KuppingerCole - Research, Upcoming Webinars and Events

Trust No One: Zero Trust Strategy and Design

Webinar

Trust No One: Zero Trust Strategy and Design

With workloads moving to the cloud and remote working increasing, traditional perimeter-based security strategies are no longer practical. A Zero Trust model of strict access control for every user or device offers an alternative that secures data while ensuring it is accessible to those who need it. But the shift to treating both internal and external users as untrusted can be challenging.

Cloud Strategy Optimization - Ensuring Efficient and Secure Collaboration on Cloud

Virtual Event

Cloud Strategy Optimization - Ensuring Efficient and Secure Collaboration on Cloud

Join the KCLive Event on Cloud Strategy Optimzation to learn how to develop a state-of-the-art cloud strategy for your business.

Whitepaper: KRITIS – Understanding and protecting critical infrastructure

Whitepaper

Whitepaper: KRITIS – Understanding and protecting critical infrastructure

Organizations or institutions that are essential for the public are called Critical Infrastructure (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict legal regimes consisting of laws and regulations. Their failure or significant impairments result in sustained supply shortages, significant disruptions to public safety or other drastic consequences. Their protection and the safeguarding of the public require appropriate concepts, processes and technologies.

Improve Security With Critical Infrastructures Requirements

Webcast

Improve Security With Critical Infrastructures Requirements

Organizations or institutions that are essential for the public are called Critical Infrastructures (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict legal regimes consisting of laws and regulations. Their failure or significant impairments result in sustained supply shortages, significant disruptions to public safety or other drastic consequences. Their protection and the safeguarding of the public require appropriate concepts, processes and technologies. Watch this webcast and learn how your organization can benefit from...

Whitepaper: Cisco: Next-Generation Enterprise Security Delivered from the Cloud: Addressing Modern Cyber Threats with Cisco Umbrella

Whitepaper

Whitepaper: Cisco: Next-Generation Enterprise Security Delivered from the Cloud: Addressing Modern Cyber Threats with Cisco Umbrella

As businesses embrace the Digital Transformation and become increasingly cloud-native, mobile and interconnected, the corporate network perimeter is gradually disappearing, exposing users to malware, ransomware, and other cyber threats. Traditional perimeter security tools no longer provide adequate visibility, threat protection, and scalability, nor can they offer convenience and productivity for users on the go. There is a need for the next-generation enterprise security solutions delivered from the cloud.

Leadership Brief: Responding to Cyber Incidents

Leadership Brief

Leadership Brief: Responding to Cyber Incidents

The overwhelming majority of organizations now depend upon online services to support their business and this exposes them to cyber security risks. While most have security protection technologies in place few have a plan for how they would respond to a cyber incident. Today, the question is not if your organization will suffer a cyber incident but when - and this makes it essential to have a plan.

Security Orchestration, Automation and Response (SOAR)

Tools Choice

Security Orchestration, Automation and Response (SOAR)

Business Resilience Management in a Pandemic Crisis 

Virtual Academy KC Master Class

Business Resilience Management in a Pandemic Crisis 

Identity & Access Management (IAM) Essentials

Virtual Academy KC Master Class

Identity & Access Management (IAM) Essentials

Incident Response Management

Virtual Academy KC Master Class

Incident Response Management

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Stay Connected

KuppingerCole on social media

Subscribe to our Podcasts

KuppingerCole Podcasts - listen anywhere

Blog

Blog

EIC Speaker Spotlight: Doc Searls on Decentralized Identity

EIC Speaker Spotlight: Doc Searls on Decentralized Identity
Raj Hegde

Doc Searls, Co-founder and board member of Customer Commons, and Director of ProjectVRM, is to deliver a keynote entitled Where Stands the Sovereign Self? at the European Identity and Cloud Conference 2021. To give you sneak preview of what to expect, we asked Doc some questions about his planned presentation. Why does decentralized identity matter to companies today? You as an individual have sovereignty and agency when you put your shoes on in the morning, when you drive your car, [...]

Job Opportunities

Latest Insights

Welcome to KuppingerCole