News Archive

Webinar

Sep 27, 2018: Making Sense of the Top 5 Latest Cybersecurity Trends

Let’s face it: with each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of their IT infrastructures mean that the attack surface for hackers and malicious insiders is increasing as well. Combined with the recent political developments such as the rise of state-sponsored attacks, new surveillance laws, and harsh privacy regulations, security professionals now have way too many things on their hands that sometimes keep them awake at night.

Executive View

Executive View: CA Privileged Access Management Suite - 79047

CA Technologies offers comprehensive Privileged Access Management (PAM) under CA Privileged Access Management Suite comprising of several modules bundled in a single product. The CA PAM solution blends well with CA’s popular IAM Suite to offer market leading PAM capabilities for large scale deployments requiring complex integrations and fine-grained command control.

Webinar

Sep 26, 2018: Access Control From an Userbase to Agency Applications in the Education Sector

The Ministry of Education in New Zealand can now control access from a wide user base to agency applications in the education sector.

Executive View

Executive View: TechDemocracy Intellicta - 70362

A software platform designed to achieve a holistic assessment of an organization’s cybersecurity, compliance, risk and governance status by establishing risk governance, resilience and protection from cyber threats through the deployment of a standards-based risk governance framework.

Executive View

Executive View: ViewDS Cobalt - 70851

ViewDS Cobalt is a cloud-architected identity platform flexible enough to support on-premises, cloud, and hybrid environments. With all aspects of the platform management fully accessible via APIs, Cobalt is uniquely positioned to support the automation and integration requirements of today’s modern IT environment.

Executive View

Executive View: Senrio Insight - 72525

Senrio Insight is an Industrial IoT cybersecurity platform utilizing passive nonintrusive network device discovery to provide visibility and analytics of industrial device behavior and rapid detection of abnormal activities.
 

Webinar

Oct 11, 2018: Buying Into Zero Trust? What You Need to Consider to Be Successful

As organizations take on the digital transformation, trends such as mobility, proliferation of SaaS applications and cloud infrastructure are driving up the number of connected entities and devices increasing the attack surface. With the spate of recent acquisitions in the market looking to change the way we approach security, we need to think beyond the technology and focus on the gaps we need to consider.

Executive View

Executive View: WidasConcepts cidaas - 79057

WidasConcepts offers a complete consumer identity and access management solution:  cidaas.  cidaas is developed and hosted in Germany. cidaas contains most standard and many innovative features, such IoT integration and consent management.  It is based on a micro-services architecture which enables continuous deployment of service enhancements.

Executive View

Executive View: CipherCloud CASB+ - 79037

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. This report provides an up to date review of CipherCloud CASB+ which strongly matches KuppingerCole’s recommended functionality for CASBs. It provides a valuable tool that organizations can use to improve governance over their use of cloud services. 

Webinar

Oct 02, 2018: Customer Identity Access Management (CIAM): Creating the Foundations for User Focused Digital Business, GDPR Compliant

Digital Business Transformation is a continuous process that affects all areas of doing business, with technology finally getting the right focus: The customer and his/her experience with your business. It is now all about providing that ultimate Frictionless CX (customer experience) so that users don't do that “one-click” towards your competitors.

Executive View

Executive View: Semperis Directory Services Protector for Active Directory - 79054

Active Directory provides critical identify infrastructure for the enterprise. Semperis offers Active Directory change monitoring and forest recovery products. The Semperis DS-Protector product support change monitoring and rollback for a broad set of AD infrastructure objects.

Webcast

Welcome to the European Identity & Cloud Conference 2019

Learn all you need to know about the future of information security today!

Webcast

Jonathan Sander - Starting Real Cybersecurity Means Protecting Credentials

An Expert Stage presentation at the European Identity and Cloud Conference 2018

Webcast

Marc Vanmaele - Empower IAM to Serve your Business Needs

An Expert Stage presentation at the European Identity and Cloud Conference 2018

Executive View

Executive View: 1Kosmos BlockID - 79064

1Kosmos BlockID is one of the first commercial implementations of a blockchain-based identity solution that works for both consumers and employees. It is well thought-out and implements the fundamental concepts of Self Sovereign Identity. It integrates well with existing identity and service providers. While there are still some challenges to solve, BlockID delivers on the promise of Blockchain Identity.

Advisory Note

Advisory Note: Big Data Security, Governance, Stewardship - 72565

An ever-increasing number of devices, sensors and people are connected to the global internet and generate data.  The analysis of this data can help organizations to improve their effectiveness and make better decisions.  However, there are concerns over the trustworthiness of the data as well as the ethics of its use.  This report describes how good Information Stewardship helps to ensure that Big Data is used in ways that are ethical, compliant and secure.  

Blog

Decentralized Identity 101: What It Is and Why It Matters

Guest Author: Vinny Lingham, CEO, Civic Technologies Bitcoin. Blockchain. Crypto. Decentralization. Tokens. A lot of buzzwords have emerged alongside the rise of blockchain technology. Yet, there is often a lack of context about what those terms actually mean and the impact they will have. Decentralized identity re-envisions the way people share access, control, and share their personal information. It gives people power back over their identity. Current identity challenges all tie back to the way we collect and store data. The world has evolved from floppy disks to the Cloud, but...

Executive View

Executive View: MinerEye Data Tracker - 79063

MinerEye DataTracker is an AI-based application that identifies, classifies, and tracks unstructured information. It creates cluster of similar content across data sources and analyzes information about classified data in those clusters, to triggers applications such as DLP, IRM and Access control tools. It also provides deep insight into unstructured data based on sophisticated dashboards. With that, MinerEye Data Tracker can form a substantial element in a Data Governance strategy.

Executive View

Executive View: StealthINTERCEPT® - 70367

Cyber criminals regularly exploit vulnerabilities and poor practices around Microsoft Active Directory to obtain credentials that allow them to infiltrate organizational systems, cause damage and exfiltrate data.  This report describes StealthINTERCEPT, the real-time policy enforcement, change and access monitoring and Active Directory security component of the STEALTHbits’ Data Access Governance Suite, that helps organizations to protect against these forms of cyber-attack. 

Blog

Entrust Datacard Acquisition

Entrust Datacard, founded in 1969 and headquartered in Minnesota, announced today that it is making a strategic investment in CensorNet and acquiring the SMS Passcode business from CensorNet (originally a Danish company). Entrust Datacard is a strong brand in IAM, with card and certificate issuance, and financial and government sector business.  CensorNet was founded in 2007 in the UK. Their original product was a secure web gateway. It now includes multi-mode in-line and API-based CASB service. It...

Webinar

Sep 13, 2018: Prepare for PSD2 with Strong Customer Authentication, Fraud Risk Management and Open Banking APIs

Banks will soon have to comply with the Revised Payment Service Directive, commonly called "PSD2." The directive will introduce massive changes to the payments industry and radically alter the user experience for customers of European banks by allowing third party payment service providers (TPP) to access their account information to provide various innovative financial services. But to mitigate risk, banks and TPPs must address the core regulatory technical requirements outlined by PSD2.

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Modern Cybersecurity Trends & Technologies Learn more

Modern Cybersecurity Trends & Technologies

Companies continue spending millions of dollars on their cybersecurity. With an increasing complexity and variety of cyber-attacks, it is important for CISOs to set correct defense priorities and be aware of state-of-the-art cybersecurity mechanisms. [...]