KuppingerCole - Research, Upcoming Webinars and Events

The Changing Scope of the NIS 2 EU Directive

Webinar

The Changing Scope of the NIS 2 EU Directive

The NIS Directive aimed at achieving a common standard of network and information security across all EU Member States, with a focus on operators of essential services, is scheduled for an update. Suppliers of utilities, healthcare, transport, communications, and other services need to know what changes are coming and what they need to do to comply.

The Future of Identity & Access Management

Virtual Event

The Future of Identity & Access Management

There are so many factors that have recently had a dramatic impact on how we do business. COVID-19 has forced us into a new era of remote working and a massive cloud-first trend has provided us with complex multi-cloud, multi-hybrid infrastructures and a new level of attack landscapes. On the other side of the coin, we are seeing a massive shift to doing business online. Digital transformation has become a reality and the ability to provide a seamless digital experience to our customers and prospects has a direct impact on our revenues. The enterprise has become a virtual place without a...

IGA auf Basis von IDaaS: Jetzt ein besseres IAM, für jede Art von Unternehmen

Whitepaper

IGA auf Basis von IDaaS: Jetzt ein besseres IAM, für jede Art von Unternehmen

In den letzten Jahren ist IDaaS (Identity as a Service) zunehmend zu einer neuen Normalität geworden. Es bietet einen standardisierten, schnell umsetzbaren Ansatz für IAM (Identity and Access Management). Dies ermöglicht es jeder Art von Organisation, insbesondere auch mittelständischen Unternehmen, schnell zu einem besseren IAM zu gelangen. Auf der Grundlage von Standards, mit einer vereinfachten Anpassbarkeit und einer effizienten Wartung können die Anforderungen an Sicherheit und gesetzliche Vorschriften mit einer raschen Time-to-Value erfüllt werden.

Simplifying and Strengthening Authentication with Passwordless Desktop MFA

Whitepaper

Simplifying and Strengthening Authentication with Passwordless Desktop MFA

If a password is like a house key, the security foundation of an organization's IT systems should have a securely locked front door. Make the front door as secure as possible, and you may as well never need a house key again. By implementing more complex passwords, organizations end up wasting time, money, and resources on password resets while reducing workforce productivity. Secure application login is important, however the initial authentication point for most of the workforce is the laptop, desktop or workstation itself. HYPR provides a simple yet secure login with its passwordless and...

IDaaS-based IGA: The Better IAM Now, for Every Type of Business

Whitepaper

IDaaS-based IGA: The Better IAM Now, for Every Type of Business

In the past years, IDaaS (Identity as a Service) has increasingly become the new normal. It provides a standardized, rapid-to-deploy approach on IAM (Identity and Access Management). It enables every type of organization, including medium-sized/mid-market businesses, to quickly move to a better IAM. Based on standards, with simplified customization, and efficient maintenance, it allows to serve the security and regulatory requirement needs with a quick time-to-value.

Security Orchestration, Automation and Response (SOAR)

Tools Choice

Security Orchestration, Automation and Response (SOAR)

Business Resilience Management in a Pandemic Crisis 

Virtual Academy KC Master Class

Business Resilience Management in a Pandemic Crisis 

Identity & Access Management (IAM) Essentials

Virtual Academy KC Master Class

Identity & Access Management (IAM) Essentials

Incident Response Management

Virtual Academy KC Master Class

Incident Response Management

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00