News Archive

Executive View

Executive View: Securonix Security Analytics Platform - 72507

Securonix Platform provides advanced security analytics technology for collecting, analyzing and visualizing a wide range of business and security information, converting it into actionable intelligence and serving as a basis for a broad portfolio of specialized security solutions.


How to easily expand Identity & Access Management to the Cloud

Trying to find the right access security solution has always been a complex task. It is, however, even more challenging when the existing web access management solution is not sufficient anymore.


Dec 13, 2016: Cloud IAM – get the full picture to make a real win out of a quick win!

Cloud IAM, or IDaaS, is a rapidly growing market segment. This growth is driven by a variety of business cases, ranging from operational advantages and better support for employees accessing cloud services to the flexible integration of business partners and consumers in the age of digital…


Cloud-Risiken jederzeit rundum mit zentralen Dashboards kontrollieren

Organisationen weltweit stehen vor den gleichen Sicherheitsherausforderungen. Sie müssen Mitarbeitern ermöglichen, mit einer Vielzahl von Endgeräten über die Cloud auf Dienste zuzugreifen, um auch außerhalb der Unternehmensmauern überall und jederzeit produktiv ihren Aufgaben nachgehen zu…


The Future of Data-Centric Security

Business boundaries are dissolving as the ability to share information improves. For example, in agile and collaborative working environments, information has to be shared efficiently and securely between various internal and external business partners, mainly via cloud services and with…

Press Release

Save The Date – Consumer Identity Summit, 22 to 23 November 2016

Wiesbaden, 18 October 2016 – For the first time the Consumer Identity Summit 2016 will take place from 22nd to 23rd November 2016 at the Palais Brongniart in Paris France. The event is one of the first collaborative events between CXP Group, the independent European…

Executive View

Executive View: Emerging Threat Intelligence Standards - 72528

Threat intelligence is a vital part of cyber-defence and cyber-incident response. To enable and automate the sharing threat intelligence, OASIS recently made available the specifications for STIX™, TAXII™ and CybOX™ as international open standards. This report provides an…

Advisory Note

Advisory Note: Rising to the Security Challenge of Heavy Cloud Adoption - 72542

Many enterprises have decided on a “cloud first” strategy, or have seen heavy cloud adoption evolve spontaneously as their business units embrace cloud for cost savings, agility or other competitive imperatives. Security teams face challenges controlling, influencing or enabling…


Big Data – Bigger Risks?

Organizations are using Big Data to better understand their customers, to improve their products and to optimize their operations. However, Big Data technologies were conceived and designed for scalability and performance rather than security. You need to take steps to secure your Smart…


Rising to the Security Challenge of Heavy Cloud Adoption

Many enterprises have decided on a “cloud first” strategy, or have seen heavy cloud adoption evolve spontaneously as their business units embrace cloud for cost savings, agility or other competitive imperatives. In the course of this development, security teams face difficult challenges…


Nov 17, 2016: Sicherheit in den operativen Systemen der Industrie 4.0

Unter dem Begriff Operational Technology werden die Technologien zusammengefasst, die die Transformation von Waren und Dienstleistungen betreffen, etwa in produzierenden Unternehmen oder bei Energieversorgern (ICS: Industrial Control Systems & SCADA: Supervisory Control and Data Acquisition).


Dec 08, 2016: The Future of Privilege Management – Understanding the Bigger Picture

Privilege Management, the management of accounts with elevated privileges and, in particular, shared accounts, is changing drastically. Providing shared account password management, a privileged Single Sign-On, or restrictions for elevated privileges is no longer sufficient.


Nov 10, 2016: Beyond Usernames and Passwords: 3 Steps to Modern Authentication

There are three simple steps for moving to modern, more secure authentication. Make it convenient. Make it smart. Make it mobile.


State-of-the-Art Privilege Management by Design

The challenges for securely managing and monitoring access to administrative accounts are changing continuously. This is true for business processes, job profiles, legal and regulatory requirements and the underlying IT infrastructure. And it is true for the changing threat landscape.


Cognitive Security: The Future of Cybersecurity is Now

The proverbial Computing Troika that KuppingerCole has been writing about for years does not show any signs of slowing down. The technological trio of Cloud, Mobile and Social computing, as well as their younger cousin, the Internet of Things, have profoundly changed the way our society…


Cognitive Security – the next big thing in security?

There are good reasons for the move towards “Cognitive Security”. The skill gap in Information Security is amongst the most compelling ones. We just don’t have sufficient skilled people. If we can computers make stepping in here, we might close that gap. On the other hand,…


Cybersecurity is in Crisis

Intel Security recently released an in-depth survey of the cybersecurity industry, looking at causal agents of the low availability of people with training and professional accreditation in computer security. The global report titled “Hacking the Skills Shortage” concludes:…


How can we help you

Send an inquiry

Jennifer Haas, Communications Manager:
+49 211 23707731

Mo – Fr 8:00 – 17:00

Stay Connected


Learn more

Real-Time Security Intelligence & Big Data in Security

Traditional tools are still widely deployed by many organizations and in certain scenarios serve as a useful part of enterprise security infrastructures, but recent trends in the IT industry have largely made them obsolete. Continued deperimeterization of corporate networks because of adoption of cloud and mobile services, as well as emergence of many new legitimate communication channels with external partners has made the task of protecting sensitive corporate information more and more difficult. The focus of information security has gradually shifted from perimeter protection towards [...]