Partner Details

Workshop Sponsor

Die WALLIX Group ist ein europäischer sicherheitszertifizierter Hersteller für Cyber-Security Lösungen, um die Zugänge zu IT- und OT-Infrastrukturen zu schützen.
Wir stellen über das „Zero-Trust“-Modell sicher, dass jeder Benutzer, jede Anwendung und jeder Prozess ausschließlich mit den geringst-notwendigen Berechtigungen auf die Informationen und Ressourcen zugreifen darf, die für seine Zwecke erforderlich sind.
Unsere Technologien basieren auf einer schlanken, einfach zu bedienenden, TCO-optimierten Architektur und lassen sich in jede bestehende Security-Infrastruktur integrieren.
Durch Analyse aktueller Angriffsvektoren ermöglicht unser Lösungsansatz die unmittelbare Erhöhung der IT-Sicherheit um 60% -80%, aktives Risiko Management, die Umsetzung einer optimierten Sicherheitsstrategie sowie der Erfüllung von Compliance-Vorgaben.


 Sponsored Events

Date Title
Jun 09 ‑ Jun 10, 2021 Virtual Event

Cyber Access Summit 2021

Erfahren Sie alles rund um modernes Access Management auf dem virtuellen KCLive Event Cyber Access Summit 2021 am 9. und 10. Juni. Jetzt anmelden!

Apr 28, 2021 Virtual Event

Operationalizing Privileged Access Management

Join this KCLive Event to operationalize privileged access management in your enterprise. Gain expert insights into effective credentials management, best practices, PAM for DevOps and deploying PAM in your organization.

Nov 17 ‑ Nov 18, 2020 Virtual Event

Cyber Access Summit 2020

Willkommen zum Cyber Access Summit (CAS) 2020! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2020 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus.

Nov 09 ‑ Nov 11, 2020 Virtual Event

Cybersecurity Leadership Summit 2020

In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS20) virtually, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats.

Jul 15, 2020 Webinar

Endpoint Protection Made Easy With Privilege Management

Endpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis, detection, investigation, reporting, and alerting. While EDR solutions may be a good start to protect endpoints, they are by no means sufficient. Instead, Endpoint Privilege Management (EPM) solutions must be integrated to protect the systems from within.

Jul 07, 2020 Virtual Event

Privileged Access Management (PAM) for Your Enterprise

In this virtual event, KuppingerCole and other top experts in the industry will present crucial information on why companies need PAM and how PAM works best to prevent security breaches and credential thefts through defining and implementing the right strategy.

May 12 ‑ May 15, 2020 Congress

European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Nov 12 ‑ Nov 14, 2019 Conference

Cyber Access Summit 2019

Willkommen zum Cyber Access Summit (CAS) 2019! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2019 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus.

Nov 12 ‑ Nov 14, 2019 Conference

Cybersecurity Leadership Summit 2019

In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS19) in Berlin, Germany, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats.

May 14 ‑ May 17, 2019 Congress

European Identity & Cloud Conference 2019

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 950 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Sep 06, 2018 Webinar

Privilege Management From the Cloud: Go or No-Go?

The digital transformation is changing the way we do business, and it is also changing the way we have to keep our increasingly complex IT infrastructure agile and flexible yet secure and compliant. Managing geographically dispersed cloud/hybrid environments and the privileged access to servers and other systems therein is a challenging task.

May 15 ‑ May 18, 2018 Congress

European Identity & Cloud Conference 2018

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Nov 09, 2017 Webinar

Industrial Control Systems: Understanding the Access Risks and Security Challenges

For decades, Industrial Control Systems have evolved completely separately from traditional IT, with their own business drivers, requirements and regulations and proprietary hardware designs and network protocols. Needless to say, security from cyberattacks was never a priority for operational technology units responsible for managing those systems: after all, they weren’t even connected to office networks.

May 10 ‑ May 13, 2016 Congress

European Identity & Cloud Conference 2016

European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

Jun 25, 2015 Webinar

Controlling and monitoring administrative access to enterprise IT

Managing and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization.

 Reports

Date Title Price
Mar 09, 2021

WALLIX Bastion

WALLIX Bastion is a PAM solution that offers the fundamentals of session management, password management and access management as well as more advanced features such as PEDM and privileged…

free
May 12, 2020

Leadership Compass: Privileged Access Management - 80088

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators…

€1295.00
Nov 14, 2019

Whitepaper: Grundlagen des Privileged Access Managements - 80332

Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Datensicherheit für jedes Unternehmen. Privilegierte Konten werden traditionell an…

free
Nov 07, 2019

Whitepaper: Understanding Privileged Access Management - 80302

Privileged Access Management (PAM) is one of the most important areas of risk management and data security in any organization. Privileged accounts have traditionally been given to…

free
May 08, 2019

Executive View: Wallix Bastion - 79053

The WALLIX Bastion is a single gateway-based solution for PAM offering advanced session management, password management and access management capabilities, with built-in controls for access…

€190.00
Mar 25, 2019

Leadership Compass: Privileged Access Management - 79014

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the…

€1295.00
Aug 03, 2017

Leadership Compass: Privilege Management - 72330

Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische…

€1295.00
Jun 12, 2017

Leadership Compass: Privilege Management - 72330

Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and…

€1295.00
Mar 19, 2015

Executive View: Wallix AdminBastion - 71266

Wallix AdminBastion (WAB) is a single access web portal for multi-bastion and/or multi-tenant organizations. It includes user and session management, password management and built-in access…

€190.00

 Videos

Date Language Title
Apr 29, 2021

Panel: Quo Vadis PAM?

Nov 20, 2020

Stefan Rabben: It Is All About Access

Anhand der Darstellung konkreter Business Cases betont der Vortrag die enorme Wichtigkeit von Zugangskontrollen für die IT-Sicherheitsstrategie von Unternehmen. Er beschreibt, welche Risiken und Schwachstellen damit gezielt adressiert werden. Sie erfahren außerdem, wie der Aufbau eines Security-Konzeptes auf Basis von sicherem Access Management konkret gestaltet werden sollte und welchen Mehrwert die Integration einer Access Management Lösung in eine bestehende IT- Infrastruktur generiert.

Nov 20, 2020

Panel - Die Rolle von PAM und wie man mit aktuellen Sicherheitsrisiken umgeht

Nov 20, 2020

Wallix Workshop - It`s all about Access! PAM-Lösungen – SetUp und Mehrwert durch Integration

In unserem praxisorientierten Workshop legen wir im ersten Teil den Fokus auf das Thema Integration in bestehende Infrastrukturen unserer Kunden. Mit dem Fokus auf eine SIEM-Integration zeigen wir auf, wie sich Ihre IT- Sicherheit durch die Investition in eine PAM-Lösung signifikant erhöht. Im zweiten Teil gehen wir speziell auf die Anforderungen unserer Kunden ein. Wir bereiten eine Teststellung vor und zeigen den großen Mehrwert auf, den auch bereits getätigte Investitionen in die IT-Sicherheit durch die Implementierung einer PAM Lösung erfahren.   Integration aus Sicht einer PAM-Lösung mit Fokus SIEM grundsätzliche Integration in die Kundeninfrastruktur (Verzeichnisanbindung, Monitoring, etc) Mehrwert einer Integration mit Fokus SIEM Mehr Sicherheit mit MFA Der Weg zu einer PAM-Lösung und seine Wertigkeit Anforderung seitens der Kunden Vorbereitung und Durchführung einer Teststellung Die typischen Use Cases Mehrwert einer PAM Lösung

Sep 07, 2018

Privilege Management From the Cloud: Go or No-Go?

The digital transformation is changing the way we do business, and it is also changing the way we have to keep our increasingly complex IT infrastructure agile and flexible yet secure and compliant. Managing geographically dispersed cloud/hybrid environments and the privileged access to servers a...

Nov 10, 2017

Industrial Control Systems: Understanding the Access Risks and Security Challenges

For decades, Industrial Control Systems have evolved completely separately from traditional IT, with their own business drivers, requirements and regulations and proprietary hardware designs and network protocols. Needless to say, security from cyberattacks was never a priority for operational te...

Jun 29, 2015

Controlling and Monitoring Administrative Access to Enterprise IT

Managing and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00


Virtual Event

Cyber Access Summit 2020

Language:
Deutsch
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Nov 17 - 18, 2020 9am - 4pm CEST

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00