KuppingerCole - Research, Upcoming Webinars and Events

Evolving Identity and Access Management for the Digital Era

Webinar

Evolving Identity and Access Management for the Digital Era

Businesses are undergoing digital transformations and adopting new technologies to become as flexible and agile as possible to remain competitive. But ensuring that only authorized entities have access to critical business data and applications is essential. Modern IT demands modern IAM that supports cloud adoption and business process optimization.

European Identity and Cloud Conference 2023

Hybrid Event

European Identity and Cloud Conference 2023

The European Identity and Cloud Conference returns on May 9 - 12, 2023! Get insights in over 180 sessions, enhance your network with more than 1,000 experts, and enjoy unlimited networking opportunities in Germany’s capital.

Why Vulnerability Management Is a Strategic Investment

Leadership Brief

Why Vulnerability Management Is a Strategic Investment

Considering that the threat landscape is constantly changing, it is important to maintain a strong cybersecurity foundation. Organizations need security hygiene standards to increase security and readiness while preventing vulnerabilities from being exploited by adversaries. By introducing a vulnerability management program, organizations will not only increase security and resilience but also prevent incidents from losing their money and reputation. This Leadership Brief provides an overview of the vulnerability management process that organizations should consider implementing.

Key Findings on Malign Information, Misinformation, and Cyberattacks

Video

Key Findings on Malign Information, Misinformation, and Cyberattacks

Ksenia Iliuk, Head of Research at Detector Media, Ukraine tells us about some key findings of their research in the media landscape of Ukraine. Find out what she has to say about Telegram and what it has to do with #cybersecurity .

Considerations for Reducing the Risk of Ransomware

Whitepaper

Considerations for Reducing the Risk of Ransomware

In this paper, we will expand our view of ransomware and demonstrate how treating it as an isolated security challenge is not a sustainable approach. We will show why prevention is the best foundation for managing risk and consider some strategies to combat common ransomware tactics. A breach affects every part of the enterprise because it is not an isolated cybersecurity problem; it is an everyone’s problem.

PingOne Authorize

Executive View

PingOne Authorize

Due to its value and sensitivity, customer identity and data must be protected with strong access management systems. Key use cases include managing usage of customer data and its availability both internally and externally; and managing availability of organizational data across employee and partner workforces. Organizations failing to manage access controls are at risk of suffering from cyberattacks or violating regulations. Authorization methods are constantly evolving to address ever-changing business requirements and the increasing threats. PBAC (Policy Based Access Control) is a...

Security Orchestration, Automation and Response (SOAR)

Tools Choice

Security Orchestration, Automation and Response (SOAR)

Business Resilience Management in a Pandemic Crisis 

Virtual Academy KC Master Class

Business Resilience Management in a Pandemic Crisis 

Identity & Access Management (IAM) Essentials

Virtual Academy KC Master Class

Identity & Access Management (IAM) Essentials

Incident Response Management

Virtual Academy KC Master Class

Incident Response Management

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00