News Archive

Executive View

Executive View: Sophos Threat Intelligence - 71681

Sophos offers a range of security solutions as software, appliances and cloud services. These products exploit threat intelligence that is gathered by Sophos Labs, shared in real time between Sophos Next-Gen Firewall and Sophos Next-Gen Endpoint Protection, and integrated through Sophos…

Webinar

Nov 15, 2016: Enabling Cloud Access While Ensuring Security and Compliance

The cloud and mobile revolutions have changed the way we work and the very nature of IT. But these advances have also created immense new challenges and risks to security, data protection and compliance.

Executive View

Executive View: RSA NetWitness Suite - 72516

RSA NetWitness Suite is a security monitoring solution that combines log and network traffic analysis with endpoint-based visibility and automated threat intelligence to detect and investigate sophisticated cyber-attacks. 

Executive View

Executive View: VMware Identity Manager - 71455

VMware Identity Manager bridges the gap between IT Service delivery and access to applications. Available as both an on-premise and a cloud solution, VMware Identity Manager delivers instant SSO to a broad variety of applications and provides contextual experience to VMware WorkspaceOne.

Webinar

Nov 03, 2016: Reinventing Smart Cards for the Modern Agile, Connected Enterprise

Smart cards have been a key part of any IT department’s security and identity management toolkit for over two decades. They are widely used for such operations like two-factor authentication, digital signatures, data encryption or single sign-on. Smart cards are an integral part of every…

Blog

Comment: Know and Serve Your Customer

‘Know your customer’ started as an anti-money laundering (AML) initiative in the financial industry. Regulators insisted that banks establish a customer ‘due-diligence’ processes to ensure that all bank accounts could be traced back to the entities that owned them.…

Blog

KYC is a must, not only for compliance reasons, but what about KYE?

Providing a corporate IT infrastructure is a strategic challenge. Delivering all services needed and fulfilling all requirements raised by all stakeholders for sure is one side of the medal. Understanding which services customers and all users in general are using and what they are doing…

Webinar

Oct 27, 2016: Securing and Proving your Digital Self

We are all living in the era of digitalization, where nearly all processes, business and private, accelerate at an enormous speed. For example, employees are today located in different places on the globe, they use different devices, and do so at any time they need to. For access to…

Webcast

You Thought Shadow IT Was Bad? Meet Your Company's Shadow Administrators

Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard…

Executive View

Executive View: LogRhythm Security Intelligence Platform - 72517

LogRhythm provides a unified security intelligence platform combining next-generation SIEM, log management, network and endpoint monitoring and forensics with full threat lifecycle management and response orchestration.

Quicklinks

How can we help you

Send an inquiry

Jennifer Haas, Communications Manager:
+49 211 23707731

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Learn more

Know Your Customer (KYC)

In order to improve and tighten business relationships, today’s connected businesses need to communicate, collaborate and interact with their customers in a way that’s faster and suppler than ever before. Knowing consumers and their identities spot on also allows to optimally serve them. To use this key to success in the era of digital transformation, enterprises today often think about employing Customer Identity & Access Management (CIAM), complementary to traditional IAM for employees and business partners. They often forget however that, forced by regulation [...]