Modern Cybersecurity Trends & Technologies

Executive View

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

BeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for attackers, both malicious insiders and external attackers. PowerBroker for Unix & Linux provides…

Executive View

Executive View: Ilantus IDaaS Next - 70252

Ilantus IDaaS Next is an offering in the emerging market of IDaaS B2E, i.e. IDaaS offerings targeted at enterprise customers that must manage both SaaS services in the cloud and on-premise applications and who need more than just SSO capabilities. The service comes with some interesting…

Executive View

Executive View: AlgoSec Security Management Suite - 70262

AlgoSec Security Management Suite ist eine hochautomatisierte und speziell für Unternehmen konzipierte integrierte Lösung zur Verwaltung von Netzwerksicherheitsrichtlinien und der Konnektivität von Geschäftsanwendungen für verschiedenste Geräte in heterogenen…

Blog

Obsession? Hype? Revolution? It Might Be a Bit of Everything: Moving Into the Age of Blockchain in Cybersecurity, Identity and Privacy

In looking at the current investor craze mainly around the primary use case of blockchain, the Bitcoin, it sometimes gets a bit difficult to think beyond the bubble and track those blockchain projects, which indeed are on their way to becoming useful in changing the way we do things like…

Executive View

Executive View: Duo Security - 71330

Duo Security provides a scalable multi-factor authentication solution that can support a small to enterprise-size user base. Duo Security focuses on reducing the complexity of user identity verification while monitoring the health of their devices before connecting them to the applications…

Webcast

Authentication & Authorization for the Microservices World

Microservices architectures, where applications comprise multiple loosely coupled components, which can be developed using different languages frameworks, and platforms, have become one of the most popular alternatives to traditional monolithic enterprise applications. Since these modules…

Blog

McAfee Acquire Skyhigh Networks

McAfee, from its foundation in 1987, has a long history in the world of cyber-security.  Acquired by Intel in 2010, it was spun back out, becoming McAfee LLC, in April 2017. According to the announcement on April 23rd, 2017 by Christopher D. Young, CEO – the new company will be…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

CIAM as a Key Factor in the Digital Transformation

CIAM as a Key Factor in the Digital Transformation

Digital Transformation is one of those buzzwords (technically a buzzphrase, but buzzphrase isn’t a buzzword yet) that gets used a lot in all sorts of contexts. You hear it from IT vendors, at conferences, and in the general media. But Digital Transformation, or DT as we like to abbreviate it, is much more than that. DT is commonly regarded as a step or process that businesses go through to make better use of technology to deliver products and services to customers, consumers, and [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00