Insights

Endpoint security

Computers, mobile devices, IoT devices are targets for takeovers. Endpoint security solutions are designed to prevent malware from executing, detect and recover from compromises, and manage endpoint assets. Endpoint security products are conglomerations of several additional discrete functions, such as browser protection, system file integrity monitoring, application controls, and device firewalls. Endpoint security solutions are must-haves for every organization.

KC Open Select
KC Open Select
Unified Endpoint Management
Unified Endpoint Management refers to comprehensive solutions with capabilities that support a range of endpoint types.
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Ransomware Attacks on Critical Infrastructure
Ransomware is a very easy and successful way of making money illicitly, so it is a proven business model unlikely to lose popularity with cyber criminals any time soon. Cybercriminals are also...
Learn more
Leadership Compass
Leadership Compass
Unified Endpoint Management (UEM)
This report provides an updated overview of the Unified Endpoint Management (UEM) market and provides a compass to help you find the solution that best meets your needs. We examine the market...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #88: What (and why) is XDR?
XDR (eXtended Detection & Response) solutions are an emerging category of security tools that are designed to consolidate and replace multiple point solutions. John Tolbert and Alexei...
Learn more
Preparing for the Current and Future Cybersecurity Threat Landscape: ENISA Efforts
Event Recording
Preparing for the Current and Future Cybersecurity Threat Landscape: ENISA Efforts
Cybersecurity is increasingly taking the front seat, from being considered as an afterthought to becoming a priority in policy, technical, economic, societal and even legal and environmental...
Hacked! How to handle a Ransomware Attack
Event Recording
Hacked! How to handle a Ransomware Attack
Picture this: your defenses are breached, and chaos ensues. What's your next move? In this engaging keynote address, led by an experienced CISO, we explore those crucial first hours in the wake of...
Cyber Defense Matrix
Event Recording
Cyber Defense Matrix
The cybersecurity landscape is complex and can be confusing even to experts. The Cyber Defense Matrix is a model that simplifies this landscape, enabling us to navigate it more easily and clearly...
The Art of Choice: A Guide to Informed Decision-Making
Event Recording
The Art of Choice: A Guide to Informed Decision-Making
Choosing the right software to meet your business needs today and in the future is both essential and challenging. Our workshop, "The Art of Choice," will guide you through five key areas of...
Surviving between the Cyber Frontlines
Event Recording
Surviving between the Cyber Frontlines
Even before Russia`s war of aggression against Ukraine upended the international order it was clear that a new form of “hybrid conflict” had become the new normal.  While it...
Ein ganzheitlicher Ansatz: Identity Security und XDR
Video
Ein ganzheitlicher Ansatz: Identity Security und XDR
Matthias Canisius von SentinelOne und Martin Kuppinger erkunden die Verschmelzung von XDR (Extended Detection and Response) und Identity Security. Erfahren Sie, warum diese Verbindung die Zukunft...
Achieve Effective Risk and Vulnerability Management With a Platform Approach
Webinar Recording
Achieve Effective Risk and Vulnerability Management With a Platform Approach
Join security experts from KuppingerCole Analysts and Tanium as they discuss the common challenges faced in identifying, prioritizing, and remediating security vulnerabilities, and how to overcome...
Real-time Fraud Detection - Challenges and Solutions
Event Recording
Real-time Fraud Detection - Challenges and Solutions
Fraud can be considerably reduced via speed, scalability, and stability. Investigating fraudulent activities, using fraud detection machine learning is crucial where decisions need to be made in...
Current Work and Future Trends in Selective Disclosure
Event Recording
Current Work and Future Trends in Selective Disclosure
There’s a lot of foundational work happening in the space of Selective Disclosure (SD) right now. Selective Disclosure enables you to have a token with many claims (say, an ISO Mobile...
Wallets and Beyond: How Mobile Operators Will Enable Tomorrow’s Identity
Event Recording
Wallets and Beyond: How Mobile Operators Will Enable Tomorrow’s Identity
The digital identity paradigm looks set to evolve. Citizens might rely on digital identity wallets within a few years. As the metaverse and Web 3.0 take shape, users will need more than ever to...
Building Identity Bridges: Where Digital Identity and People's Expectations Meet.
Event Recording
Building Identity Bridges: Where Digital Identity and People's Expectations Meet.
This presentation will bring together and report on experiences in developing identity and privacy standards that are technically feasible but that also address the lived experience of people...
Credentialing-enabled Zero Trust Architecture for API Endpoint-Security
Event Recording
Credentialing-enabled Zero Trust Architecture for API Endpoint-Security
Traditional network security focuses on perimeter defenses, but many organisations, systems and processes no longer have a clearly defined network perimeter. To protect a modern digital...