Partner Details
Workshop Sponsor
A software company providing cybersecurity solutions, WALLIX Group is the European specialist in privileged account governance. In response to recent regulatory changes and the cybersecurity threats affecting all companies today, WALLIX’s solutions help users defend against cyber-attacks, theft and data leaks linked to stolen credentials and abused privileges. It is the first market solution to have been awarded first-level security certification (CSPN) by France’s National Cybersecurity Agency (ANSSI) and thus meet all of the criteria for regulatory compliance. Listed on the Euronext under ALLIX and distributed by a network of more than 170 resellers and trained and accredited integrators, WALLIX accompanies more than 1200 companies in securing their digital future.
Sponsored Events
Date | Title |
---|---|
Nov 17 ‑ Nov 18, 2020 |
Virtual Event
Cyber Access Summit 2020Willkommen zum Cyber Access Summit (CAS) 2020! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2020 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus. |
Nov 09 ‑ Nov 11, 2020 |
Virtual Event
Cybersecurity Leadership Summit 2020In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS20) virtually, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats. |
Jul 15, 2020 |
Webinar
Endpoint Protection Made Easy With Privilege ManagementEndpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis, detection, investigation, reporting, and alerting. While EDR solutions may be a good start to protect endpoints, they are by no means sufficient. Instead, Endpoint Privilege Management (EPM) solutions must be integrated to protect the systems from within. |
Jul 07, 2020 |
Virtual Event
Privileged Access Management (PAM) for Your EnterpriseIn this virtual event, KuppingerCole and other top experts in the industry will present crucial information on why companies need PAM and how PAM works best to prevent security breaches and credential thefts through defining and implementing the right strategy. |
May 12 ‑ May 15, 2020 |
Congress
European Identity & Cloud Conference 2020Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
Nov 12 ‑ Nov 14, 2019 |
Conference
Cyber Access Summit 2019Willkommen zum Cyber Access Summit (CAS) 2019! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2019 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus. |
Nov 12 ‑ Nov 14, 2019 |
Conference
Cybersecurity Leadership Summit 2019In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS19) in Berlin, Germany, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats. |
May 14 ‑ May 17, 2019 |
Congress
European Identity & Cloud Conference 2019Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 950 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
Sep 06, 2018 |
Webinar
Privilege Management From the Cloud: Go or No-Go?The digital transformation is changing the way we do business, and it is also changing the way we have to keep our increasingly complex IT infrastructure agile and flexible yet secure and compliant. Managing geographically dispersed cloud/hybrid environments and the privileged access to servers and other systems therein is a challenging task. |
May 15 ‑ May 18, 2018 |
Congress
European Identity & Cloud Conference 2018Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
Nov 09, 2017 |
Webinar
Industrial Control Systems: Understanding the Access Risks and Security ChallengesFor decades, Industrial Control Systems have evolved completely separately from traditional IT, with their own business drivers, requirements and regulations and proprietary hardware designs and network protocols. Needless to say, security from cyberattacks was never a priority for operational technology units responsible for managing those systems: after all, they weren’t even connected to office networks. |
May 10 ‑ May 13, 2016 |
Congress
European Identity & Cloud Conference 2016European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. |
Jun 25, 2015 |
Webinar
Controlling and monitoring administrative access to enterprise ITManaging and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization. |
Reports
Date | Title | Price |
---|---|---|
May 12, 2020 |
Leadership Compass: Privileged Access Management - 80088Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators… |
€1295.00 |
Nov 14, 2019 |
Whitepaper: Grundlagen des Privileged Access Managements - 80332Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Datensicherheit für jedes Unternehmen. Privilegierte Konten werden traditionell an… |
free |
Nov 07, 2019 |
Whitepaper: Understanding Privileged Access Management - 80302Privileged Access Management (PAM) is one of the most important areas of risk management and data security in any organization. Privileged accounts have traditionally been given to… |
free |
May 08, 2019 |
Executive View: Wallix Bastion - 79053The WALLIX Bastion is a single gateway-based solution for PAM offering advanced session management, password management and access management capabilities, with built-in controls for access… |
€190.00 |
Mar 25, 2019 |
Leadership Compass: Privileged Access Management - 79014Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the… |
€1295.00 |
Aug 03, 2017 |
Leadership Compass: Privilege Management - 72330Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische… |
€1295.00 |
Jun 12, 2017 |
Leadership Compass: Privilege Management - 72330Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and… |
€1295.00 |
Mar 19, 2015 |
Executive View: Wallix AdminBastion - 71266Wallix AdminBastion (WAB) is a single access web portal for multi-bastion and/or multi-tenant organizations. It includes user and session management, password management and built-in access… |
€190.00 |
Webcasts
Date | Language | Title |
---|---|---|
Nov 20, 2020 |
![]() |
Stefan Rabben: It Is All About AccessAnhand der Darstellung konkreter Business Cases betont der Vortrag die enorme Wichtigkeit von Zugangskontrollen für die IT-Sicherheitsstrategie von Unternehmen. Er beschreibt, welche Risiken und Schwachstellen damit gezielt adressiert werden. Sie erfahren außerdem, wie der Aufbau eines Security-Konzeptes auf Basis von sicherem Access Management konkret gestaltet werden sollte und welchen Mehrwert die Integration einer Access Management Lösung in eine bestehende IT- Infrastruktur generiert. |
Nov 20, 2020 |
![]() |
Panel - Die Rolle von PAM und wie man mit aktuellen Sicherheitsrisiken umgeht |
Nov 20, 2020 |
![]() |
Wallix Workshop - It`s all about Access! PAM-Lösungen – SetUp und Mehrwert durch IntegrationIn unserem praxisorientierten Workshop legen wir im ersten Teil den Fokus auf das Thema Integration in bestehende Infrastrukturen unserer Kunden. Mit dem Fokus auf eine SIEM-Integration zeigen wir auf, wie sich Ihre IT- Sicherheit durch die Investition in eine PAM-Lösung signifikant erhöht. Im zweiten Teil gehen wir speziell auf die Anforderungen unserer Kunden ein. Wir bereiten eine Teststellung vor und zeigen den großen Mehrwert auf, den auch bereits getätigte Investitionen in die IT-Sicherheit durch die Implementierung einer PAM Lösung erfahren. Integration aus Sicht einer PAM-Lösung mit Fokus SIEM grundsätzliche Integration in die Kundeninfrastruktur (Verzeichnisanbindung, Monitoring, etc) Mehrwert einer Integration mit Fokus SIEM Mehr Sicherheit mit MFA Der Weg zu einer PAM-Lösung und seine Wertigkeit Anforderung seitens der Kunden Vorbereitung und Durchführung einer Teststellung Die typischen Use Cases Mehrwert einer PAM Lösung |
Sep 07, 2018 |
![]() |
Privilege Management From the Cloud: Go or No-Go?The digital transformation is changing the way we do business, and it is also changing the way we have to keep our increasingly complex IT infrastructure agile and flexible yet secure and compliant. Managing geographically dispersed cloud/hybrid environments and the privileged access to servers a... |
Nov 10, 2017 |
![]() |
Industrial Control Systems: Understanding the Access Risks and Security ChallengesFor decades, Industrial Control Systems have evolved completely separately from traditional IT, with their own business drivers, requirements and regulations and proprietary hardware designs and network protocols. Needless to say, security from cyberattacks was never a priority for operational te... |
Jun 29, 2015 |
![]() |
Controlling and Monitoring Administrative Access to Enterprise ITManaging and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization. |
Become a Sponsor
Cybersecurity Leadership Summit 2020
- Language:
- English
- Contact person:
-
Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
- Nov 09 - 11, 2020 09:00 AM - 5:00 PM CET
Key Topics
How can we help you