Latest Research, Upcoming Webinars and Events
The challenges for securely managing and monitoring access to administrative accounts are changing continuously. This is true for business processes, job profiles, legal and regulatory requirements and the underlying IT infrastructure. And it is true for the changing threat landscape. More
Sophos offers a range of security solutions as software, appliances and cloud services. These products exploit threat intelligence that is gathered by Sophos Labs, shared in real time between Sophos Next-Gen Firewall and Sophos Next-Gen Endpoint Protection, and integrated through Sophos Security Heartbeat. These products include the recently released Sophos Intercept X. More
Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network. More
Besides a compact introduction into the GDPR design principles and terminology, the GDPR-class will outline the differences between the current Directive 95/46/EC on Data Protection and the GDPR. Furthermore, it will offer you an analysis of the core aspects of the GDPR that might be relevant for your daily business: data protection impact assessments (DPIA), data protection audits, data transfers to and from the EU, access requests and rights. Finally, you will be given advice on issues related to the requirements of processing personal data for marketing purposes and on how to securely More
KuppingerCole’s values are expertise, thought leadership, neutrality and outstanding practical relevance.
KuppingerCole’s highly qualified and globally recognized analysts continuously research and update KuppingerCole online research library, and perform manufacturer-independent advisory services.
Proven approach of KuppingerCole focuses on lean, efficient projects, with a structured methodology based on ongoing research, publications, and thought-leading deep knowledge of our analysts.
A large number of KuppingerCole’s existing reports and a significant number of new reports published every year ensures that you can always access up-to-date information you need for your decisions.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
‘Know your customer’ started as an anti-money laundering (AML) initiative in the financial industry. Regulators insisted that banks establish a customer ‘due-diligence’ processes to ensure that all bank accounts could be traced back to the entities that owned them. The [...]
In order to improve and tighten business relationships, today’s connected businesses need to communicate, collaborate and interact with their customers in a way that’s faster and suppler than ever before. Knowing consumers and their identities spot on also allows to optimally serve them. To use this key to success in the era of digital transformation, enterprises today often think about employing Customer Identity & Access Management (CIAM), complementary to traditional IAM for employees and business partners. They often forget however that, forced by regulation [...]