Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Webinar
Webinar
Mastering CIAM: Advanced Techniques for Designing a Resilient CIAM Program
In today's digital landscape, mastering CIAM is crucial for IT professionals. Challenges like imperfect client touchpoints, high abandonment rates, and limited system insights hinder best...
Learn more
Blog
Blog
EIC Speaker Spotlight: Graham Williamson on IoT Project Success
Graham Williamson, Senior Analyst at KuppingerCole, is to deliver a presentation entitled Meeting Expectations – 5 pillars for IoT project success on Tuesday, September 14 starting at 7:20...
Learn more
Leadership Compass
Leadership Compass
Web Application Firewalls
This report provides an overview of the Web Application Firewall (WAF) market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market...
Learn more
Video
Video
Microservices in Identity and Access Management
Learn more
Zero Trust Network Access
Leadership Compass
Zero Trust Network Access
Zero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats. Unlike traditional...
Securing Your Digital Frontier: Navigating the Ever-Evolving Threat Landscape
Webinar Recording
Securing Your Digital Frontier: Navigating the Ever-Evolving Threat Landscape
Join security experts from KuppingerCole Analysts and Palo Alto Networks for an insightful and engaging webinar as they delve into the dynamic world of attack surface and threat management. They...
Cequence Security Unified API Protection
Executive View
Cequence Security Unified API Protection
Cequence Security’s Unified API Protection (UAP) brings together discovery, compliance, and protection across all internal and external APIs to defend against fraud, business logic attacks,...
Tata Communications MDR
Executive View
Tata Communications MDR
This KuppingerCole Executive View report looks at the managed detection and response (MDR) market and at how solutions address key challenges, with a review of the MDR service and related...
Email Security
Leadership Compass
Email Security
This report provides an overview of the Email Security market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor...
Navigating the Future of API Security: Trends, Challenges, and Innovations
Webinar Recording
Navigating the Future of API Security: Trends, Challenges, and Innovations
Join KuppingerCole’s Lead Analyst Alexei Balaganski talking about the need for robust security strategies, the increasing complexity of API ecosystems, and the importance of holistic...
Unleashing Automated, Agentless Microsegmentation to Isolate the Next Breach
Event Recording
Unleashing Automated, Agentless Microsegmentation to Isolate the Next Breach
Discover the power of full-scale microsegmentation! Join us for an exciting presentation on this cutting-edge security solution that prevents lateral movement. Automated and agentless,...
Securing the SaaS Revolution: Protecting Your Data in the Cloud
Event Recording
Securing the SaaS Revolution: Protecting Your Data in the Cloud
The best CISO’s are never surprised! But now that SaaS apps like Salesforce, ServiceNow, or M365 have become mission-critical for organisations and process sensitive data, it's getting...
Protect APIs Everywhere with Modern Solutions
Event Recording
Protect APIs Everywhere with Modern Solutions
Attackers follow the money. In a digital economy, this means targeting web apps and APIs to exploit vulnerabilities and abuse business logic, leading to data breach, account takeover, and fraud...
Ein ganzheitlicher Ansatz: Identity Security und XDR
Video
Ein ganzheitlicher Ansatz: Identity Security und XDR
Matthias Canisius von SentinelOne und Martin Kuppinger erkunden die Verschmelzung von XDR (Extended Detection and Response) und Identity Security. Erfahren Sie, warum diese Verbindung die Zukunft...
ReliaQuest GreyMatter
Executive View
ReliaQuest GreyMatter
Dieser Executive View Report von KuppingerCole befasst sich mit den Herausforderungen im Bereich der Cybersicherheit und den Optionen, die den Sicherheitsverantwortlichen für Managed Security...
API Security & Management
Leadership Compass
API Security & Management
This Leadership Compass provides an overview of the market for API security and management solutions, along with recommendations and guidance for finding the products which address your...
1 2 3 4 5 6 7 Next