast implementation and lower operational costs, but some security best practices must be employed when processing sensitive data.
Purchase Report

Gartner Research
Develop Encryption Strategies for the Server, Data Center and Cloud

Enterprises are faced with a growing complexity and array of data storage environments and encryption solutions. From the server to the cloud, CISOs should plot a course through the encryption options, evaluate their limitations and understand when to use encryption.
Purchase Report

Gartner Research
Unprotected Cloud File Shares and Shadow IT Threaten Data Security

Chief information security officers must develop data security policies to protect sensitive data within cloud file-sharing services and tackle the shadow IT problem.
Purchase Report

Gartner Research
Case Study: CMS Data-Sharing Project Highlights the Benefits of a Multiplatform Approach

The U.S. government agency responsible for healthcare payments needed a secure way to share sensitive data, most of it subject to regulatory requirements, with a disparate set of external partners. The success of its implementation offers valuable lessons for many other types of enterprises.
Purchase Report

Gartner Research
How to Share Data Security with Other Organizations

Individuals and work groups often need to share sensitive information with people outside their enterprises. A risk-based decision must be made about the degree and form of control that will be implemented, including controls that function on non-corporate desktops.
Purchase Report