The Identities of Data

The ‘Identities of Data’ concept that we introduce in this report is intended to provide a framework to respond to the current requirements for greater integration between identity management, data classification and encryption.


Steve Coplan

Research Manager, Enterprise Security Practice

Accellion Adobe AlephCloud Systems Amazon Apple AppSense HP Autonomy Aveksa Axiomatics BeyondCore BitArmor Box.net Brocade CA Technologies CertiVox Check Point ChosenSecurity CipherCloud Cisco Citrix Clearwell Systems Cloud Data Comodo Group Content Raven Courion Covertix Credant Technologies Cryptosoft Data Intelligence DataCenter Technologies Dropbox eBay EMC Endeca Technologies enstratius Entrust Datacard Environmental Software Providers FalconStor Software Fidelis Security Systems Gazzang Google Greenplum GuardTime HP HyTrust IBM Instituto Costarricense de Electricidad Identum Imperva Incipient Inc InDorse Technologies Intel IT Innovation Joyent Key Management Systems Layer 7 Liquid Machines LiveOffice Magento Intel Security Microsoft Mycroft Navajo Systems NetIQ NextPage Technology Nexus Novell nuBridges Okta OneLogin Oracle Orchestria Path Perspecsys PGP Ping Identity Corp PKWARE Pointsec Mobile Technologies Proofpoint Protegrity Relevance RSA Security S3 SafeNet SailPoint Technologies Salesforce Schema Seagate Secure Islands SecureAuth US Securities and Exchange Commission SkyDox Sophos No company mentioned Symantec Symplified Tandem Computers Teradata Thales e-Security TiE TheInfoPro TITUS Touchstone Software Trend Micro Trustwave Twitter UnboundID Upstream Varonis Systems Vaultive Venafi Vericept VeriSign Veritas Software VMware Voltage Security Vontu Vordel Vormetric WatchDox Whisper Systems WinMagic YORK Zafesoft Zix

Enterprise Mobility Information Security

All / Security / Identity & access management