Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Dark Side Ransomware Attacks
Last week Colonial Pipeline, one of the largest pipelines in the US, was hit by a ransomware attack from the Dark Side cybercrime group. While many pertinent specifics about the attack are not...
Learn more
Leadership Compass
Leadership Compass
SASE Integration Suites
This report provides an overview of the market for Secure Access Service Edge (SASE) Integration Suites. In this Leadership Compass, we examine the market segment, vendor service functionality,...
Learn more
Event Recording
Event Recording
Navigate the DR (Detection & Response) Jungle: EDR, EPDR, XDR, NDR, MDR, ITDR
ITDR: Is this really something new, given that around 80% of the cyberattacks are identity-related, from password phishing to bypassing MFA? Is it a separate discipline or just a part of XDR...
Learn more
Prepare for PSD2 with Strong Customer Authentication, Fraud Risk Management and Open Banking APIs
Webinar Recording
Prepare for PSD2 with Strong Customer Authentication, Fraud Risk Management and Open Banking APIs
Banks will soon have to comply with the Revised Payment Service Directive, commonly called "PSD2." The directive will introduce massive changes to the payments industry and radically alter the...
Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)
Webinar Recording
Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)
It is all about providing your customer a great experience so that they return to you and not to your competitor, who has never before been that close to your business. Anticipating, maybe even in...
IAM for a Microservices World: Securing Agile IT
Blog
IAM for a Microservices World: Securing Agile IT
Ten years ago, for the second EIC, we published a report and survey on the intersection of IAM and SOA (in German language). The main finding back then was that most businesses don’t...
Martin Kuppinger - Microservices Architectures: Making IAM Hybrid
Event Recording
Martin Kuppinger - Microservices Architectures: Making IAM Hybrid
In recent times, an increasing number of vendors announced a migration of their products towards microservices architectures. Some renovate their existing on premises IAM tools, others build new...
Jeff Jonas - Do you Know What You Know About the Data Subject?
Event Recording
Jeff Jonas - Do you Know What You Know About the Data Subject?
GDPR obligates organizations to provide data subjects with access to their personal data. To comply, companies must be able to answer a seemingly innocuous but frighteningly difficult question:...
Tim Hobbs - What Connects DevOps & IAM
Event Recording
Tim Hobbs - What Connects DevOps & IAM
IAM products are highly configurable systems tailored to the diverse needs of customer environments and applications. Modern applications require short development cycles and IAM systems that can...
Joy Chik - Planning for Tomorrow: Connecting Identities for People, Processes, and Things
Event Recording
Joy Chik - Planning for Tomorrow: Connecting Identities for People, Processes, and Things
Social, economic and technological changes are creating urgent new requirements for enterprise identity that enable interconnected digital systems. These new use cases require a governance...
Dr. Torsten George - Zero Trust: Solving IT Security’s Identity Crisis
Event Recording
Dr. Torsten George - Zero Trust: Solving IT Security’s Identity Crisis
Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of...
Naresh Persaud - How to Enable Trust with Interoperable & Shared Credentials
Event Recording
Naresh Persaud - How to Enable Trust with Interoperable & Shared Credentials
The focus of digital identity for consumers and enterprise is to remove silos, minimize redundant effort, enable better collaboration and provide a foundation for regulatory compliance. The...
Prof. Dr. Heiko Beier - Is it Facebook's End Game? Why Social Networks as we know them Today will not Survive
Event Recording
Prof. Dr. Heiko Beier - Is it Facebook's End Game? Why Social Networks as we know them Today will not Survive
The real problem behind the recent Facebook scandal is not primarily that a company like Cambridge Analytica has "gained" access to the personal information of millions of Facebook users and...
European Identity & Cloud Awards Ceremony
Event Recording
European Identity & Cloud Awards Ceremony
European Identity & Cloud Awards Ceremony
Martin Kuppinger - The Future Model of Identity: Blockchain ID and the Digital Transformation
Event Recording
Martin Kuppinger - The Future Model of Identity: Blockchain ID and the Digital Transformation
Distributed Ledger Technologies ("Blockchain") are the foundation for the most disruptive changes to business we are either already observing or that are on the road to becoming a reality. Based...
Previous
8 9 10 11 12 13 14 Next