KuppingerCole - Research, Upcoming Webinars and Events

Adding Certainty to Your Cyber-Attack Detection Capabilities

Webinar

Adding Certainty to Your Cyber-Attack Detection Capabilities

There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.

Enterprise Blockchain Day

Virtual Event

Enterprise Blockchain Day

Blockchain technology has been touted as the ‘solution’ to every problem, yet few enterprises have effectively deployed the technology. The Enterprise Blockchain Day aims to stimulate conversations that matter - reflecting the spectrum of views in the domain.

Endpoint Detection & Response (EDR)

Buyer's Compass

Endpoint Detection & Response (EDR)

Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help detect and remediate these kinds of threats. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for EDR tools.

Improve Security With Critical Infrastructures Requirements

Video

Improve Security With Critical Infrastructures Requirements

Organizations or institutions that are essential for the public are called Critical Infrastructures (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict legal regimes consisting of laws and regulations. Their failure or significant impairments result in sustained supply shortages, significant disruptions to public safety or other drastic consequences. Their protection and the safeguarding of the public require appropriate concepts, processes and technologies. Watch this webcast and learn how your organization can benefit from...

Executive View: ObserveIT Insider Threat Management

Executive View

Executive View: ObserveIT Insider Threat Management

ObserveIT Insider Threat Management is a platform that combines the functionality of traditional User Behavior Analytics (UBA) and Data Loss Prevention (DLP) products in a lightweight and streamlined solution for detecting and mitigating various insider threats.

Advisory Note: Maturity Level Matrix for Cyber Security

Advisory Note

Advisory Note: Maturity Level Matrix for Cyber Security

KuppingerCole Maturity Level Matrixes for the major market segments within cyber security. These provide the foundation for rating the current state of your cyber security projects and programs.  

Security Orchestration, Automation and Response (SOAR)

Tools Choice

Security Orchestration, Automation and Response (SOAR)

Business Resilience Management in a Pandemic Crisis 

Virtual Academy KC Master Class

Business Resilience Management in a Pandemic Crisis 

Identity & Access Management (IAM) Essentials

Virtual Academy KC Master Class

Identity & Access Management (IAM) Essentials

Incident Response Management

Virtual Academy KC Master Class

Incident Response Management

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

Stay Connected

KuppingerCole on social media

Subscribe to our Podcasts

KuppingerCole Podcasts - listen anywhere

Blog

Blog

A Iot to Venture, More to GAIN

A Iot to Venture, More to GAIN
Matthias Reinwarth

As social beings, people interact with their environment, whether as citizens of a state, as employees of a company or as contractual partners (customers, insured persons) with a company in the private sector. Even if a large number of such transactions can take place anonymously (coffee to go on the way to the office in the morning does not require identification), proof of identity or the reliable assurance of a particular characteristic ("of legal age," "fully vaccinated") is often [...]

Job Opportunities

Latest Insights

Welcome to KuppingerCole