Blog
KuppingerCole Analyst Chat: Setting Your Cybersecurity Priorities Right
by Martin Kuppinger
Matthias Reinwarth and Martin Kuppinger explain what you could be doing wrong with regards to cybersecurity priorities.
Blog
IAM Projects Stalling – Too Tools-Centric
by Martin Kuppinger
Martin Kuppinger explains the reasons why so many Identity and Access Management projects can stall or even fail.
Blog
Cybersecurity Awareness Training: Die wichtigsten Punkte in fünf Minuten
by Martin Kuppinger
Martin Kuppinger spricht über die wichtigsten Aspekte von Cybersecurity, die man als Nutzer beachten sollte.
Blog
IAM Projects Stalling – Too Big to Win
by Martin Kuppinger
Martin Kuppinger explains the reasons why so many Identity and Access Management projects can stall or even fail.
Blog
Was die IT in der Krise NICHT machen sollte
by Martin Kuppinger
Martin Kuppinger spricht über die Dinge, die IT-Teams in der Krise in jedem Fall vermeiden sollten.
Blog
Die fünf wichtigsten Cybersecurity Maßnahmen für Unternehmen in Zeiten des Home Office
by Martin Kuppinger
Martin Kuppinger spricht in seinem Video über die wichtigsten Cybersecurity-Maßnahmen für Unternehmen während der Corona-Pandemie.
Blog
Taking One Step Back: The Road to Real IDaaS and What IAM Really Is About
by Martin Kuppinger
Shifting IAM to Modern Architecture and Deployment Models There is a lot of talk about IDaaS (Identity as a Service) these days, as the way to do IAM (Identity and Access Management). There are also fundamental changes in technology, such as the shift to containers (or even serverless) and microservice architectures, which also impact the technology solutions in the IAM market. However, we should start at a different point: What is it that business needs from IAM? If we step back and take a broader perspective, it all ends up with a simple picture ( figure 1 ): The job of IAM is to...
Blog
Redefining the Role of the CISO – Cybersecurity and Business Continuity Management Must Become One
by Martin Kuppinger
Cyberattack resilience requires way more than just protective and defensive security tools and training. Resilience is about being able to recover rapidly and thus must include BCM (Business Continuity Management) activities. It is time to redefine the role of CISOs. I made this point in yesterday’s webinar on cybersecurity budgeting. If you missed it, you can watch the webcast here . Prevention is key in limiting cyberattacks. A Chief Information Security Officer is responsible for prevention. Best practices of employees are responsible for prevention. From the top down the...
Blog
Blockchain: It’s not About Technology, It Is About Use Cases
by Martin Kuppinger
Today, the German Federal Government announced its Blockchain Strategy . What might sound as a great thing, falls short, for a number of reasons. One is that it is late: after the first hype and somewhere in the phase of disillusion. This should have happened much earlier, specifically with the intent of getting or keeping a leading position. And, notably, more important would be to foster innovation by supporting start-ups with simplified regulations and administration for that type of businesses, and a far better ecosystem for venture and growth finance. A second objection: It is...
Blog
Coming soon: The KuppingerCole Leadership Compass IDaaS AM
by Martin Kuppinger
We are about to release the update of the first of two KuppingerCole Leadership Compass documents on IDaaS (Identity as a Service). We have segmented this market into two categories: Access Management (AM) Identity Governance and Administration (IGA) A fast-growing market, IDaaS AM is largely characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models. Improved time-to-value proposition prioritizes adoption of IDaaS for B2B, B2E and B2C access management use-cases, helping IDaaS AM to...
Previous
3 4 5 6 7 8 9 Next