KuppingerCole Blog

Navigator

State Sponsored Cyber Threats

A proactive cybersecurity risk management strategy has long been a priority for many larger organizations, but this is rapidly becoming a necessity for organizations of all sizes in all industries as the conflict in Ukraine drives the global cyber threat level to a new high. The conflict in Ukraine is widely recognized as the first truly hybrid war with kinetic and cyber components from the outset, but the cyber impact is expected to last long after the guns fall silent, which is something every organization needs to be prepared for.  Whatever the outcome, the world will never...

Blog

Is “Why Not Both?” Oracle’s New Product Strategy?

I firmly believe that one of the key success factors of a product strategy in any industry is to be able to offer customers just the right amount of choice. Looking back at the history of such companies as Ford, Kodak, IKEA, or Apple, we can see that their success was to a large extent in their ability to sell not just a product, but an entire lifestyle, a single, convenient solution for all their customers’ problems, whether real or just invented by marketing departments. Of course, this approach does not work every time, as the eventual fate of Kodak indicates. Customer...

Blog

The Reality of Deception for Cyber Resilience

Dr. Donnie Wendt's presentation will explore adding deception as a component of a security-in-depth strategy to increase cyber resilience. He will elaborate on this idea in his keynote Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience on Thursday, May 12, 2022, 11:30 am at the European Identity and Cloud Conference 2022 . To give you a sneak preview of what to expect, we asked Donnie some questions about his presentation. How is deception used in the cyber realm? I like to think of deception, you know, it's not really about deceiving the enemy,...

Blog

Hyperautomation Changing Business

Hyperautomation has the potential to disrupt and accelerate business all over the world. It is necessary to be prepared. There is automation, and there is hyperautomation. Buckle up! Before we get to hyperautomation, we should start with automation within the enterprise in the context of business process automation. Or as it is often called, robotic process automation (RPA). First of all, RPA is a software solution to automate repetitive tasks in the organization like calculations, record-keeping, making reports, filling forms, and much more. RPA typically handles digital data that...

Blog

Accelerating Your Digital Journey

With increasing security standards, companies are struggling to stay up to date. Efficiency is required but integrating new standards into an existing system is time-consuming. Tatsuo Kudo, from Authlete, and Martin Kuppinger discussed how an excellent time-to-value is possible. Watch the interview now to find out more.

Navigator

Implementing Zero Trust

Mobile and remote working is now commonplace and is set to continue. As a result, more organizations than ever before are seeking to adapt their cybersecurity capabilities accordingly. For many, this means adopting a Zero Trust approach. Zero Trust is not a new concept, but it is now being actively pursued by many organizations because the supporting technologies are finally maturing and the core principle of “never trust, always verify” is key to addressing the security challenges of modern hybrid working. A Zero Trust model of strict identity verification and access...

Blog

SentinelOne acquires Attivo Networks: A big leap forward to Security with Identity

SentinelOne has announced that they will acquire Attivo Networks, a leading Distributed Deception Platform (DDP) and Identity Threat Detection & Response (ITDR) solution provider. This appears to be a good move for SentinelOne, which is a leading Endpoint Protection Detection & Response (EPDR) vendor. SentinelOne went public with the one of the largest IPOs ever last year. Attivo was founded in 2011 in the Bay Area. Their initial focus was on the DDP market. DDP is an innovative approach to detecting and preparing for cyberattacks, whereby organizations deploy decoy resources to...

Blog

Identity Access – The Immature Industry

Allan Foster thinks the identity and access management industry is an immature industry mostly because it is still thinking in siloes. He will elaborate on this idea in his keynote Access Control – The New Frontier on Thursday, May 12, 2022, 9:10 am at the European Identity and Cloud Conference 2022 . To give you a sneak preview of what to expect, we asked Allan some questions about his presentation. You have been involved in Identity for many years now. Have we solved all the Identity Problems? Well, wouldn't that be nice, right? We wouldn't even have to have a...

Blog

Zero Trust: CISOs No Longer Need to Choose Between Usability and Security

Among the longstanding challenges that information security leaders have grappled with for years, one stands out: the difficulty of balancing user experience and security. The traditional tug-of-war between ease of access to business-critical applications and resources and robust protection from hackers has never been easy. Until now. The unprecedented demands that the COVID-19 pandemic have placed on IT and security teams have tested their flexibility, inventiveness and resolve. But they’ve also had a silver lining. Across industries — particularly in those that are...

Blog

Google is Buying Mandiant to Boost Customer Protection Against Multi-Cloud Threats

Yesterday, Google has announced its intent to acquire Mandiant , a leading provider of cybersecurity defense and response services, for $5.4 billion – the company’s second-largest acquisition to date. When the deal is closed, Mandiant will join Google Cloud, further expanding its new parent company’s portfolio of security services, both in its own cloud and across multi-cloud and hybrid environments. To be completely honest, my initial reaction was somewhat akin to “Oh, poor Mandiant, they just won’t leave it alone…” After all, the company...