loadRenderer('message')->render('system-messages'); ?>

The Identities of Data

The ‘Identities of Data’ concept that we introduce in this report is intended to provide a framework to respond to the current requirements for greater integration between identity management, data classification and encryption.

Steve Coplan

Research Manager, Enterprise Security Practice

Accellion Adobe AlephCloud Systems Amazon Apple AppSense HP Autonomy Aveksa Axiomatics BeyondCore BitArmor Box Brocade CA Technologies CertiVox Check Point ChosenSecurity CipherCloud Cisco Citrix Clearwell Systems Cloud Data Comodo Group Content Raven Core Security Technologies Covertix Credant Technologies Cryptosoft Data Intelligence DataCenter Technologies Dropbox eBay EMC Endeca Technologies enstratius Entrust Datacard Environmental Software Providers FalconStor Software Fidelis Cybersecurity Gazzang Google Greenplum Guardtime HP Inc HyTrust IBM Instituto Costarricense de Electricidad Identum Imperva Incipient Inc InDorse Technologies Intel IT Innovation Joyent Key Management Systems Layer 7 Liquid Machines LiveOffice Magento McAfee Microsoft Mycroft Navajo Systems NetIQ NextPage Technology Nexus Novell nuBridges Okta OneLogin Oracle Orchestria Path Perspecsys PGP Ping Identity Corp PKWARE Pointsec Mobile Technologies Proofpoint Protegrity Relevance RSA Security SafeNet SailPoint Technologies Salesforce Schema Seagate Secure Islands SecureAuth US Securities and Exchange Commission SkyDox Sophos No company mentioned Symantec Symplified Tandem Computers Teradata Thales e-Security TiE TheInfoPro TITUS Touchstone Software Trend Micro Trustwave Twitter UnboundID Upstream Varonis Systems Vaultive Venafi Vericept VeriSign Veritas VMware Voltage Security Vontu Vordel Vormetric WatchDox Whisper Systems WinMagic YORK Zafesoft Zix

Information Security Workforce Productivity & Compliance

All / Security / Identity & access management