KuppingerCole - Research, Upcoming Webinars and Events

A Delegated Model for B2B Access Management

Webinar

A Delegated Model for B2B Access Management

In the digital age, collaboration is becoming more dynamic and integrated than ever before. External partners often require specific information, and therefore need access to internal systems. Providing efficient processes to manage partners is key to building a strong partner network.

Becoming a Better Privileged Access Manager

Virtual Event

Becoming a Better Privileged Access Manager

Organizations across the world are plagued by limited visibility of privileged accounts, users, and credentials. This creates a host of security and audibility issues, with former employees retaining access to sensitive information - a dangerous backdoor for attackers. As organizations accelerate towards the cloud, it is critical to have a strategic privileged access approach in place to ensure secure onboarding and management of new privileged accounts at scale.

Hybrid Cloud Backup and Disaster Recovery

Buyer's Compass

Hybrid Cloud Backup and Disaster Recovery

This Buyer's Compass covers solutions that provide backup and restoration of IT service data into the cloud in the context of the hybrid IT service delivery environment that is now commonly found in medium to large organizations. These solutions provide the capability to backup IT service data together with all the necessary meta data required to make it possible to restore an exact copy of the application and its data together with its structure and permissions to achieve given Recovery Point and Recovery Time Objectives.

Hybrid Cloud Backup and Disaster Recovery

Buyer's Compass

Hybrid Cloud Backup and Disaster Recovery

This Buyer's Compass covers solutions that provide backup and restoration of IT service data into the cloud in the context of the hybrid IT service delivery environment that is now commonly found in medium to large organizations. These solutions provide the capability to backup IT service data together with all the necessary meta data required to make it possible to restore an exact copy of the application and its data together with its structure and permissions to achieve given Recovery Point and Recovery Time Objectives.

SailPoint Access Risk Management

Executive View

SailPoint Access Risk Management

SailPoint Access Risk Management is a solution for managing users, their access entitlements, and the related access risk across a range of Line of Business applications, including SAP. SailPoint Access Risk Management delivers in-depth control about these environments, but also integrates neatly with the IGA (Identity Governance & Administration) solutions provided by SailPoint for cross-system controls across the entire breadth of critical business applications.

Security Orchestration, Automation and Response (SOAR)

Tools Choice

Security Orchestration, Automation and Response (SOAR)

Business Resilience Management in a Pandemic Crisis 

Virtual Academy KC Master Class

Business Resilience Management in a Pandemic Crisis 

Identity & Access Management (IAM) Essentials

Virtual Academy KC Master Class

Identity & Access Management (IAM) Essentials

Incident Response Management

Virtual Academy KC Master Class

Incident Response Management

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Stay Connected

KuppingerCole on social media

Subscribe to our Podcasts

KuppingerCole Podcasts - listen anywhere

Blog

Blog

Stop attackers enjoying a pick ‘n’ mix attack surface

Stop attackers enjoying a pick ‘n’ mix attack surface
Paul Fisher

We know that the way forward for business IT is to use multi-hybrid architectures for long term agility of operations. Such architectures will include multiple clouds for new services, on-prem stacks, edge devices, OT integration and much more. But while the need for multi-hybrid is clear, the resulting complexity of ad hoc deployment of multi-hybrid architectures can lead to serious security holes. Unmanaged complexity will invariably result in an enlarged attack surface that will encourage [...]

Job Opportunities

Latest Insights

Welcome to KuppingerCole