IN COLLABORATION WITH
WEBINAR
Navigating the Data Security
Landscape
Alexei Balaganski Ganesh Kirti
Lead Analyst | KuppingerCole Analysts CEO | TrustLogix
Audio Control
You are muted centrally. We are controlling these
features. No need to mute or unmute yourself.
Polls
We will run polls during the webinar and discuss
the results during Q&A.
There will be a Q&A session at the end of the
Questions webinar. You can enter questions at any time using
the Livestorm control panel.
We are recording the webinar.
Recording and The recording and the presentation
Slides slide decks will be made available for
download in the coming days.
Agenda
01
Leadership
Compass Findings
Alexei Balaganski
02
Best Practices
and Use Cases
Ganesh Kirti
03 Q&A
POLL #1
How familiar are you with Data Security Platforms?
1) Never heard of them before
2) Looking into their principles and capabilities right now
3) Planning to implement (or upgrade to) one in my company
4) Already have a working implementation
5) Already looking for a better working implementation
What a time to be alive!
…in a profoundly insecure world
Multi-cloud
Practically every organization is moving towards a platform strategy that is hybrid
and multi-cloud.
Mobile workforce
With a disappearing perimeter and a changed working environment, employees are
inevitably becoming increasingly mobile.
SaaS and collaboration
Data management and transformation, business collaboration, and entire business
processes are now happening in the cloud.
Generative AI
AI can both expose sensitive data through model leaks and generate convincing
attacks that bypass traditional defenses.
Privacy and compliance
Even if nothing else is relevant for you, there is always regulatory compliance!
Biggest business concerns
That must be managed
Compliance Failures
1
Didi Global fined $1.2 billion for data
violations
Data Breaches
2
More than 3.8 billion records exposed in
DarkBeam data leak
Business Continuity
3
MGM Resorts reported a 36-hour
outage due to the ransomware attack
Source: KuppingerCole Research
The hybrid multi-cloud amplifier
Issues directly caused by complexity
→ Wasted costs and time
Too many silos
Managing multiple technology
Not just data, but apps and services
stacks and infrastructures
Privacy-enabled data security → Human error inevitable
Secure and private data sharing Due to lack of visibility and
automation
Inconsistent, disjointed tools → Resource shortage
Complexity is the enemy of security That includes humans, too!
No cross-team collaboration
→ Cloud Tower of Babel
Different goals, problems, processes
Who is responsible for what?
How to align with everyone?
Data challenges
Confidentiality
Data to Value Gap
How to protect valuable IP
How to derive business value
from hackers, spies,
from the heaps of data?
competitors?
Data Sprawl
Availability
How to deal with disparate
silos of structured and Data How to ensure that business
never loses access to data?
unstructured data?
Data Friction Compliance
How to make data easily How to keep the auditors
available to all stakeholders? away and avoid fines?
The “crown jewels” myth
You cannot just put your precious
→ data into a safe
Most data has no intrinsic value and
→ only becomes useful when transformed
Data can be very toxic and cause
→ problems if not handled properly
Data is the new AIR
Data friction: the operational equivalent of gasping for air
Data does not exist in vacuum
Constant movement and transformation in a complex environment
Data Data storage Batch processing Analytics
sources and
Analytical reporting
data lake
AI / ML
Real-time message Stream processing
ingestion
Database Security User Behavior Analytics Identity Governance Data Discovery & Classification
Data Masking & Tokenization Privileged Access Management Database & Data Encryption Data Virtualization
Dynamic Access Control Data Leakage Prevention API Security
The Information Protection Lifecycle
A comprehensive approach from acquisition to disposition for protecting data
Acquire & Control access
Authenticate, authorize, govern.
assess
Create or discover.
Assess semantics, Secure
criticality & intended Encrypt, tokenize, mask, redact &
users. Apply pseudonymize.
classification. In transit, in use & at rest.
ACQUISITION
ACTIVE
USE LIFE
Monitor & detect
Identify nefarious activities at all levels: device
- network - systems - applications - data.
DISPOSITION
Contain & recover
Analyze and limit imminent effects, maintain
Dispose operation.
Archive or delete.
Friction among stakeholders
Conflict of interests, different
→ “languages” in use
Disjointed ecosystem, blind
→ spots, security gaps
Lack of orchestration,
→ automation, workflows
→ Data isn’t generating value
CISO-CDO Collaboration
Frictionless or secure? Why not both?
Artificial Intelligence
The rapid evolution and the future of AI
AI security is all about data
Stop trying to reinvent the wheel
Trying to secure AI with more AI is
→ clearly not a sustainable approach
AI systems utilize the same
→ infrastructure, protocols, and data
formats as the rest of IT
The most valuable and sensitive part
→ of an AI system is still your data!
Key findings
• Data security is a key discipline that is critical for safeguarding the business continuity and the very
livelihood of modern businesses by protecting their valuable and sensitive data from cyber threats,
accidental loss, and malicious attacks.
• Key aspects of data security are maintaining confidentiality, integrity, and availability of digital
information; ensuring regulatory compliance with multiple international, industry-wide, and local laws
and regulations; as well as building and maintaining trust with customers and stakeholders.
• The emergence of new trends like Generative AI and multi-cloud architectures has even further
increased the complexity of modern data processing and consequently made the scope of data
security even broader and more complex.
• Data Security Platform is a recently emerged term that represents the customer demands for a
universal data protection solution that provides comprehensive security and compliance capabilities,
regardless of the data format, platform, or location.
• However, alternative approaches like Data Security Posture Management (DSPM) solutions are also
rapidly gaining popularity due to their relative simplicity and fast deployment possibilities.
• The rapid transformation of the market continues. Some vendors covered in our previous Leadership
Compass have been acquired, transitioned to private ownership, or rebranded and completely
reinvented their entire portfolios. Even the large veteran vendors feel the pressure to evolve to meet
the changing customer needs.
Required capabilities
Attack Prevention
Vulnerability Assessment
1 visibility into database infrastructures and their risks
5 Protection against attacks, infrastructure security,
patching
Discovery and Classification Access Management
2 identifying sensitivity of data, defining security policies
6 dynamic fine-grained access, privilege management,
user activity monitoring
Data Protection
3 Audit and Compliance
Data encryption, masking, tokenization and other
7 Centralized audit, segregation of duties, forensics
technologies for protecting integrity and confidentiality
Monitoring and Analytics Deployment and Scalability
4 Visibility into database activities, detection of threats
8 Handling high load, providing high availability,
and anomalies
minimizing performance overhead
DSP, DSPM, DLP…
Understanding the alphabet soup
→ Data Security Posture Management
→ Data Loss/Leak Prevention
→ Data Security Platform 1 Vulnerability Assessment 5 Attack Prevention
2 Discovery and Classification 6 Access Management
3 Data Protection 7 Audit and Compliance
4 Monitoring and Analytics 8 Deployment and Scalability
Vendors covered
page 20
Overall Leaders
page 21
Product Leaders
page 22
Innovation Leaders
page 23
Market Leaders
page 24
Sample vendor details
▪ A unique universal security governance framework
with a reference implementation in the company’s
platform.
▪ Cloud-native containerized architecture that
seamlessly supports multi-cloud deployments and
unlimited scalability along with centralized
management.
▪ Out-of-band transparent operations – no need to
change applications, no performance overhead.
▪ Partnerships with numerous leading cloud data
platform vendors.
▪ Ease of deployment directly from the target platforms’
respective marketplaces.
▪ By design, only manages target platforms’ native
capabilities; does not provide its own controls
▪ Full support for unstructured data sources is still
being developed
▪ Limited language support beyond English
page 25
Use Cases
Choosing the right solution for your organization
Data Sovereignty / Localization
Supply Chain Risk Management
Privacy and Regulatory Compliance
Zero Trust Policy Enforcement
Ransomware and Breach Prevention
Secure Sharing and Collaboration
Securing Data for ML and GenAI
Agenda
01
Leadership
Compass Findings
Alexei Balaganski
02
Best Practices
and Use Cases
Ganesh Kirti
03 Q&A
POLL #2
How did this webinar change your view on Data Security Platforms?
1) I still don’t believe this is something I really need
2) I’m wary of the effort and costs of implementing it
3) I appreciate the concept but I’m looking for different capabilities
4) Shut up and take my money!
Submit Your
Questions
Related research
Research papers provided by KuppingerCole
Data Security Platforms
Leadership Compass | Read here
Data Governance
Leadership Compass | Read here
Navigating Data Challenges
Webinar Recording | Watch here
September 18, 2025 | Munich, Germany
Identity Fabrics as the Enabler of Modern Digital Enterprises
Key topics
• Modern Identity Fabric Architectures & Concepts
• Proven Implementation & Scaling Strategies
• Enterprise Best Practices & Success Stories
• Managing Non-Human Identities
KuppingerCole Services
We Analyze Trends, Markets, and Software Solutions
Research
• Assessing current topics (hacks, data breaches, digital
transformation, AI, GDPR)
• Comparison of software solutions, product ratings
• Research papers, blogs, videos, podcasts, masterclasses
Events and Webinars
• Conferences (online & on-site) with expert talks, panels, and
technical exhibitions
• Topical webinars
• Networking events with industry experts
Advisory
• Support of IT professionals in decision-making processes
• Evaluation and maturity measurement of IT infrastructure
THANKS!
Any questions?
Please reach out to ab@kuppingercole.com
KuppingerCole Analysts AG
Wilhelmstr. 20 - 22
65185 Wiesbaden | GERMANY
P: +49 | 211 - 23 70 770
E: info@kuppingercole.com
www.kuppingercole.com