Partner Details
Platinum Plus Sponsor Booth: P+
Lily Hill House, Lily Hill Road • RG12 2SJ Bracknell • UK
Phone: +44 (0) 1344 317950
Internet: https://delinea.com/
Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide, including over half of the Fortune 100. Our solutions put privileged access at the center of cybersecurity by defining the boundaries of access. Our customers range from small businesses to the world's largest financial institutions, intelligence agencies, and critical infrastructure companies.
Sponsored Events
Date | Title |
---|---|
Jun 09 ‑ Jun 10, 2021 |
Virtual Event
Cyber Access Summit 2021Erfahren Sie alles rund um modernes Access Management auf dem virtuellen KCLive Event Cyber Access Summit 2021 am 9. und 10. Juni. Jetzt anmelden! |
Nov 12 ‑ Nov 14, 2019 |
Conference
Cybersecurity Leadership Summit 2019In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS19) in Berlin, Germany, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats. |
Nov 12 ‑ Nov 14, 2019 |
Conference
Cyber Access Summit 2019Willkommen zum Cyber Access Summit (CAS) 2019! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2019 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus. |
Nov 12 ‑ Nov 14, 2018 |
Conference
Cybersecurity Leadership Summit 2018 EuropeCybersecurity is about humans, skills and knowledge. So is the Cybersecurity Leadership Summit in Berlin (#CSLS18). Discussing face-to-face with your peers about trends, hypes and evolving threats, getting trained in thinking the unthinkable to be better prepared for disaster, or even avoid the worst of it. #CSLS18 represents the new thinking that really matters for a secure digital transformation of your enterprise. At #CSLS18 you will find an impressive line-up of world-class keynote speakers, panel moderators, panellists, best practice presenters and professionals facing the same challenges as you do. |
Nov 12 ‑ Nov 14, 2018 |
Conference
Cyber Access Summit 2018Willkommen zum Cyber Access Summit (CAS) 2018! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2018 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus. |
Jun 06, 2018 |
Executive Meet Up
Executive Meet Up FrankfurtKuppingerCole begrüßt sie persönlich zu einer exklusiven Gesprächsrunde mit anderen Entscheidungsträgern, moderiert von unserem Lead Advisor und Senior Analyst Matthias Reinwarth. Die Abendveranstaltung wird begleitet von einem Dinner und findet in der Kameha Suite, Taunusanlage 20, 60325 Frankfurt am Main, statt. |
May 15 ‑ May 18, 2018 |
Congress
European Identity & Cloud Conference 2018Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
May 03, 2018 |
Webinar
Zero Trust: Solving IT Security’s Identity CrisisAlthough companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organizations are still focusing on securing their network perimeters. |
Oct 05, 2017 |
Webinar
Top Considerations for Selecting an Identity and Access Management as a Service VendorAs organizations continue to move their data and application functions into the cloud for obvious business reasons like improved flexibility and scalability, reduced time to market and cost savings, protecting their sensitive data across both on-premises and the cloud is becoming increasingly complicated. To ensure consistent and secure access management to for these data and applications across a heterogeneous IT landscape from any device and location is a massive challenge, further complicated by new compliance regulations such as GDPR, which makes the cost of a mistake extremely high. |
May 09 ‑ May 12, 2017 |
Congress
European Identity & Cloud Conference 2017European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security. |
Apr 06, 2017 |
Webinar
Making the Cloud a Secure and Easy to Use EnvironmentMost of today’s organizations store even their sensitive data in the cloud. Moving workloads to the cloud results in improved flexibility, elasticity, and reduced time to market for organizations. Nevertheless, companies have to realize these benefits painlessly, while keeping sensitive data secure. Applying an on-premises security model for infrastructure and apps in the cloud can achieve this. |
Oct 13, 2016 |
Webinar
Big Data – Bigger Risks?Organizations are using Big Data to better understand their customers, to improve their products and to optimize their operations. However, Big Data technologies were conceived and designed for scalability and performance rather than security. You need to take steps to secure your Smart Information infrastructure. |
Jun 16, 2016 |
Webinar
No Real Security Without Multi-Factor Authentication EverywhereClearly, there is a trend towards approaches for strong, simple, and flexible authentication, beyond passwords. The benefits fall largely under the categories of an improved customer experience, since with Multi-Factor Authentication (MFA) channels, the reduced dependence on passwords allows password policies to be more user friendly. |
May 10 ‑ May 13, 2016 |
Congress
European Identity & Cloud Conference 2016European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. |
Jun 16, 2015 |
Webinar
Mit Active Directory zu sicherer Zugriffskontrolle für das Digitale Business„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen. |
Apr 17 ‑ Apr 20, 2012 |
Congress
European Identity & Cloud Conference 2012With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
Reports
Date | Title | Price |
---|---|---|
Aug 03, 2017 |
Leadership Compass: Privilege Management - 72330Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische… |
€1295.00 |
Jun 12, 2017 |
Leadership Compass: Privilege Management - 72330Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and… |
€1295.00 |
Jan 12, 2015 |
Executive View: Centrify Identity Service - 71186Centrify is a US based Identity Management software vendor that was founded in 2004. Centrify has achieved recognition for its identity and access management solutions for web and… |
€190.00 |
Jul 14, 2014 |
Executive View: Centrify Server Suite - 70886Centrify is a US based Identity Management software vendor that was founded in 2004. Centrify has achieved recognition for its identity management and auditing solutions including single… |
€190.00 |
Videos
Date | Language | Title |
---|---|---|
Jun 10, 2021 |
![]() |
Warum Privileged Access Management? Hacker knacken keine Firewalls mehr, sie loggen sich ein |
May 04, 2018 |
![]() |
Zero Trust: Solving IT Security’s Identity CrisisAlthough companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organization... |
Oct 06, 2017 |
![]() |
Top Considerations for Selecting an Identity and Access Management as a Service VendorAs organizations continue to move their data and application functions into the cloud for obvious business reasons like improved flexibility and scalability, reduced time to market and cost savings, protecting their sensitive data across both on-premises and the cloud is becoming increasingly com... |
Apr 07, 2017 |
![]() |
Making the Cloud a Secure and Easy to Use EnvironmentMost of today’s organizations store even their sensitive data in the cloud. Moving workloads to the cloud results in improved flexibility, elasticity, and reduced time to market for organizations. Nevertheless, companies have to realize these benefits painlessly, while keeping sensitive data secu... |
Oct 14, 2016 |
![]() |
Big Data – Bigger Risks?Organizations are using Big Data to better understand their customers, to improve their products and to optimize their operations. However, Big Data technologies were conceived and designed for scalability and performance rather than security. You need to take steps to secure your Smart Informa... |
Jun 17, 2016 |
![]() |
No Real Security Without Multi-Factor Authentication EverywhereClearly, there is a trend towards approaches for strong, simple, and flexible authentication, beyond passwords. The benefits fall largely under the categories of an improved customer experience, since with Multi-Factor Authentication (MFA) channels, the reduced dependence on passwords allows pass... |
Jun 16, 2015 |
![]() |
Mit Active Directory zu sicherer Zugriffskontrolle für das Digitale Business„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen. |
Become a Sponsor

Cyber Access Summit 2018
- Language:
- Deutsch
- Contact person:
-
Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
- Nov 12 - 14, 2018 Berlin
Key Topics
How can we help you