KuppingerCole - Research, Upcoming Webinars and Events

Implementing Modern and Future-Proof PAM Solutions

Webinar

Implementing Modern and Future-Proof PAM Solutions

Privilege Access Management (PAM) is changing, driven by the move of most businesses from on-prem IT applications and infrastructure to the cloud, resulting in a multi-could, multi-hybrid IT environment. This has resulted in a proliferation of privileged identities that need to be managed.

Access Management: Managing Your Risk

Virtual Event

Access Management: Managing Your Risk

For many businesses, Access Management still remains a big challenge. Not only should we control who has access to our systems, but we should also know where people are accessing this information from, and what exactly they are doing with it. This is particularly challenging when working in the cloud, as well as having customers, employees and other external sources accessing applications remotely and with multiple devices. Multiple devices mean more access points to manage which create a higher risk to your business. In this KCLive Event we take a critical look at employee and third-party...

Managing RDP Security Risks to Block Ransomware Attacks

Leadership Brief

Managing RDP Security Risks to Block Ransomware Attacks

Remote working is becoming widespread for social and economic reasons, and one of the key enablers is the Remote Desktop Protocol (RDP). However, RDP is one of the most popular initial cyber-attack vectors, which is all too often overlooked. This leadership brief details the security risks associated with RDP and provides recommendations for reducing the likelihood of attackers exploiting this legitimate network admin tool to carry out malicious activities undetected.

Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment

Video

Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment

Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency. Join security experts from KuppingerCole Analysts and cybersecurity posture automation firm Balbix as they discuss the need for a common approach to measuring and managing cyber risks across modern IT...

Providers of Verified Identity 2022

Leadership Compass

Providers of Verified Identity 2022

This Leadership Compass provides an overview up-to-date insights on the leaders in innovation, product features, and market reach for full-services Providers of Verified Identity. These vendors cover the entire identity verification process from beginning through onboarding and authentication.

Managing RDP Security Risks to Block Ransomware Attacks

Leadership Brief

Managing RDP Security Risks to Block Ransomware Attacks

Remote working is becoming widespread for social and economic reasons, and one of the key enablers is the Remote Desktop Protocol (RDP). However, RDP is one of the most popular initial cyber-attack vectors, which is all too often overlooked. This leadership brief details the security risks associated with RDP and provides recommendations for reducing the likelihood of attackers exploiting this legitimate network admin tool to carry out malicious activities undetected.

Security Orchestration, Automation and Response (SOAR)

Tools Choice

Security Orchestration, Automation and Response (SOAR)

Business Resilience Management in a Pandemic Crisis 

Virtual Academy KC Master Class

Business Resilience Management in a Pandemic Crisis 

Identity & Access Management (IAM) Essentials

Virtual Academy KC Master Class

Identity & Access Management (IAM) Essentials

Incident Response Management

Virtual Academy KC Master Class

Incident Response Management

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00