Executive Update

Data-Centric Security and Protection, Part I: Status in the Enterprise

Posted December 13, 2016 | Technology |

Data-centric security has been around for a while; however, it is receiving renewed attention as a way to extend data protection and security to end-point and edge devices as well as computing associated with cloud, mobile, and IoT technologies. Such applications can be complicated to protect because they tend to stretch the bounds of what we’ve come to consider as quite a well-defined computer network. To gain insight into the various trends and issues impacting enterprise data security and protection practices, and the extent to which organizations employ data-centric security practices and tech­nologies, Cutter Consortium surveyed 50 organizations worldwide. 

About The Author
Curt Hall
Curt Hall is a Cutter Expert and a member of Arthur D. Little’s AMP open consulting network. He has extensive experience as an IT analyst covering technology and application development trends, markets, software, and services. Mr. Hall's expertise includes artificial intelligence (AI), machine learning (ML), intelligent process automation (IPA), natural language processing (NLP) and conversational computing, blockchain for business, and customer… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.