Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join the iconic identity community from June 4 - 7, 2024 in Berlin, Germany! Get the Prime Discount and register for 1,000 EUR!
Learn more
Blog
Blog
The Rise of AI Is Revolutionizing Cyber-Attacks
Artificial Intelligence (AI) has been a revolutionary force in several fields, transforming industries and increasing efficiency. Its impact, however, is not restricted to good applications. AI has...
Learn more
Market Compass
Market Compass
Conversational AI Building Platforms
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers conversational AI building platforms with a focus...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #80: AI Service Clouds
Anne Bailey has just completed extensive research into the new market segment of AI Service Clouds. In this episode, she explains this innovative concept, which aims to overcome the lack of...
Learn more
AI for Governance and Governance of AI
Blog
AI for Governance and Governance of AI
Artificial Intelligence is a hot topic and many organizations are now starting to exploit these technologies, at the same time there are many concerns around the impact this will have on society....
Can Your Antivirus Be Too Intelligent Sometimes?
Blog
Can Your Antivirus Be Too Intelligent Sometimes?
Current and future applications of artificial intelligence (or should we rather stick to a more appropriate term “Machine Learning”?) in cybersecurity have been one of the hottest...
Privileged Access Management Can Take on AI-Powered Malware to Protect Identity-Based Computing
Blog
Privileged Access Management Can Take on AI-Powered Malware to Protect Identity-Based Computing
Much is written about the growth of AI in the enterprise and how, as part of digital transformation, it will enable companies to create value and innovate faster. At the same time, cybersecurity...
Leading IDaaS Supplier OneLogin Aiming for the Top
Blog
Leading IDaaS Supplier OneLogin Aiming for the Top
OneLogin is among the leading vendors in the overall, product, innovation and market leadership ratings in KuppingerCole’s latest Leadership Compass Report on IDaaS Access Management , but...
AI in the Auto Industry Is About More Than Self-Driving Cars
Blog
AI in the Auto Industry Is About More Than Self-Driving Cars
Car buyers gathering at the Frankfurt Motor Show last month will have witnessed the usual glitz as car makers went into overdrive launching new models, including of course many new electric...
Cognitive! - Entering a New Era of Business Models Between Converging Technologies and Data
Blog
Cognitive! - Entering a New Era of Business Models Between Converging Technologies and Data
Digitalization or more precisely the "digital transformation" has led us to the "digital enterprise". It strives to deliver on its promise to leverage previously unused data and the...
Redefining the Role of the CISO – Cybersecurity and Business Continuity Management Must Become One
Blog
Redefining the Role of the CISO – Cybersecurity and Business Continuity Management Must Become One
Cyberattack resilience requires way more than just protective and defensive security tools and training. Resilience is about being able to recover rapidly and thus must include BCM (Business...
Regulating AI's Limitless Potential
Blog
Regulating AI's Limitless Potential
Regulation has the uncomfortable task of limiting untapped potential. I was surprised when I recently received the advice to think of life like a box. “The walls of this box are all the...
Blockchain: It’s not About Technology, It Is About Use Cases
Blog
Blockchain: It’s not About Technology, It Is About Use Cases
Today, the German Federal Government announced its Blockchain Strategy . What might sound as a great thing, falls short, for a number of reasons. One is that it is late: after the first hype...
PSD2 in a Europe of Small Principalities
Blog
PSD2 in a Europe of Small Principalities
Europe’s consumers have been promised for some years now that strong customer authentication (SCA) was on its way. And the rules as to when this should be applied in e-commerce are being...
What Does AI in Human Resources Mean for the Small Business?
Blog
What Does AI in Human Resources Mean for the Small Business?
Thanks to an incessant desire to remove repetitive tasks from our to-do lists, researchers and companies are developing AI solutions to HR – namely to streamline recruiting, improve the...
The Best Security Tool Is Your Own Common Sense
Blog
The Best Security Tool Is Your Own Common Sense
Earlier this week, Germany’s Federal Office for Information Security (popularly known as BSI) has released their Digital Barometer 2019 (in German), a public survey of private German...
Previous
3 4 5 6 7 8 9 Next