Partner Details
Workshop Sponsor
A software company providing cybersecurity solutions, WALLIX is the European specialist in Identity and Access Security Solutions. WALLIX's unified solutions portfolio enables companies to respond to today's data protection challenges. WALLIX solutions guarantee detection of and resilience to cyberattacks, which enables business continuity. The solutions also ensure compliance with regulatory requirements regarding access to IT infrastructures and critical data. The portfolio of unified solutions is distributed through a network of more than 180 resellers and integrators worldwide. Listed on the Euronext (ALLIX), WALLIX supports more than 1,300 organizations in securing their digital transformation. WALLIX is a founding member of the HEXATRUST group and has been included in the Futur40, the first ranking of growth companies on the stock exchange published by Forbes France and is part of the Tech 40 index.
Sponsored Events
Date | Title |
---|---|
Nov 08 ‑ Nov 10, 2022 |
Hybrid Event
Cybersecurity Leadership Summit 2022Cyberattacks are more than just an IT problem: It is a business risk. Heightened risk prompted by an ever-changing geopolitical landscape requires cybersecurity leaders to cultivate a myriad of skills to cope with the growing size of business demands. Ensuring business resilience calls for cyber-mature, diversified leadership strategies that withstand not just the inevitable, but also the unforeseen – through innovation and collaboration. CSLS 2022 brings together cybersecurity executives, analysts and top CISOs to help delegates drive decision-making within their organization and to better understand fundamental issues such as buzzword-hunting, process complexity and cyber-threat mitigation. Join the CSLS community to network, learn and upgrade your skills to become a multifaceted security leader. |
Nov 09 ‑ Nov 11, 2021 |
Hybrid Event
Cybersecurity Leadership Summit 2021The Cybersecurity Leadership Summit brings together top security leaders to discuss latest trends and developments in the cyber space. CSLS goes beyond IT troubleshooting and primarily focusses on the managerial aspects of cybersecurity. |
Jun 09 ‑ Jun 10, 2021 |
Virtual Event
Cyber Access Summit 2021Erfahren Sie alles rund um modernes Access Management auf dem virtuellen KCLive Event Cyber Access Summit 2021 am 9. und 10. Juni. Jetzt anmelden! |
Apr 28, 2021 |
Virtual Event
Operationalizing Privileged Access ManagementJoin this KCLive Event to operationalize privileged access management in your enterprise. Gain expert insights into effective credentials management, best practices, PAM for DevOps and deploying PAM in your organization. |
Nov 17 ‑ Nov 18, 2020 |
Virtual Event
Cyber Access Summit 2020Willkommen zum Cyber Access Summit (CAS) 2020! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2020 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus. |
Nov 09 ‑ Nov 11, 2020 |
Virtual Event
Cybersecurity Leadership Summit 2020In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS20) virtually, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats. |
Jul 15, 2020 |
Webinar
Endpoint Protection Made Easy With Privilege ManagementEndpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis, detection, investigation, reporting, and alerting. While EDR solutions may be a good start to protect endpoints, they are by no means sufficient. Instead, Endpoint Privilege Management (EPM) solutions must be integrated to protect the systems from within. |
Jul 07, 2020 |
Virtual Event
Privileged Access Management (PAM) for Your EnterpriseIn this virtual event, KuppingerCole and other top experts in the industry will present crucial information on why companies need PAM and how PAM works best to prevent security breaches and credential thefts through defining and implementing the right strategy. |
May 12 ‑ May 15, 2020 |
Congress
European Identity & Cloud Conference 2020Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
Nov 12 ‑ Nov 14, 2019 |
Conference
Cyber Access Summit 2019Willkommen zum Cyber Access Summit (CAS) 2019! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2019 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus. |
Nov 12 ‑ Nov 14, 2019 |
Conference
Cybersecurity Leadership Summit 2019In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS19) in Berlin, Germany, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats. |
May 14 ‑ May 17, 2019 |
Congress
European Identity & Cloud Conference 2019Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 950 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
Sep 06, 2018 |
Webinar
Privilege Management From the Cloud: Go or No-Go?The digital transformation is changing the way we do business, and it is also changing the way we have to keep our increasingly complex IT infrastructure agile and flexible yet secure and compliant. Managing geographically dispersed cloud/hybrid environments and the privileged access to servers and other systems therein is a challenging task. |
May 15 ‑ May 18, 2018 |
Congress
European Identity & Cloud Conference 2018Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
Nov 09, 2017 |
Webinar
Industrial Control Systems: Understanding the Access Risks and Security ChallengesFor decades, Industrial Control Systems have evolved completely separately from traditional IT, with their own business drivers, requirements and regulations and proprietary hardware designs and network protocols. Needless to say, security from cyberattacks was never a priority for operational technology units responsible for managing those systems: after all, they weren’t even connected to office networks. |
May 10 ‑ May 13, 2016 |
Congress
European Identity & Cloud Conference 2016European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. |
Jun 25, 2015 |
Webinar
Controlling and monitoring administrative access to enterprise ITManaging and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization. |
Reports
Date | Title | Price |
---|---|---|
Aug 03, 2017 |
Leadership Compass: Privilege Management - 72330Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische… |
€1295.00 |
Jun 12, 2017 |
Leadership Compass: Privilege Management - 72330Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and… |
€1295.00 |
Mar 19, 2015 |
Executive View: Wallix AdminBastion - 71266Wallix AdminBastion (WAB) is a single access web portal for multi-bastion and/or multi-tenant organizations. It includes user and session management, password management and built-in access… |
€190.00 |
Videos
Date | Language | Title |
---|---|---|
Jun 10, 2021 |
![]() |
IT'S ALL ABOUT ACCESS - Identity & Access Management |
Apr 29, 2021 |
![]() |
Panel: Quo Vadis PAM? |
Nov 20, 2020 |
![]() |
Stefan Rabben: It Is All About AccessAnhand der Darstellung konkreter Business Cases betont der Vortrag die enorme Wichtigkeit von Zugangskontrollen für die IT-Sicherheitsstrategie von Unternehmen. Er beschreibt, welche Risiken und Schwachstellen damit gezielt adressiert werden. Sie erfahren außerdem, wie der Aufbau eines Security-Konzeptes auf Basis von sicherem Access Management konkret gestaltet werden sollte und welchen Mehrwert die Integration einer Access Management Lösung in eine bestehende IT- Infrastruktur generiert. |
Nov 20, 2020 |
![]() |
Panel - Die Rolle von PAM und wie man mit aktuellen Sicherheitsrisiken umgeht |
Nov 20, 2020 |
![]() |
Wallix Workshop - It`s all about Access! PAM-Lösungen – SetUp und Mehrwert durch IntegrationIn unserem praxisorientierten Workshop legen wir im ersten Teil den Fokus auf das Thema Integration in bestehende Infrastrukturen unserer Kunden. Mit dem Fokus auf eine SIEM-Integration zeigen wir auf, wie sich Ihre IT- Sicherheit durch die Investition in eine PAM-Lösung signifikant erhöht. Im zweiten Teil gehen wir speziell auf die Anforderungen unserer Kunden ein. Wir bereiten eine Teststellung vor und zeigen den großen Mehrwert auf, den auch bereits getätigte Investitionen in die IT-Sicherheit durch die Implementierung einer PAM Lösung erfahren. Integration aus Sicht einer PAM-Lösung mit Fokus SIEM grundsätzliche Integration in die Kundeninfrastruktur (Verzeichnisanbindung, Monitoring, etc) Mehrwert einer Integration mit Fokus SIEM Mehr Sicherheit mit MFA Der Weg zu einer PAM-Lösung und seine Wertigkeit Anforderung seitens der Kunden Vorbereitung und Durchführung einer Teststellung Die typischen Use Cases Mehrwert einer PAM Lösung |
Sep 07, 2018 |
![]() |
Privilege Management From the Cloud: Go or No-Go?The digital transformation is changing the way we do business, and it is also changing the way we have to keep our increasingly complex IT infrastructure agile and flexible yet secure and compliant. Managing geographically dispersed cloud/hybrid environments and the privileged access to servers a... |
Nov 10, 2017 |
![]() |
Industrial Control Systems: Understanding the Access Risks and Security ChallengesFor decades, Industrial Control Systems have evolved completely separately from traditional IT, with their own business drivers, requirements and regulations and proprietary hardware designs and network protocols. Needless to say, security from cyberattacks was never a priority for operational te... |
Jun 29, 2015 |
![]() |
Controlling and Monitoring Administrative Access to Enterprise ITManaging and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization. |
Become a Sponsor
Cybersecurity Leadership Summit 2020
- Language:
- English
- Contact person:
-
Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
- Nov 09 - 11, 2020 09:00 AM - 5:00 PM CET
Key Topics
How can we help you