Focus Area: Cyber Defence Center

What is Cyber Defence Center

Today, the Cyber Defence Center (CDC) or Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes for them to decide whether an alert indicates a real cyber-attack or is merely a false positive. In fact, the biggest challenge the security industry is now facing is the lack of qualified experts to deal with the growing number of cyber-threats.

To address this massive skills gap, a new generation of security solutions has emerged recently, with vendors focusing on filtering out the statistical noise and bringing the amount of security alerts to a manageable number of alerts categorized by their severity, improving security analysts’ efficiency with intelligent automated controls and, last but not least, on enabling even non-technical persons to make informed decisions and initiate incident response as quickly as possible. From statistical correlation methods to machine learning algorithms, from risk models to behavior profiling, from threat intelligence to cognitive technologies – there is a lot of exciting new developments going on in information security, which promise to dramatically improve the efficiency of your SOC.

Latest Research, Upcoming Webinars and Events From
Cyber Defence Center

Webinar

Cognitive Technologies and the Future of Identity & Access Management

Like any other field of information technology, identity and access management has been rapidly evolving to meet new business challenges created by the Digital Transformation. As modern businesses are becoming increasingly open and interconnected, IAM solutions now need to cover not just employees, but customers, partners and smart IoT devices. They must be able to handle the growing complexity of managing and monitoring access to the company’s most valuable digital assets, regardless of their format, location or scale, while still maintaining compliance and protecting them from cyber risks.

Executive View

Executive View: VMware AppDefense - 70840

Fully integrated protection of virtual machines as part of the software defined data center. From capturing expected behavior to efficiently responding to detected threats: Intelligent endpoint security technology leveraging the insight, control and automation available within virtualized environments.

Webcast

Mark Stephen Meadows - Why Bots Need License Plates

The consumer experience is changing radically, and globally. Today, AI-powered bots in the form of chatbots, voice assistants, and avatars, are responsible for the majority of traffic on the web and conversational systems.  And CPA chatbots or accountant avatars are now telling us what to do with our money – what to buy, where to buy it, and where to invest.  How can we trust these bots? After all, they are made by humans, and sadly not all humans have your best interest at heart. These bots need license plates. Bots and AI need authentication. They need regulation,...

Conference

Consumer Identity World Tour 2018

The Consumer Identity World Tour is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Latest News From Cyber Defence Center

Conference

Cybersecurity Leadership Summit 2018

Cybersecurity is about humans, skills and knowledge. So is the Cybersecurity Leadership Summit in Berlin (#CSLS18). Discussing face-to-face with your peers about trends, hypes and evolving threats, getting trained in thinking the unthinkable to be better prepared for disaster, or even avoid…

Conference

Consumer Identity World Tour 2018

The Consumer Identity World Tour is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Webcast

Dr. Hans-Peter Güllich - Applying Artificial Intelligence for a New Age of Risk and Compliance Management

Misguided, mismanaged and misunderstood. How to provide easy to understand key information supporting fundamental C-Level decisions in the years ahead? Due to the sheer mass of available data organisations are missing an ongoing and real time monitoring of external and internal data and…

Webcast

Parth Desai - Open Banking Challenges & Opportunities: Why AI is the Essential Business Enabler

Presentation at the Digital Finance World 2018 in Frankfurt, Germany

Webcast

Michael Backes - CollectAI: How an Innovative Financial Service Leverages AI from the Start

Since 2012 Otto Group Digital Solutions, the Otto Group's company builder, has worked to build strategically-relevant business models in the financial industry, combining the assets of the corporate ecosystem with entrepreneurial know-how and cutting-edge technology. This keynote…

Webcast

Mark Stephen Meadows - Why Bots Need License Plates

The consumer experience is changing radically, and globally. Today, AI-powered bots in the form of chatbots, voice assistants, and avatars, are responsible for the majority of traffic on the web and conversational systems.  And CPA chatbots or accountant avatars are now telling us what…

Executive View

Executive View: VMware AppDefense - 70840

Fully integrated protection of virtual machines as part of the software defined data center. From capturing expected behavior to efficiently responding to detected threats: Intelligent endpoint security technology leveraging the insight, control and automation available within virtualized…

Blog

Obsession? Hype? Revolution? It Might Be a Bit of Everything: Moving Into the Age of Blockchain in Cybersecurity, Identity and Privacy

In looking at the current investor craze mainly around the primary use case of blockchain, the Bitcoin, it sometimes gets a bit difficult to think beyond the bubble and track those blockchain projects, which indeed are on their way to becoming useful in changing the way we do things like…

Executive View

Executive View: ERPScan Smart Cybersecurity Platform for SAP - 72510

ERPScan Smart Cybersecurity Platform for SAP is an Al-driven enterprise level solution for SAP that leverages machine learning. By addressing predictive, preventive, detective and responsive capabilities, and by leveraging vulnerability management, source code security and the analysis of…

Executive View

Executive View: STEALTHbits® Products Overview - 70270

Securely governing access is increasingly important to ensure compliance as well as to defend against cyber-crime. STEALTHbits’ products provide a comprehensive set of solutions to address IT security risks covering Active Directory, Data Access Governance, Privileged Access…

About KuppingerCole

Our Capabilities

KuppingerCole’s values are expertise, thought leadership, neutrality and outstanding practical relevance.

Our People

KuppingerCole’s highly qualified and globally recognized analysts continuously research and update KuppingerCole online research library, and perform manufacturer-independent advisory services.

Our Methodologies

Proven approach of KuppingerCole focuses on lean, efficient projects, with a structured methodology based on ongoing research, publications, and thought-leading deep knowledge of our analysts.

Our Experience

A large number of KuppingerCole’s existing reports and a significant number of new reports published every year ensures that you can always access up-to-date information you need for your decisions.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Sign Up now

Blog

Blog

Some Perspective on Self-Sovereign Identity

Identity isn't hard when you don't always use it. For example, here in the natural world we are anonymous—literally, nameless—in most of our public life, and this is a handy thing. Think about it: none of us walks down the street wearing a name badge, and it would be strange to do so. A [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00