Partner Details

Gold Sponsor

BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network. Learn more at: www.beyondtrust.com


 Sponsored Events

Date Title
Nov 17  ‑  Nov 18, 2020 Virtual Event

Cyber Access Summit 2020

Willkommen zum Cyber Access Summit (CAS) 2020! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2020 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus.

Nov 09  ‑  Nov 11, 2020 Virtual Event

Cybersecurity Leadership Summit 2020

In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS20) virtually and in Berlin, Germany, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats.

Nov 04, 2020 Webinar

Operationalizing Least Privilege

Striking the balance between enabling users and administrators to be productive whilst protecting your sensitive systems and data is becoming ever more challenging. Attackers are often one step ahead of organizations, and even those with the most comprehensive security systems and controls in place find that an attacker will discover and exploit their Achilles’ heel.

Sep 03, 2020 Virtual Event

The Three Fundamentals to Enterprise Identity Success

Organisations of all sizes are recognizing the need for a modern enterprise identity program to help fast track digital transformation, cloud adoption and Zero Trust initiatives. In order to capture the full capabilities, benefits and security of a modern enterprise identity program, you need the integration of solutions that cover all users, permissions and privileges. Attend this virtual event to learn how the integration between Identity and Access Management, Identity Governance and Privileged Access Management can protect your critical systems and data, reduce risk and help you quickly adapt to the changing demands of your business. During the event KuppingerCole, Ping Identity, SailPoint, BeyondTrust and other industry experts will provide attendees with best practices and guidance on how to achieve their goals from an identity program.

Jun 25, 2020 Webinar

Minimizing Security Impacts of a Growing Remote Workforce

Many organisations are implementing remote working policies and need to quickly support an unprecedented increase in the number of remote employees.

Nov 19, 2019 Webinar

6 Myths of Privileged Access Management Busted

Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve.

May 14  ‑  May 17, 2019 Congress

European Identity & Cloud Conference 2019

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 950 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

May 15  ‑  May 18, 2018 Congress

European Identity & Cloud Conference 2018

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Apr 19, 2018 Webinar

Privileged Attack Vectors: Verständnis und Minimierung interner und externer Cyber-Risiken

Eine der unglücklichen Folgen des fortschreitenden Digitaltransformationsprozesses ist die ständig steigende Komplexität der IT-Infrastrukturen von Unternehmen. Die Einführung von Cloud-Technologien, der Ausbau der mobilen Arbeitskräfte und die zunehmende Abhängigkeit von ausgelagerten IT-Mitarbeitern haben dazu geführt, dass der sichere Unternehmensbereich nahezu vollständig verschwunden ist und die Überwachung und Kontrolle privilegierter Zugänge sehr komplex und teuer geworden ist. 

Jun 28, 2017 Webinar

Interoperability and Intelligence: Two Keys to a Successful Privilege Management Deployment

As businesses are becoming increasingly digital, their IT infrastructures are continuously growing in scale and complexity, with vast numbers of previously disparate systems and platforms woven together by new communications channels. Many of these systems are no longer located within the corporate perimeter, having partially or completely migrated to the cloud. Even those which still remain on.premises, must be constantly accessible to mobile workers, external contractors or support engineers.

May 09  ‑  May 12, 2017 Congress

European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security.

Oct 06, 2016 Webinar

State-of-the-Art Privilege Management by Design

The challenges for securely managing and monitoring access to administrative accounts are changing continuously. This is true for business processes, job profiles, legal and regulatory requirements and the underlying IT infrastructure. And it is true for the changing threat landscape.

May 10  ‑  May 13, 2016 Congress

European Identity & Cloud Conference 2016

European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

Nov 17, 2015 Webinar

The Seven Keys to a Successful Privileged Account Management Strategy

How can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to mitigate the risks posed by insider threats, prevent data breaches, and meet compliance requirements.

Apr 17  ‑  Apr 20, 2012 Congress

European Identity & Cloud Conference 2012

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

 Reports

Date Title Price
May 12, 2020

Leadership Compass: Privileged Access Management - 80088

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators…

€1295.00
May 07, 2019

Executive View: BeyondTrust Password Safe - 80067

BeyondTrust’s Produktportfolio bietet eine gut integrierte Privileged Access Management (PAM) Suite mit einer Reihe von Funktionen für die Erkennung und Minderung von…

€190.00
Apr 26, 2019

Executive View: BeyondTrust Password Safe - 80067

BeyondTrust’s portfolio of products provides a well-integrated Privileged Access Management (PAM) suite with a range of capabilities for  detection and mitigation of security…

€190.00
Mar 25, 2019

Leadership Compass: Privileged Access Management - 79014

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the…

€1295.00
Dec 28, 2017

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

BeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for…

€190.00
Nov 06, 2017

Executive View: BeyondTrust PowerBroker PAM - 70275

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged…

€190.00
Aug 03, 2017

Leadership Compass: Privilege Management - 72330

Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische…

€1295.00
Jun 12, 2017

Leadership Compass: Privilege Management - 72330

Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and…

€1295.00
Apr 28, 2016

Executive View: BeyondTrust PowerBroker - 71504

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged…

€190.00
Mar 05, 2015

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

BeyondTrust PowerBroker Auditor Suite is a set of auditing tools for Windows environments. Together they provide a unified real-time insight and an audit trail for file system, SQL Server,…

€190.00
Jan 31, 2012

Product Report: Blackbird Management Suite - 70402

The Blackbird Management Suite is well architected and is designed to include high levels of integration with the existing support modules for Active Directory and the Windows Server File…

€295.00

 Webcasts

Date Language Title
Jun 26, 2020

Minimizing Security Impacts of a Growing Remote Workforce

Many organisations are implementing remote working policies and need to quickly support an unprecedented increase in the number of remote employees.

Nov 20, 2019

6 Myths of Privileged Access Management Busted

Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve.

Apr 20, 2018

Privileged Attack Vectors: Verständnis und Minimierung interner und externer Cyber-Risiken

Eine der unglücklichen Folgen des fortschreitenden Digitaltransformationsprozesses ist die ständig steigende Komplexität der IT-Infrastrukturen von Unternehmen. Die Einführung von Cloud-Technologien, der Ausbau der mobilen Arbeitskräfte und die zunehmende Abhängigkeit von ausgelagerten IT-Mitarbe...

Jun 29, 2017

Interoperability and Intelligence: Two Keys to a Successful Privilege Management Deployment

As businesses are becoming increasingly digital, their IT infrastructures are continuously growing in scale and complexity, with vast numbers of previously disparate systems and platforms woven together by new communications channels. Many of these systems are no longer located within the corpora...

Oct 07, 2016

State-of-the-Art Privilege Management by Design

The challenges for securely managing and monitoring access to administrative accounts are changing continuously. This is true for business processes, job profiles, legal and regulatory requirements and the underlying IT infrastructure. And it is true for the changing threat landscape.

May 23, 2016

Patric Schmitz - Managing User Risk: How to Constrain, Control and Empower

A large proportion of time spend securing IT systems involves managing user risk in a variety of guises. Balancing the need to be secure against the needs of users to be productive in their day-to-day activities is an on-going challenge. In this session I will show how you can deliver reductions in user risk without impacting their productivity. How IT Security can empower users to do more with less risk.

Nov 18, 2015

The Seven Keys to a Successful Privileged Account Management Strategy

How can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to mitigate ...


Register now for free!

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00


Virtual Event

Cybersecurity Leadership Summit 2020

Language:
English
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Nov 09 - 11, 2020 09:00 AM - 4:00 PM CET

Key Topics

  • AI, Machine Learning & Cybersecurity

  • Security Fabrics

  • Privacy, Governance & Security

  • Zero Trust Security

  • Cloud Security & DevSecOps

  • Privacy & Data Security

  • OT & IoT Security

  • Privileged Access Management & Identity

  • Incident Response

  • Endpoint Management, Detection and Response

  • Security Virtualization

  • API & WebApp Security

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00