Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Attack Surface Reduction and XDR
Many if not most organizations have moved to a risk management model for cybersecurity and identity management. Priorities have shifted in two major ways over the last decade: decreasing...
Learn more
Leadership Brief
Leadership Brief
Machine Customers - The Impact of Consumer Bots on Customer Journeys
Machine customers are already present in many markets, driven by trends such as IoT. This leadership brief gives an overview on how to prepare to satisfy the needs of consumer bots and other...
Learn more
Event Recording
Event Recording
Protect APIs Everywhere with Modern Solutions
Attackers follow the money. In a digital economy, this means targeting web apps and APIs to exploit vulnerabilities and abuse business logic, leading to data breach, account takeover, and fraud...
Learn more
Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)
Webinar Recording
Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)
It is all about providing your customer a great experience so that they return to you and not to your competitor, who has never before been that close to your business. Anticipating, maybe even in...
Martin Kuppinger - Microservices Architectures: Making IAM Hybrid
Event Recording
Martin Kuppinger - Microservices Architectures: Making IAM Hybrid
In recent times, an increasing number of vendors announced a migration of their products towards microservices architectures. Some renovate their existing on premises IAM tools, others build new...
Jeff Jonas - Do you Know What You Know About the Data Subject?
Event Recording
Jeff Jonas - Do you Know What You Know About the Data Subject?
GDPR obligates organizations to provide data subjects with access to their personal data. To comply, companies must be able to answer a seemingly innocuous but frighteningly difficult question:...
Tim Hobbs - What Connects DevOps & IAM
Event Recording
Tim Hobbs - What Connects DevOps & IAM
IAM products are highly configurable systems tailored to the diverse needs of customer environments and applications. Modern applications require short development cycles and IAM systems that can...
Joy Chik - Planning for Tomorrow: Connecting Identities for People, Processes, and Things
Event Recording
Joy Chik - Planning for Tomorrow: Connecting Identities for People, Processes, and Things
Social, economic and technological changes are creating urgent new requirements for enterprise identity that enable interconnected digital systems. These new use cases require a governance...
Dr. Torsten George - Zero Trust: Solving IT Security’s Identity Crisis
Event Recording
Dr. Torsten George - Zero Trust: Solving IT Security’s Identity Crisis
Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of...
Naresh Persaud - How to Enable Trust with Interoperable & Shared Credentials
Event Recording
Naresh Persaud - How to Enable Trust with Interoperable & Shared Credentials
The focus of digital identity for consumers and enterprise is to remove silos, minimize redundant effort, enable better collaboration and provide a foundation for regulatory compliance. The...
Prof. Dr. Heiko Beier - Is it Facebook's End Game? Why Social Networks as we know them Today will not Survive
Event Recording
Prof. Dr. Heiko Beier - Is it Facebook's End Game? Why Social Networks as we know them Today will not Survive
The real problem behind the recent Facebook scandal is not primarily that a company like Cambridge Analytica has "gained" access to the personal information of millions of Facebook users and...
European Identity & Cloud Awards Ceremony
Event Recording
European Identity & Cloud Awards Ceremony
European Identity & Cloud Awards Ceremony
Martin Kuppinger - The Future Model of Identity: Blockchain ID and the Digital Transformation
Event Recording
Martin Kuppinger - The Future Model of Identity: Blockchain ID and the Digital Transformation
Distributed Ledger Technologies ("Blockchain") are the foundation for the most disruptive changes to business we are either already observing or that are on the road to becoming a reality. Based...
Prof. Dr. Hans Ulrich Buhl - Unchaining Blockchain
Event Recording
Prof. Dr. Hans Ulrich Buhl - Unchaining Blockchain
Blockchain is much more than the technology behind its still most successful application – the Bitcoin. One of its key attributes is the immutable storage of information. Besides other...
Ralf Oestereich - We will Disrupt You
Event Recording
Ralf Oestereich - We will Disrupt You
We will Disrupt You - Are AI, Blockchain, IoT a Blessing or Curse for an Insurance Company?
Previous
3 4 5 6 7 8 9 Next