KuppingerCole - Research, Upcoming Webinars and Events

Adding Certainty to Your Cyber-Attack Detection Capabilities

Webinar

Adding Certainty to Your Cyber-Attack Detection Capabilities

There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.

European Identity and Cloud Conference 2021

Hybrid Event

European Identity and Cloud Conference 2021

The European Identity and Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid.

Endpoint Detection & Response (EDR)

Buyer's Compass

Endpoint Detection & Response (EDR)

Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help detect and remediate these kinds of threats. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for EDR tools.

Five Steps to Building an Effective Insider Threat Program

Webcast

Five Steps to Building an Effective Insider Threat Program

The greatest cybersecurity threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders - the contractors, third-party vendors, and even your own privileged employees who already have full access to your company's systems and sensitive data. Any of those can cause substantial damage to your business by leaking confidential information, disrupting access to a critical system or simply draining your bank account. The most privileged users in this regard are no longer the IT administrators, but the CEO or CFO, and the number of new...

Executive View: Akamai Zero Trust Security

Executive View

Executive View: Akamai Zero Trust Security

Akamai’s Intelligent Edge Platform offers a broad range of access management, threat protection, and application security services that will support you in your journey to Zero Trust, making it safe, scalable and easy to manage – delivered entirely from the cloud.

Advisory Note: GRC Reference Architecture

Architecture Blueprint

Advisory Note: GRC Reference Architecture

GRC covers the areas of Governance, Risk and Compliance and this report refers to GRC in the context of delivering IT services to meet organizational goals.  GRC is concerned with setting objectives, policies and controls and monitoring performance against these.  This report provides an architecture for the successful implementation of GRC within an organization.

Security Orchestration, Automation and Response (SOAR)

Tools Choice

Security Orchestration, Automation and Response (SOAR)

Business Resilience Management in a Pandemic Crisis 

Virtual Academy KC Master Class

Business Resilience Management in a Pandemic Crisis 

Identity & Access Management (IAM) Essentials

Virtual Academy KC Master Class

Identity & Access Management (IAM) Essentials

Incident Response Management

Virtual Academy KC Master Class

Incident Response Management

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Stay Connected

KuppingerCole on social media

Subscribe to our Podcasts

KuppingerCole Podcasts - listen anywhere

Blog

Blog

Managing Access and Entitlements in Multi-Cloud Multi-Hybrid IT

Managing Access and Entitlements in Multi-Cloud Multi-Hybrid IT
Martin Kuppinger

Introducing DREAM (Dynamic Resource Entitlement and Access Management) Paradigm for managing all access of everyone and everything to all resources consistently in a multi-cloud multi-hybrid environment. Policy-based, automated, consuming the current state of services & infrastructure. Shifting from identity & security siloes to a holistic, integrated concept. Start tactically now with CIEM, PAM, etc., but go on to strategic measures. Managing identities, managing entitlements, and [...]

Job Opportunities

Latest Insights

Welcome to KuppingerCole