Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
The traditional approach to building a security operations center (SOC) is no longer valid or able to keep up with the rate of change in business IT environments and in the cyber threat landscape....
Learn more
Blog
Blog
Ransomware Attacks on Critical Infrastructure
Ransomware is a very easy and successful way of making money illicitly, so it is a proven business model unlikely to lose popularity with cyber criminals any time soon. Cybercriminals are also...
Learn more
Executive View
Executive View
Micro Focus ArcSight
ArcSight is a modern SIEM solution that provides an advanced security analytics platform for storing, analyzing, and visualizing information from multiple sources and converting it into actionable...
Learn more
Webinar Recording
Webinar Recording
Security Fabric: Building a Secure Future With a Flexible IT Architecture
IT security is of central importance to companies. There are many requirements that must be met so that users with different roles and rights can use the various computers and networks securely...
Learn more
Mehr Widerstandsfähigkeit Gegen Cyberangriffe: Das Automatisierte SOC
Webinar Recording
Mehr Widerstandsfähigkeit Gegen Cyberangriffe: Das Automatisierte SOC
SOCs müssen heute viel stärker automatisiert werden als in der Vergangenheit. Nur so kann auf die stetig wachsende Bedrohung auch in Zeiten einer Ressourcenknappheit bei...
Security Operations Center as a Service (SOCaaS) for the UAE
Market Compass
Security Operations Center as a Service (SOCaaS) for the UAE
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the Security Operations Center-as-a-Service...
Analyst Chat #160: Upgrade Your Security Management Game
Analyst Chat
Analyst Chat #160: Upgrade Your Security Management Game
Cyberattacks have been intensifying over the past few years as cybercriminals continue to devise new strategies to launch sophisticated attacks and gain unauthorized access. The tactics,...
Security Orchestration Automation and Response (SOAR)
Leadership Compass
Security Orchestration Automation and Response (SOAR)
This report provides an overview of the SOAR market and a compass to help you find a solution that best meets your needs. We examine the SOAR market segment, product/service functionality, relative...
Debunking Common Myths about XDR
Webinar Recording
Debunking Common Myths about XDR
Join security experts from KuppingerCole Analysts and SentinelOne to help you get an understanding of what eXtended Detection & Response (XDR) really is, and why you should consider this...
KC Open Select: Your #1 Shortlisting Tool
Video
KC Open Select: Your #1 Shortlisting Tool
Discover and Compare Cybersecurity Solutions for Free Optimize your decision-making process with the most comprehensive and up-to-date market data available. Configure your individual...
Automating the SOC
Whitepaper
Automating the SOC
SOAR, Security Orchestration, Automation and Response, is the latest in a line of security buzzwords to hit the market; and while SOAR may have only emerged in the last few years, it is fast...
How to Find the Best IT Solution for Your Business
Blog
How to Find the Best IT Solution for Your Business
Finding the right cybersecurity solution for your business can be challenging. Find out how to uncover the right tool for your organization. 
Analyst Chat #154: 2022 Wrapped Up - Major Trends in IAM and Cybersecurity
Analyst Chat
Analyst Chat #154: 2022 Wrapped Up - Major Trends in IAM and Cybersecurity
Another year gone already! It's time to take a look back at 2022. Martin Kuppinger and Matthias talk about what happened in the past year and identify top trends in IAM and Cybersecurity....
CSLS 2022 Is a Wrap
Blog
CSLS 2022 Is a Wrap
Cybersecurity Leadership Summit 2022 was a great success. Thank you to everyone who made it happen.
Previous
4 5 6 7 8 9 10 Next