array(3) {
["company_details"]=>
array(13) {
["name"]=>
string(13) "Gartner, Inc."
["slug"]=>
string(20) "694c2-us-gartner-inc"
["logo"]=>
string(84) "https://images.businessradar.com/linkedin_logos/830960d8-449e-497f-8e05-f9364ea4b886"
["description"]=>
string(728) "Gartner is a company that delivers actionable, objective insight to executives and their teams. They provide expert guidance and tools to enable faster, smarter decisions and stronger performance on an organization's mission-critical priorities. Gartner has been providing insights and expert guidance to clients' enterprises worldwide for over 40 years. They work with businesses in nearly 90 countries and have over 19,500 associates in approximately 85 offices globally. Gartner offers research and advisory services, conferences, consulting, and more. They also have a commitment to diversity, equity, and inclusion. Gartner's website provides more information about their services, leadership, and corporate responsibility."
["address_street"]=>
string(17) "56 Top Gallant Rd"
["address_place"]=>
string(8) "Stamford"
["address_region"]=>
string(11) "Connecticut"
["founding_date"]=>
string(10) "1979-02-28"
["website_domain"]=>
string(11) "gartner.com"
["website_url"]=>
string(23) "https://www.gartner.com"
["industry_codes"]=>
array(3) {
[0]=>
string(59) "Commercial Economic, Sociological, and Educational Research"
[1]=>
string(19) "Management Services"
[2]=>
string(30) "Management Consulting Services"
}
["employee_count"]=>
int(1314)
["article_count"]=>
int(3445)
}
["articles"]=>
array(9) {
[0]=>
array(7) {
["title_en"]=>
string(50) "13 best data protection software platforms of 2024"
["snippet_en"]=>
string(149) "To keep up with data privacy laws, sophisticated cyberattacks and generative AI's infiltration, learn about this year's top data protection software."
["url"]=>
string(91) "https://www.techtarget.com/searchdatabackup/feature/Best-data-protection-software-platforms"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/4a30197c-5e99-4ccc-a605-5db65d8de4d6"
["source"]=>
string(14) "techtarget.com"
["publication_date"]=>
string(10) "2024-04-15"
["categories"]=>
array(3) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(16) "Customer Privacy"
[2]=>
string(13) "Data Security"
}
}
[1]=>
array(7) {
["title_en"]=>
string(74) "Leveraging Defensive AI to Safeguard Organizations against Data Corruption"
["snippet_en"]=>
string(158) "By Vaibhav Tare Dependency on data has vastly increased in recent years, amidst accelerated digital transformation across sectors. From finance to healthcare"
["url"]=>
string(105) "https://cxotoday.com/specials/leveraging-defensive-ai-to-safeguard-organizations-against-data-corruption/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/54a0235a-a224-427f-a90c-4c847edb06f7"
["source"]=>
string(12) "cxotoday.com"
["publication_date"]=>
string(10) "2024-04-08"
["categories"]=>
array(4) {
[0]=>
string(10) "Misconduct"
[1]=>
string(5) "Fraud"
[2]=>
string(16) "Customer Privacy"
[3]=>
string(13) "Data Security"
}
}
[2]=>
array(7) {
["title_en"]=>
string(131) "Elon Musk's AI chatbot Grok has the weakest security, while Meta's Llama is strong: researchers - Decrypt - Plato Data Intelligence"
["snippet_en"]=>
string(146) "Security researchers placed much-hyped guardrails around the most popular AI models to see how resistant they were to jailbreaking, and tested how"
["url"]=>
string(145) "https://zephyrnet.com/it/elon-musks-grok-ai-chatbot-ha-la-sicurezza-pi%C3%B9-debole-mentre-metas-llama-%C3%A8-forte-e-i-ricercatori-lo-decifrano/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/328fff85-4877-41c2-9a80-315db8912646"
["source"]=>
string(13) "zephyrnet.com"
["publication_date"]=>
string(10) "2024-04-07"
["categories"]=>
array(3) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(16) "Customer Privacy"
[2]=>
string(13) "Data Security"
}
}
[3]=>
array(7) {
["title_en"]=>
string(39) "Data Quality Getting Worse, Report Says"
["snippet_en"]=>
string(154) "For as long as “big data” has been a thing, data quality has been a big question mark. Working with data to make it suitable for analysis was the task"
["url"]=>
string(75) "https://www.datanami.com/2024/04/05/data-quality-getting-worse-report-says/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/98c9aa76-4ea1-4bde-ba3e-8b920dd88f53"
["source"]=>
string(12) "datanami.com"
["publication_date"]=>
string(10) "2024-04-05"
["categories"]=>
array(3) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(16) "Customer Privacy"
[2]=>
string(13) "Data Security"
}
}
[4]=>
array(7) {
["title_en"]=>
string(57) "The 18 most important data catalog tools and technologies"
["snippet_en"]=>
string(139) "There are numerous tools for creating and managing data catalogs. In this article you will find the 18 most popular data catalog platforms."
["url"]=>
string(93) "https://www.computerweekly.com/de/tipp/Die-18-wichtigsten-Datenkatalog-Tools-und-Technologien"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/d6312afd-facc-433e-a6c2-33316b321b57"
["source"]=>
string(18) "computerweekly.com"
["publication_date"]=>
string(10) "2024-03-22"
["categories"]=>
array(3) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(16) "Customer Privacy"
[2]=>
string(13) "Data Security"
}
}
[5]=>
array(7) {
["title_en"]=>
string(51) "DSPM suite of products for zero trust data security"
["snippet_en"]=>
string(161) "Data Security Posture Management – DSPM for short – is critical for businesses to ensure cyber resilience in the face of ever-evolving cyber resilience"
["url"]=>
string(93) "https://b2b-cyber-security.de/it/Suite-di-prodotti-dspm-per-la-sicurezza-dei-dati-Zero-Trust/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/1084a45c-0b61-4f70-b3ee-f574e7de28de"
["source"]=>
string(21) "b2b-cyber-security.de"
["publication_date"]=>
string(10) "2024-03-20"
["categories"]=>
array(3) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(16) "Customer Privacy"
[2]=>
string(13) "Data Security"
}
}
[6]=>
array(7) {
["title_en"]=>
string(61) "Articles about information security, data protection, hackers"
["snippet_en"]=>
string(116) "Current articles, publications on information security and information protection from information security experts."
["url"]=>
string(36) "https://cisoclub.ru/category/public/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/7fb9877c-83b4-4b0a-955c-f0e20f82b638"
["source"]=>
string(11) "cisoclub.ru"
["publication_date"]=>
string(10) "2024-03-13"
["categories"]=>
array(3) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(16) "Customer Privacy"
[2]=>
string(13) "Data Security"
}
}
[7]=>
array(7) {
["title_en"]=>
string(91) "Gartner ranked the Czech near-unicorn Ataccam among the leaders in data management software"
["snippet_en"]=>
string(133) "IT world, market developments, internet security, internet connection, mobile internet, online media and advertising, cloud services."
["url"]=>
string(116) "https://www.lupa.cz/aktuality/gartner-zaradil-ceskeho-skorojednorozce-ataccama-mezi-lidry-v-softwaru-pro-spravu-dat/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/26ca72d5-174d-4c79-a911-65962741fe9e"
["source"]=>
string(7) "lupa.cz"
["publication_date"]=>
string(10) "2024-03-12"
["categories"]=>
array(3) {
[0]=>
string(41) "E-commerce and Technological Developments"
[1]=>
string(16) "Customer Privacy"
[2]=>
string(13) "Data Security"
}
}
[8]=>
array(7) {
["title_en"]=>
string(63) "Most companies that collect data don't know what to do with it."
["snippet_en"]=>
string(112) "Data collection continues to be a persistent phenomenon among more and more companies. However, most of these..."
["url"]=>
string(91) "https://www.puromarketing.com/101/213467/mayoria-empresas-recopilan-datos-saben-hacer-ellos"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/d24d962b-b19e-409b-a222-e5213c1248be"
["source"]=>
string(17) "puromarketing.com"
["publication_date"]=>
string(10) "2024-03-05"
["categories"]=>
array(2) {
[0]=>
string(16) "Customer Privacy"
[1]=>
string(13) "Data Security"
}
}
}
["category_annotations"]=>
array(30) {
[0]=>
array(2) {
["name"]=>
string(13) "Data Security"
["count"]=>
int(411)
}
[1]=>
array(2) {
["name"]=>
string(10) "Cybercrime"
["count"]=>
int(198)
}
[2]=>
array(2) {
["name"]=>
string(16) "Customer Privacy"
["count"]=>
int(138)
}
[3]=>
array(2) {
["name"]=>
string(5) "R & D"
["count"]=>
int(137)
}
[4]=>
array(2) {
["name"]=>
string(41) "E-commerce and Technological Developments"
["count"]=>
int(135)
}
[5]=>
array(2) {
["name"]=>
string(23) "Supply Chain Management"
["count"]=>
int(133)
}
[6]=>
array(2) {
["name"]=>
string(25) "Business Model Resilience"
["count"]=>
int(97)
}
[7]=>
array(2) {
["name"]=>
string(24) "Quarterly/Annual Figures"
["count"]=>
int(96)
}
[8]=>
array(2) {
["name"]=>
string(14) "Product Launch"
["count"]=>
int(88)
}
[9]=>
array(2) {
["name"]=>
string(23) "Supply Chain Disruption"
["count"]=>
int(87)
}
[10]=>
array(2) {
["name"]=>
string(20) "Business Development"
["count"]=>
int(64)
}
[11]=>
array(2) {
["name"]=>
string(12) "Stock Market"
["count"]=>
int(63)
}
[12]=>
array(2) {
["name"]=>
string(18) "General Investment"
["count"]=>
int(60)
}
[13]=>
array(2) {
["name"]=>
string(13) "Collaboration"
["count"]=>
int(60)
}
[14]=>
array(2) {
["name"]=>
string(11) "Acquisition"
["count"]=>
int(55)
}
[15]=>
array(2) {
["name"]=>
string(31) "Financial Update/Profit Warning"
["count"]=>
int(53)
}
[16]=>
array(2) {
["name"]=>
string(18) "Expansion & Growth"
["count"]=>
int(53)
}
[17]=>
array(2) {
["name"]=>
string(19) "Economic Conditions"
["count"]=>
int(49)
}
[18]=>
array(2) {
["name"]=>
string(15) "Market Movement"
["count"]=>
int(48)
}
[19]=>
array(2) {
["name"]=>
string(5) "Award"
["count"]=>
int(45)
}
[20]=>
array(2) {
["name"]=>
string(24) "Systemic Risk Management"
["count"]=>
int(44)
}
[21]=>
array(2) {
["name"]=>
string(27) "Supply Chains Vulnerability"
["count"]=>
int(42)
}
[22]=>
array(2) {
["name"]=>
string(12) "Board Change"
["count"]=>
int(42)
}
[23]=>
array(2) {
["name"]=>
string(8) "Epidemic"
["count"]=>
int(39)
}
[24]=>
array(2) {
["name"]=>
string(5) "Legal"
["count"]=>
int(38)
}
[25]=>
array(2) {
["name"]=>
string(5) "Event"
["count"]=>
int(33)
}
[26]=>
array(2) {
["name"]=>
string(15) "Labor Practices"
["count"]=>
int(33)
}
[27]=>
array(2) {
["name"]=>
string(12) "Staff hiring"
["count"]=>
int(31)
}
[28]=>
array(2) {
["name"]=>
string(18) "Ecological Impacts"
["count"]=>
int(30)
}
[29]=>
array(2) {
["name"]=>
string(19) "Green & Responsible"
["count"]=>
int(30)
}
}
}
694c2-us-gartner-inc
Gartner, Inc.
Location
Connecticut
Founded
1979-02-28
Website
https://www.gartner.com
Articles
3445 Articles
Category
Commercial Economic, Sociological, and Educational Research
Management Services
Management Consulting Services
Description
Gartner is a company that delivers actionable, objective insight to executives and their teams. They provide expert guidance and tools to enable faster, smarter decisions and stronger performance on an organization's mission-critical priorities. Gartner has been providing insights and expert guidance to clients' enterprises worldwide for over 40 years. They work with businesses in nearly 90 countries and have over 19,500 associates in approximately 85 offices globally. Gartner offers research and advisory services, conferences, consulting, and more. They also have a commitment to diversity, equity, and inclusion. Gartner's website provides more information about their services, leadership, and corporate responsibility.
By Vaibhav Tare Dependency on data has vastly increased in recent years, amidst accelerated digital transformation across sectors. From finance to healthcare
Data Security Posture Management – DSPM for short – is critical for businesses to ensure cyber resilience in the face of ever-evolving cyber resilience
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.