News Archive

Executive View

BMC Helix ITSM

BMC Helix ITSM is flexible, scalable and secure IT Service Management application built on top of a no-code platform enables organizations create their own custom apps. BMC Helix ITSM can be deployed on-prem, in the cloud, and a combination of the two. It is also available as a managed service.

Whitepaper

Technical Approaches to Consent Management and Dynamic Access Management: Ping Identity

Privacy regulations are changing the way organizations handle personal information. GDPR was not the first and will not be the last to require data handlers to collect consent from users. Many Consumer Identity platforms have added in consent management features, and specialty Privacy and Consent Management solutions are available to address these evolving business scenarios. In this report, we’ll look at several approaches.

Blog

Privacy Seekers Are Really Looking for Life Management Platforms

Privacy-sensitive users are drawn to solutions with certain features: end-to-end encryption, granular consent, data ownership, and secure storage. But what is it that privacy can really do for users, and is there a non-exploitative business model in it for companies? KuppingerCole envisioned Life Management Platforms back in 2012 as the pathway to individual data sovereignty. Data sovereignty is incrementally being introduced as a right of individuals, with principles being introduced in the European GDPR, the Canadian PIPEDA, the CCPA, and others. While these regulations manage the...

Webcast

Accelerating Your Digital Transformation: Secure and Successful Cloud Migrations

The use of cloud services is one of the key enablers of digital transformation - accelerating time to value, providing more access to powerful IT resources in a more cost-effective manner and removing the management costs associated with commodity services. However, these benefits come with some risks. Migrating your business applications to the cloud without creating security vulnerabilities, unnecessary risks to your data and ensuring compliance, is critical for a successful digital transformation.

Blog

Does Microsoft Double Key Encryption Help with Schrems II?

On July 16th, 2020 the European Court of Justice issued its decision on the adequacy of the protection provided by the EU-US Data Protection Shield for the transfer of personal data for commercial purposes by an economic operator established in an EU Member State to another economic operator established in a third country.  The use of cloud services is now commonplace and has been increased due to the need for working from home due to the coronavirus pandemic.  In addition, unstructured files like documents, spreadsheets and slide decks that are stored in these services often...

Leadership Compass

Database and Big Data Security

This Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection and governance products that best meet your requirements. We examine the broad range of technologies involved, vendor product and service functionality, relative market shares, and innovative approaches to implementing consistent and comprehensive data protection across your enterprise.

Whitepaper

Leveraging Your Organization's Expertise: Departmental IAM Services for the Business

To benefit from existing domain know-how within an organization, it is becoming increasingly important to involve different business stakeholders in administration, review, and maintenance processes. Dedicated, specialized and lean IAM services are a sustainable and efficient approach to achieve this while facilitating a continuous and future-oriented development of modern identity and authorization platforms.

Webcast

KuppingerCole Analyst Chat: Understanding the SolarWinds Incident and Recommended First Steps

The SolarWinds incident made the news in December 2020 and continues to impact many organizations. John Tolbert joins Matthias to give a short introduction of what decision makers need to know at this stage and which measures to look at first.

Market Compass

Digital Workplace Delivery Platforms

The KuppingerCole Market Compass Workplace Delivery covers solutions that assist organizations in managing applications and data that end users access from a “single pane of glass” interface. These can run on existing PC workstations and remote devices including smartphones and tablets. As part of digital transformation these solutions should improve productivity, increase employee satisfaction, and create value in distributed cloud infrastructures. As the world shifts to greatly increased mobile and remote working during and after the global pandemic, Workplace Delivery...

Webcast

Effective Endpoint Security With Automatic Detection and Response Solutions

The realization that cyber-attacks are inevitable has led the cybersecurity industry to shift some of its focus to detection and response rather than prevention in recent years. Therefore, the market for solutions designed to detect attacks on endpoints and respond accordingly has grown significantly. These Endpoint Detection & Response (EDR) solutions look for evidence and effects of malware that may have slipped past Endpoint Protection (EPP) products. EDR tools also perform evaluation of threat intelligence, event correlation, and often allow interactive querying, live memory...

Executive View

SAP Enterprise Threat Detection

In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and operating system level only, but involves business systems such as SAP S/4HANA. Identifying, analyzing, and responding to threats that occur within the application layer is a must for protecting the core business systems.

Executive View

SecurEnds Credential Entitlement Management

Due to the potential impact of security risks arising from a lack of proper access governance controls, access governance has become a vital IAM technology for any organization. SecurEnds Credential Entitlement Management (CEM) simplifies user entitlement activities through automation and insightful analytics, giving organizations control of their user access governance.

Blog

This Is Why We Can’t Have Nice Things

I had no intention to write any blog posts during the holidays or, God forbid, do any predictions for the next year (look how relevant last year’s predictions turned out to be). However, an interesting story involving Ticketmaster, a large American ticket sales company, has caught my eye and made me think once again about my career in cybersecurity. The whole story goes all the way back to 2013, but the details have only recently been unsealed after the company has entered into a plea agreement and agreed to pay a $10 million fine for illegal access to a competitor’s computer...


Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]