Go to Market with KuppingerCole
Insights
Research
Advisory
Events
Company
Become a Client
Login
Search
Become a Client
Insights
Business Resilience Decentralized Identity Fraud Prevention Identity & Access Management Identity Governance and Administration Network Security Passwordless Authentication Zero Trust
Research
Leadership Compass Whitepaper Executive View Advisory Note Leadership Brief Blog
Advisory
Advisory Services Meet our Advisors
Events
EIC 2023 cyberevolution Webinars Virtual Events
Company
About us People Jobs Newsroom Contact us
Go to Market with KuppingerCole
Insights
Business Resilience
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Network Security
Passwordless Authentication
Zero Trust
See all insights
Most recent in Business Resilience
Layoffs at Technology Firms: An Indicator of a Busting Bubble?
Blog
Layoffs at Technology Firms: An Indicator of a Busting Bubble?
Undoubtedly, many technology companies enjoyed an outstanding success during and after the COVID-19 outbreak. Businesses changed in several fields and we saw situations that we would have rarely expected before: switching to online shopping, online education, remote working, minimizing trips and
Security Operations Center as a Service (SOCaaS)
Buyer's Compass
Security Operations Center as a Service (SOCaaS)
The Security Operations Center-as-a-Service (SOCaaS) market continues to develop in response to demand for security monitoring, analysis, detection, response, and improvement recommendations either instead of or as a supplement to permanent on-premises SOCs. This KuppingerCole Buyer's Compass will
Analyst Chat #149: The Top 5 Cybersecurity Trends - Looking Back at CSLS 2022
Analyst Chat
Analyst Chat #149: The Top 5 Cybersecurity Trends - Looking Back at CSLS 2022
Deep Fakes, AI as friend and foe, Business Resilience, Mis-, Dis- and Malinformation: The Cybersecurity Leadership Summit has taken place in Berlin and covered all of this and much more. Martin Kuppinger and Matthias look back on the event and identify their Top 5 Trends from CSLS2022 in
Most recent in Decentralized Identity
The Path of Unifying Identities
Blog
The Path of Unifying Identities
One Identity Field Strategist Robert Byrne explains why he thinks that the identity community needs to better educate business and even IT managers who shortsightedly equate identity with their login account.
Reusable Verified Identity
Leadership Compass
Reusable Verified Identity
This Leadership Compass provides an overview of up-to-date insights on the leaders in innovation, product features, and market reach for Reusable Verified Identity. These vendors enable a digital identity that has been verified to represent a real-world entity to be reused by the issuing
The Future of Access Management: The Role of Contextual Intelligence, Verifiable Credentials, Decentralized Identity and Beyond
Event Recording
The Future of Access Management: The Role of Contextual Intelligence, Verifiable Credentials, Decentralized Identity and Beyond
Most recent in Fraud Prevention
Are Cyber Insurance Policies Necessary?
Blog
Are Cyber Insurance Policies Necessary?
Cyber insurance offers protection against financial damage resulting from catastrophes involving computer networks, such as data breaches, network failures, and cyber-attacks. Cyber insurance policies are typically used to cover a wide variety of costs associated with cyber incidents, including reme
Security Operations Center as a Service (SOCaaS) for the UAE
Market Compass
Security Operations Center as a Service (SOCaaS) for the UAE
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the Security Operations Center-as-a-Service (SOCaaS) market in the UAE that continues to develop in response to demand for security monitoring,
Cyber Resilience Through SOC Automation
Webinar Recording
Cyber Resilience Through SOC Automation
Join experts from Kuppinger Cole Analysts and Palo Alto Networks as they discuss why automating as much as possible and providing information to enable analysts to make timely decisions should be a priority for SOC management. They will also explore the benefits of Security Orchestration,
Most recent in Identity & Access Management
2023 Trends and Predictions - Passwordless Authentication
Blog
2023 Trends and Predictions - Passwordless Authentication
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is still the driving force behind a number of security breaches and incidents, the modern cybersecurity la
Sharelock ITDR
Executive View
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify anomalies and threats across a wide range of systems is the foundation for proper response. Sharelock
Urgent: Find and Block Identity-Centric Security Threats Today
Webinar Recording
Urgent: Find and Block Identity-Centric Security Threats Today
Join experts from KuppingerCole Analysts and AI-assisted behavioral analysis firm Sharelock as they discuss why Identity Threat Detection & Response (ITDR) is a crucial component of an overall Identity & Access Management (IAM) strategy, why Cloud Workload Protection (CWP) is a
Most recent in Identity Governance and Administration
Identity Fabrics: Where Do You Stand? Where Should You Go?
Blog
Identity Fabrics: Where Do You Stand? Where Should You Go?
The term and concept of Identity Fabrics has become popular in recent years. We observe widespread adoption of the concept as the foundation for further evolving IAM (Identity & Access Management) infrastructures. To provide a guideline for organizations, KuppingerCole Analysts have developed a matu
Identity Governance and Administration 2022
Leadership Compass
Identity Governance and Administration 2022
The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Lifecycle Management and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the IGA
Re-Imagining Identity Management for the Digital Era
Webinar Recording
Re-Imagining Identity Management for the Digital Era
Join identity and security experts from KuppingerCole Analysts and ARCON for a lively discussion about what exactly are the biggest identity challenges facing modern businesses, how those challenges are likely to evolve, and what could be done to meet current and future needs. Participate in
Most recent in Network Security
State-sponsored Cyber Attacks
Blog
State-sponsored Cyber Attacks
Leading organizations have long factored state-sponsored cyber-attacks into their risk-based cyber defense planning, but the need to do so has been highlighted in recent months due to an increase in this type of attack associated with the conflict in Ukraine.
ExeonTrace NDR
Executive View
ExeonTrace NDR
Network monitoring is a foundational element of security architecture. Sophisticated attackers may deliberately delete logs on servers and endpoints to cover up their tracks. This means that the network, including private and public clouds, may be the last place that investigators can look to find
Best Practices to Protect your APIs and Accelerate your DevOps Journey.
Event Recording
Best Practices to Protect your APIs and Accelerate your DevOps Journey.
Most recent in Passwordless Authentication
2023 Trends and Predictions - Passwordless Authentication
Blog
2023 Trends and Predictions - Passwordless Authentication
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is still the driving force behind a number of security breaches and incidents, the modern cybersecurity la
HID Global Authentication Platform
Executive View
HID Global Authentication Platform
In recent years, investment into cybersecurity has soared but, in most cases, these efforts have not fully addressed the reliance on passwords and the challenges they introduce. Without secure access to resources, businesses and organizations are at risk of suffering from phishing and social
Best of Both Worlds: Combining Multi-Factor and Passwordless Authentication
Webinar Recording
Best of Both Worlds: Combining Multi-Factor and Passwordless Authentication
Join experts from KuppingerCole Analysts and trusted identity firm Entrust as they discuss why not all MFA solutions offer the same level of protection. They will also explore the current state of Passwordless Authentication solutions and how best to implement them. Alejandro Leal, Research
Most recent in Zero Trust
IGA, the key to security and compliance
Blog
IGA, the key to security and compliance
Securing data and complying with the growing number of associated local, regional, and international regulations are two of the biggest challenges facing most modern organizations as they become increasingly reliant on complex IT environments.
SASE Integration Suites
Leadership Compass
SASE Integration Suites
This report provides an overview of the market for Secure Access Service Edge (SASE) Integration Suites. In this Leadership Compass, we examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing SASE Integration solutions.
Re-Imagining Identity Management for the Digital Era
Webinar Recording
Re-Imagining Identity Management for the Digital Era
Join identity and security experts from KuppingerCole Analysts and ARCON for a lively discussion about what exactly are the biggest identity challenges facing modern businesses, how those challenges are likely to evolve, and what could be done to meet current and future needs. Participate in
Research
Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Blog
See all research
Most recent in Leadership Compass
SASE Integration Suites
Feb 06, 2023
SASE Integration Suites
This report provides an overview of the market for Secure Access Service Edge (SASE) Integration Suites. In this Leadership Compass, we examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing SASE Integration solutions.
Security Orchestration Automation and Response (SOAR)
Jan 30, 2023
Security Orchestration Automation and Response (SOAR)
This report provides an overview of the SOAR market and a compass to help you find a solution that best meets your needs. We examine the SOAR market segment, product/service functionality, relative market share, and innovative approaches to providing SOAR solutions.
Data Quality and Integration Solutions
Jan 17, 2023
Data Quality and Integration Solutions
This report provides an overview of the market for Data Quality and Data Integration solutions that help in gathering, integrating, cleansing, improving, and enriching data across the complete range of data sources in your organization, for enabling use of that data, as well as enabling data
Most recent in Whitepaper
Die Automatisierung des SOC
Feb 23, 2023
Die Automatisierung des SOC
SOAR, Security Orchestration, Automation and Response, ist das jüngste in einer Reihe von mit Security verbundenen Modewörtern, die sich auf dem Markt verbreiten. Obwohl SOAR erst in den letzten Jahren aufgekommen ist, entwickelt es sich schnell zu einem unverzichtbaren Werkzeug für Unternehmen.
Zoom Unified Communications Platform Security and Compliance
Feb 16, 2023
Zoom Unified Communications Platform Security and Compliance
Zoom offers a cloud-based unified communications platform (UCaaS) featuring video communications. UCaaS delivers many benefits including flexibility, performance, and price. Organizations should choose and use their UCaaS solution based on trustworthiness as well as the cost and efficiency
Going Beyond Traditional Penetration Testing
Feb 08, 2023
Going Beyond Traditional Penetration Testing
Penetration testing is an essential methodology used to discover and remediate vulnerabilities and reduce risks from cyber-attacks and cybercrime. Regular penetration testing is recommended and, in some industries, is required for certification and regulatory compliance. Penetration testing is most
Most recent in Executive View
Sharelock ITDR
Mar 22, 2023
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify anomalies and threats across a wide range of systems is the foundation for proper response. Sharelock
SailPoint Identity Security Cloud
Mar 20, 2023
SailPoint Identity Security Cloud
SailPoint Identity Security Cloud is a cloud-based identity security solution that helps organizations manage access to their applications, data, and other resources. The platform provides a comprehensive view of user access across an organization's IT environment, allowing administrators to manage
ExeonTrace NDR
Mar 08, 2023
ExeonTrace NDR
Network monitoring is a foundational element of security architecture. Sophisticated attackers may deliberately delete logs on servers and endpoints to cover up their tracks. This means that the network, including private and public clouds, may be the last place that investigators can look to find
Most recent in Advisory Note
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Nov 09, 2022
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Vulnerability Management (VM) is a security practice that focuses on the process by which organizations identify, analyze, manage, and prevent the exploitation of IT vulnerabilities. If implemented successfully, a VM program has the potential to increase the overall security of the organization and
2022 IAM Reference Architecture
Apr 21, 2022
2022 IAM Reference Architecture
IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. The challenges for a future proof IAM are complex, diverse, and sometimes even conflicting. Organizations that demand for
Maturity Level Matrix for IAM
Jan 13, 2022
Maturity Level Matrix for IAM
KuppingerCole Maturity Level Matrices for the major market segments within IAM (Identity, and Access Management), IGA (Identity Governance and Administration) and CIAM (Consumer Identity and Access Management). These provide the foundation for rating the current state of your IAM/IGA projects and
Most recent in Leadership Brief
Why Vulnerability Management Is a Strategic Investment
Nov 04, 2022
Why Vulnerability Management Is a Strategic Investment
Considering that the threat landscape is constantly changing, it is important to maintain a strong cybersecurity foundation. Organizations need security hygiene standards to increase security and readiness while preventing vulnerabilities from being exploited by adversaries. By introducing a
Managing RDP Security Risks to Block Ransomware Attacks
Aug 30, 2022
Managing RDP Security Risks to Block Ransomware Attacks
Remote working is becoming widespread for social and economic reasons, and one of the key enablers is the Remote Desktop Protocol (RDP). However, RDP is one of the most popular initial cyber-attack vectors, which is all too often overlooked. This leadership brief details the security risks
Advanced IT security solutions for OT environments
Aug 09, 2022
Advanced IT security solutions for OT environments
Industrial Control Systems operators are increasingly targeted by Advanced Persistent Threat (APT) actors and cybercriminals as digital transformation accelerates. Many hitherto isolated systems now connected, which introduces additional risks from enterprise IT and the cloud. Although such
Most recent in Blog
2023 Trends and Predictions - Passwordless Authentication
Mar 24, 2023
2023 Trends and Predictions - Passwordless Authentication
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is still the driving force behind a number of security breaches and incidents, the modern cybersecurity la
A New Pamocracy is Growing Inside Your Organization
Mar 23, 2023
A New Pamocracy is Growing Inside Your Organization
OK everybody is doing it right now, so I asked the analyst’s new best friend, Chat GPT, to define Privileged Access Management. Here is what it said: “Privileged Access Management (PAM) is a critical security discipline that provides a framework to manage and monitor privileged access to sensitive s
Identity Fabrics: Where Do You Stand? Where Should You Go?
Mar 23, 2023
Identity Fabrics: Where Do You Stand? Where Should You Go?
The term and concept of Identity Fabrics has become popular in recent years. We observe widespread adoption of the concept as the foundation for further evolving IAM (Identity & Access Management) infrastructures. To provide a guideline for organizations, KuppingerCole Analysts have developed a matu
Events
EIC 2023
cyberevolution
Webinars
Virtual Events
European Identity and Cloud Conference 2023
European Identity and Cloud Conference 2023
The European Identity and Cloud Conference is the place where the digital identity and cyber community comes together to set the course for the future of digitization. Come to Berlin or tune in online and get actionable insights for your digitization journey, build strategic partnerships for your business, and enjoy connecting with your colleagues and peers from all over the world.
To the Event Agenda Overview
cyberevolution
cyberevolution
Join the biggest international cybersecurity conference in Germany and meet 500 security practitioners. Participate in four interactive tracks to get insights on Quantum Computing, Supply Chain Security, Human Factor, Zero Trust, and many more. Explore societal, technological, and environmental megatrends.
To the Event Call for Speakers
Most recent in Webinars
Pioneering Zero Trust Network Access With Intelligent Microsegmentation
Mar 28, 2023
Pioneering Zero Trust Network Access With Intelligent Microsegmentation
Working from anywhere and the adoption of cloud services from multiple providers have become increasingly common in the post-pandemic era, but this has created new opportunities for cyber attackers to enter and move across networks. A modern approach to network security is essential.
The Business Value of Cloud-Based Identity Security
Mar 30, 2023
The Business Value of Cloud-Based Identity Security
Identity Governance and Administration (IGA) is crucial for security and compliance. But legacy IGA systems are costly and time consuming to maintain, and most companies are looking to improve identity security, lower costs, and tap into AI-driven automation. Many are considering migrating to the
Maximizing Cyber Security Investments in Economically Turbulent Times
Apr 04, 2023
Maximizing Cyber Security Investments in Economically Turbulent Times
Mitigating digital risk and protecting your organizations from cyber attacks and data breaches is all the more challenging with shrinking IT budgets in a volatile economic environment. The ability to communicate technology and cyber risk and map that against direct and indirect business impact is
Most recent in Virtual Events
Access Management: Managing Your Risk
Dec 07, 2022
Access Management: Managing Your Risk
For many businesses, Access Management still remains a big challenge. Not only should we control who has access to our systems, but we should also know where people are accessing this information from, and what exactly they are doing with it. This is particularly challenging when working in the
Driving Innovation With Identity Fabrics
Oct 06, 2022
Driving Innovation With Identity Fabrics
Digital Transformation has put businesses under a lot of pressure, not only with regards to compliance but also through a high demand for customer privacy and improved user experience. With too much security, e.g., through Authentication, users are scared off, whereas having too little security is
Becoming a Better Privileged Access Manager
Sep 14, 2022
Becoming a Better Privileged Access Manager
Organizations across the world are plagued by limited visibility of privileged accounts, users, and credentials. This creates a host of security and audibility issues, with former employees retaining access to sensitive information - a dangerous backdoor for attackers. As organizations accelerate
Advisory
Advisory Services

KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.

See Advisory Services
Contact our advisors

E-mail info@kuppingercole.com
Phone
+49 (211) 2370 77-0

Meet our Advisors
Company
About us People Jobs Newsroom Contact us
Discover Our Passion for Advancing Identity and Security
We are specialized in the strategic management of digital identities, privileges, authentication, and access control as well as cybersecurity and business resilience.​
Read more about our philosophy
Analysts & Advisors

Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.

Business Team

Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.

Meet the Team
Career Opportunities
(Junior) Advisor (m/w/d) für Cybersecurity, IAM, Digitale Transformation
Advisory
 Stuttgart, Wiesbaden
(Junior) Advisor (m/w/d) für Cybersecurity, IAM, Digitale Transformation
Zum nächstmöglichen Zeitpunkt suchen wir eine/n motivierte/n Advisor/in zur Ergänzung unseres Advisorteams.  Junge Talente – entweder direkt von der Universität oder mit ersten Berufserfahrungen in der Industrie oder Beratung im Bereich Cybersecurity, IAM, Digitale
Analyst Information Security (m/f/d)
Analysts
 Stuttgart | Wiesbaden | Seattle
Analyst Information Security (m/f/d)
As an Analyst for Information Security, you will analyze vendors, products, and trends in Information Security and create research documents. You will provide advice to end users, system integrators, and vendors. If you have a strong knowledge at least of certain fields of Information Security
Senior Analyst Information Security (m/f/d)
Analysts
 Stuttgart | Wiesbaden | Seattle
Senior Analyst Information Security (m/f/d)
As a Senior Analyst for Information Security, you will analyze vendors, products, and trends in Information Security and create research documents and lead research for certain market segments, including creating Leadership Compass documents for these segments in your full responsibility. You will
View all Job Offers
Latest Press Releases
KuppingerCole Analysts Predicts SASE Integration Suites Market to Grow to 4.98 bn USD by 2026  
March 16, 2023
KuppingerCole Analysts Predicts SASE Integration Suites Market to Grow to 4.98 bn USD by 2026  
KuppingerCole Analysts predicts a CAGR of 13.65% for this market segment, which will lift the market size to 4.98 billion USD by 2026. The largest share of the global revenue in this market segment comes from North America, currently representing 52.4%.
KuppingerCole Analysts predicts IGA Market to grow to 3.99 bn USD by 2025 
February 23, 2023
KuppingerCole Analysts predicts IGA Market to grow to 3.99 bn USD by 2025 
KuppingerCole research predicts that the Compound Annual Grow Rate (CAGR) of the IGA Market Segment will be 14.3%, lifting the market volume to 3.99 billion US dollars by 2025. The largest share of the global revenue in this market segment comes from North America, currently representing 55.1%.
KuppingerCole Launches a New and Innovative Shortlisting Tool
February 15, 2023
KuppingerCole Launches a New and Innovative Shortlisting Tool
KupingerCole launches KC Open Select, an innovative shortlisting tool  helping users make more informed decisions on their cybersecurity-related purchases.
Basic contact information
KuppingerCole Analysts AG
Wilhelmstr. 20-22
65185 Wiesbaden
Germany
E-mail Phone info@kuppingercole.com
+49 (211) 2370 77-0
Linkedin Linkedin
Twitter Twitter
Facebook Facebook
YouTube YouTube
Instagram Instagram
Contact us
See all locations, phone numbers, e-mail addresses
Blog

EIC 2010 Keynote: The Irreversible Collision of Technology and Business Risk...

Feb 13, 2010
Joerg Resch

Drew Bartkiewicz, Vice President at The Hartford E&O, Cyber and New Media Liability, just joined the EIC 2010 speaker lineup and will give a keynote on "Unseen Liability - The Irreversible Collision of Technology and Business Risk". Drew also just has written a book with the same title, which will be published in May.

Latest posts by Joerg Resch
Rest in Peace, Kim Cameron
Why C-SCRM Is Becoming so Essential for Your Digital Business
Obsession? Hype? Revolution? It Might Be a Bit of Everything: Moving Into the Age of Blockchain in Cybersecurity, Identity and Privacy
A Short History of EIC - Europe's Leading Event on Digital ID & Transformation
Linkedin Linkedin
Twitter Twitter
Facebook Facebook
YouTube YouTube
Instagram Instagram
Insights
Business Resilience
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Network Security
Passwordless Authentication
Zero Trust
Research
Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Blog
Advisory
Advisory Services
Meet our Advisors
Events
EIC 2023
cyberevolution
Webinars
Virtual Events
Company
About us
People
Jobs
Newsroom
Contact us
Insights
Business Resilience
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Network Security
Passwordless Authentication
Zero Trust
Research
Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Blog
Advisory
Advisory Services
Meet our Advisors
Events
EIC 2023
cyberevolution
Webinars
Virtual Events
Company
About us
People
Jobs
Newsroom
Contact us
Switch to dark theme
Switch to light theme
Imprint Terms & Conditions Privacy Policy © Copyright KuppingerCole Analysts AG
© Copyright KuppingerCole Analysts AG
Go to Market with KuppingerCole
Go to Market with KuppingerCole