KuppingerCole - Research, Upcoming Webinars and Events

Die Rolle von Identity Security bei Zero Trust 

Webinar

Die Rolle von Identity Security bei Zero Trust 

„Zero Trust“ ist heute für die meisten CISOs ein regelmäßiges Gesprächsthema. Im Kern geht es bei Zero Trust um das Prinzip der kontinuierlichen und sorgfältigen Zugriffskontrolle an mehreren Stellen für alle Benutzer beim Zugriff auf Netzwerk- und Systemressourcen ebenso wie Daten. Das ist erst einmal nichts Neues, bringt jedoch eine neue Fokussierung für die Frage, was und wie man IT-Sicherheit und Identity Security umsetzt. Zugriff muss mehr, detaillierter und besser gesteuert und kontrolliert werden.

Managing Complexity: How to Define an Enterprise Cybersecurity Fabric That Delivers

Virtual Event

Managing Complexity: How to Define an Enterprise Cybersecurity Fabric That Delivers

Cyber-Attacks are increasing in frequency and they are getting smarter at an amazing pace, with each successful hit being potentially more disastrous than the last, causing greater destruction and incurring higher recovery costs. At the same time, we are working hard to increase resilience by investing in more and better tools, and the latest technology, creating an over-abundance of cybersecurity infrastructure and tools. But are we doing any better or is it even getting worse? Such a complex tools landscape comes at a price: more patch management challenges, more misconfiguration, more...

SentinelOne Singularity Platform

Executive View

SentinelOne Singularity Platform

SentinelOne Singularity Platform is a security analytics platform for unified protection, detection, response, and remediation across heterogeneous IT environments powered by an autonomous AI technology.

Prediction #1 - Passwordless Authentication: Killing the Undead will become Mainstream in 2022

Video

Prediction #1 - Passwordless Authentication: Killing the Undead will become Mainstream in 2022

The increased importance of a frictionless user experience as a digital business success factor on the one side, and a big wave of ransomware and similar attacks with user credentials as a main entry point are forcing us to rethink authentication and finally get rid of the password. Interview guests of this session will be KC Analyst Martin Kuppinger, Paul Fisher and Jochen Koehler from HYPR.

Software Supply Chain Security: Don’t Get Your Code Tampered

Whitepaper

Software Supply Chain Security: Don’t Get Your Code Tampered

Recent events such as the SolarWinds and Kaseya incidents have demonstrated the need to focus significantly more on software supply chain security. Thus, avoiding code tampering by external attackers and internal parties is essential. This whitepaper looks at how to increase security throughout the Software Lifecycle and implement a multi-layered, defense-in-depth code tampering prevention and detection strategy.

Maturity Level Matrix for IAM

Advisory Note

Maturity Level Matrix for IAM

KuppingerCole Maturity Level Matrices for the major market segments within IAM (Identity, and Access Management), IGA (Identity Governance and Administration) and CIAM (Consumer Identity and Access Management). These provide the foundation for rating the current state of your IAM/IGA projects and programs.

Security Orchestration, Automation and Response (SOAR)

Tools Choice

Security Orchestration, Automation and Response (SOAR)

Business Resilience Management in a Pandemic Crisis 

Virtual Academy KC Master Class

Business Resilience Management in a Pandemic Crisis 

Identity & Access Management (IAM) Essentials

Virtual Academy KC Master Class

Identity & Access Management (IAM) Essentials

Incident Response Management

Virtual Academy KC Master Class

Incident Response Management

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00