KuppingerCole - Research, Upcoming Webinars and Events

Maturing a Zero-Trust Strategy for the Extended Enterprise

Webinar

Maturing a Zero-Trust Strategy for the Extended Enterprise

In the digital era, a 20th century perimeter-based approach to security is no longer appropriate or effective in securing the modern extended enterprise. Instead, a more flexible, identity-based approach is required that can be implemented at every layer of IT, from devices and networks to applications and data.

Rethinking the Risks in Your Software Supply Chain

Virtual Event

Rethinking the Risks in Your Software Supply Chain

Join KCLive Vision the 1-hour virtual session combining presentation, interview, and open mic discussion with the audience.

Buyer’s Compass: Endpoint Protection

Buyer's Compass

Buyer’s Compass: Endpoint Protection

Malware remains a global cybersecurity threat. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for endpoint protection.

Improve Security With Critical Infrastructures Requirements

Webcast

Improve Security With Critical Infrastructures Requirements

Organizations or institutions that are essential for the public are called Critical Infrastructures (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict legal regimes consisting of laws and regulations. Their failure or significant impairments result in sustained supply shortages, significant disruptions to public safety or other drastic consequences. Their protection and the safeguarding of the public require appropriate concepts, processes and technologies. Watch this webcast and learn how your organization can benefit from...

Executive View: Darktrace Enterprise Immune System

Executive View

Executive View: Darktrace Enterprise Immune System

Darktrace Enterprise Immune System is a cyber-defense platform that utilizes a self-learning AI-based technology to detect, investigate and neutralize various cyber-threats in real time, across the whole corporate IT infrastructure, including physical and virtualized environments, industrial control networks, cloud infrastructures, and SaaS applications.

Leadership Brief: Responding to Cyber Incidents

Leadership Brief

Leadership Brief: Responding to Cyber Incidents

The overwhelming majority of organizations now depend upon online services to support their business and this exposes them to cyber security risks. While most have security protection technologies in place few have a plan for how they would respond to a cyber incident. Today, the question is not if your organization will suffer a cyber incident but when - and this makes it essential to have a plan.

Business Resilience Management in a Pandemic Crisis 

Virtual Academy KC Master Class

Business Resilience Management in a Pandemic Crisis 

Identity & Access Management (IAM) Essentials

Virtual Academy KC Master Class

Identity & Access Management (IAM) Essentials

Incident Response Management

Virtual Academy KC Master Class

Incident Response Management

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Stay Connected

KuppingerCole on social media

Subscribe to our Podcasts

KuppingerCole Podcasts - listen anywhere

Blog

Blog

Oracle’s Crypto-Secure Data Management

Oracle’s Crypto-Secure Data Management

Oracle has unveiled new interesting capabilities in the Oracle database today, which they refer to as Immutable and Blockchain tables. While I am not entirely convinced by the names they have chosen, I can absolutely get behind the overall Crypto-secure data management concept that has emerged along with them. Whenever people discuss various applications of cryptography for information protection, they almost inevitably tend to think about encryption or, in other words, protecting the [...]

Job Opportunities

Latest Insights

Welcome to KuppingerCole