Insights

Cloud Security

As more and more organizations use cloud services cyber security and compliance has taken center stage. The benefits of using the cloud for business-critical applications can be undermined if this leads to cyber-attacks, data breaches and compliance failure.

Guide
Guide
Stairway to Cloud Security
Read the complete step-by-step guide to help you make the right decisions to minimize risk and achieve high cloud security.
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
CSLS Speaker Spotlight: Martin Kuppinger on Cloud Security
Martin Kuppinger, Principal Analyst at KuppingerCole, will give a presentation entitled Cloud Security 2025 – Perspective & Roadmap on Thursday, November 11 from 11:00 am to 11:20 am...
Learn more
Executive View
Executive View
Orca Cloud Security Platform
Unzureichend verwaltete Sicherheitskontrollen innerhalb der Ressourcen eines Mandanten von Cloud-Diensten sind zunehmend die Ursache von Sicherheitsvorfällen und Compliance-verletzungen. Die...
Learn more
Event Recording
Event Recording
Navigating the OT World – Selecting a Solution to Suit
Learn more
Achieving Security and Compliance Across Hybrid Multi-Cloud Environments
Webinar Recording
Achieving Security and Compliance Across Hybrid Multi-Cloud Environments
Join security experts from KuppingerCole Analysts and IBM as they discuss the challenges of achieving security and compliance across hybrid multi-cloud environments, and potential solutions, that...
AWS Announces EU Sovereign Cloud
Blog
AWS Announces EU Sovereign Cloud
On October 25th, 2023, AWS announced their intention to launch AWS European Sovereign Cloud. This is an important announcement which reflects the impact of EU GDPR regulation and the EU recent...
Cloud Security Early Warning Systems: From CSPM to CNAPP
Webinar Recording
Cloud Security Early Warning Systems: From CSPM to CNAPP
Cloud computing delivers the benefits of accelerated development without the hardware costs. But the dynamic nature of cloud services and the proprietary security features offered by different...
Cloud Security Alphabet Soup
Blog
Cloud Security Alphabet Soup
Is securing your cloud security different from securing other forms of IT? You would think so from the alphabet soup of acronyms around the subject.
Analyst Chat #192: Exploring Cloud Security Posture Management (CSPM)
Analyst Chat
Analyst Chat #192: Exploring Cloud Security Posture Management (CSPM)
Join Matthias Reinwarth and Senior Analyst Mike Small in a quick chat on the evolution of Cloud Security Posture Management (CSPM). They discuss its proactive approach, the challenges in...
Using Data Security Platforms in a Modern, Hybrid World
Webinar Recording
Using Data Security Platforms in a Modern, Hybrid World
Join security experts from KuppingerCole Analysts and Imperva as they discuss the challenges of protecting data distributed across hybrid IT environments, and look at what technologies and...
Cloud Security Posture Management
Leadership Compass
Cloud Security Posture Management
This report provides an overview of the CSPM (Cloud Security Posture Management) market and a compass to help you find a solution that best meets your needs. It examines solutions that provide a...
Britive
Executive View
Britive
This Executive View report examines cloud entitlement management challenges companies face. It also provides a concise analysis of the Britive platform that enables cloud-first security best...
Closing Keynote
Event Recording
Closing Keynote
Covering Your Customer Identity Needs - The Way Forward
Event Recording
Covering Your Customer Identity Needs - The Way Forward
The Art of CIAM is to converge user Experience (UX) , security and privacy in a way  that is seamless and unobtrusive for the user. In this panel session we will discuss the role of...
How to Manage Complex Clouds Based on Cyber Resistance
Event Recording
How to Manage Complex Clouds Based on Cyber Resistance
You have probably heard about Cyber Resilience, and how about Cyber Resistance? What should be the differences between the two terms in the context of Cybersecurity? Cyber Resistance is the same...
A Sovereign Cloud for the German Government
Event Recording
A Sovereign Cloud for the German Government
You will learn about the Sovereign Cloud for the German Government, this solution is based on Azure and operated by Delos Cloud Gmbh
Previous
1 2 3 4 5 6 7 Next