News Archive

Blog

The Non-Zero Elements of Zero Trust

The ongoing SolarWinds incident illustrates that the much-lauded Zero Trust security paradigm is, in fact, based on trust. Zero Trust is about authenticating and authorizing every action within a computing environment. It is putting the principle of least privilege into action. In an ideal implementation of Zero Trust, users authenticate with the proper identity and authentication assurance levels to get access to local devices, on-premises applications and data, and cloud-hosted resources. Access requests are evaluated against access control policies at runtime. In order for Zero Trust to...

Blog

Attack Surface Reduction and XDR

Many if not most organizations have moved to a risk management model for cybersecurity and identity management. Priorities have shifted in two major ways over the last decade: decreasing attack surface sizes focusing on detection and response technologies instead of prevention only Reducing attack surfaces inarguably improves security posture. Achieving the objective of reducing attack surfaces involves many activities: secure coding practices, vulnerability scanning and management, consolidation of functions into fewer products and services, access reconciliation, user...

Blog

AWS – A new Vision for Hybrid IT?

Attending AWS re:Invent is always an exceptional experience and, despite it being virtual, this year was no different. As usual, there were the expected announcements of bigger better and faster services and components. AWS always shows a remarkable level of innovation with many more announcements than it is practical to cover comprehensively. Therefore, in this blog, I will focus on what I think are some of the highlights in the areas of hybrid IT, edge computing, machine learning as well as security and compliance. There is an old adage – “Keep it Simple Stupid” and...

Executive View

Datamatics TruBot

Datamatics TruBot is a multi-skilled low-code Robotic Process Automation (RPA) solution for automating high volume repetitive tasks and processes. Datamatics currently provides RPA solutions mainly to the banking, healthcare, insurance, manufacturing, and logistics industries.

Webcast

Making Zero Trust Work With the NIST Framework

There’s lots of hype around Zero Trust Security in the context of our changing mobile and cloud-centric working environments. Moving towards a modern and agile Zero Trust security concept is essential in today's mobile first, work-securely-from-anywhere world.

Virtual Event

Feb 17, 2021: Making Zero Trust a Reality

Join the KCLive Event on Zero Trust on February, 17, 2021 to gain expert insights that help you to successfully implement Zero Trust in your organization.

Virtual Event

Mar 16, 2021: IGA for Successfully Managed Identities

Join the KCLive Event on Identity Governance and Administration on March 16, 2021 to discover IGA's core capabilities to enable and protect digital transformation.

Virtual Event

Mar 03, 2021: Identity Fabrics - Future-Proofing IAM

Join the KCLive Event on Identity Fabrics on March 3, 2021 to learn how to elevate overall IAM strategies that enable digital transformation and support innovation.

Webcast

R. Buse Cetin, Tania Duarte: Building Trust in AI: How Pictures can Speak Louder than Words

As the buzz around Artificial Intelligence has increased, so have the issues around trust. There is an increasing polarisation in the discourse around AI, ADS and automation. So what can you do as a tech leader or employee in a company utilising tech, to build trust? Or much more to the point, what can you do to become trustworthy? An important step is to communicate honestly with your customers and stakeholders about the technology you use. However too often organisations fall at the first hurdle due to the damaging visual misrepresentations of AI that accompany their written...

Webcast

Pauli Isoaho: AI in the Things, Logistics & Mobility Ecosystem: Overcoming current Challenges on the Road to Smart Mobility

Webcast

Joris Krijger: Operationalizing AI Ethics

Webcast

Entering the Virtual World With Identity Verification

The way consumers access products and services across sectors has changed forever as interactions move from physical to digital engagement. What started as a change born from convenience, is now a necessity and solidifying into a long-term behavioural shift. As consumers choose to access more goods and services digitally than ever before, it is essential that organisations meet users’ expectations of instant and convenient transactions, or risk losing customers to more customer centric online competitors. 

Virtual Event

Mar 25, 2021: SOARing Towards an Enhanced SecOps Strategy

Join the KCLive Event "SOARing Towards an Enhanced SecOps Strategy" on March 25, 2021 to implement a robust endpoint security strategy in your organization.

Executive View

Simeio Identity Orchestrator

Simeio Identity Orchestrator (IO) is a solution that helps integrate and orchestrate other IAM solutions, while also adding a series of own capabilities. Utilizing Simeio IO, customers can converge existing IAM siloed solutions, that can then be operated by Simeio as an MSP or as an IDaaS. Simeio IO can allow customers to connect and direct their existing IAM infrastructure in a modern and more efficient way.

Virtual Event

Feb 03, 2021: Unlocking Decentralized Identity: A Playbook for Your Enterprise

This KCLive Event on Decentralized Identity goes beyond the hype of blockchain and offers IT leaders an opportunity to gain an in-depth understanding.

Webcast

KuppingerCole Analyst Chat: Innovation in CIAM

John Tolbert joins Matthias and shares insights about the results from the just recently published Leadership Compass CIAM. They talk about the overall maturing of the market and the areas of innovation in products, standards and integration scenarios.

Executive View

Archer Integrated Risk Management

Today’s GRC solutions offer better alignment with corporate objectives, increased transparency, superior information risk management and more cost-effective compliance. This paper looks at the mature Archer Suite which offers a comprehensive range of solutions and features to assist in managing GRC activities for different types of organizations.

Blog

Putting Your First-Line Worker at the Center of Attention

Since the beginning of the Covid-19 crisis, the use of language in public life, in the press, and in everyday life has changed. Terms that were formerly confined to the circles directly affected by them are now much more common. For example, every informed and responsible citizen is now familiar with specific terms from epidemiology and immunology such as “reproduction number” and “herd immunity”. Another term that has risen to prominence since the beginning of the crisis is “first-line worker”. These workers literally work on the front line. They are...

Webcast

The 3 Pillars of Access Control Optimization: IAM, GRC and User Monitoring

Identity & Access Management (IAM) tools are used to automate processes of user lifecycle management and control user access permissions from a single point. We can improve these processes by using conditions and policies, and eventually implementing rule-based access controls (RBAC) and policy-based access controls (PBAC). However, allocating these authorizations might expose the organization to risk if compliance is not taken into account. It is imperative to combine IAM and governance, risk management, and compliance (GRC) in order to verify that access is granted correctly, without...

Webcast

Devesh Raj: Machine Learning System Design: A Different World

Webcast

Identität ist das neue Perimeter: Sichern Sie Zugriff und Nutzung von Cloud-Anwendungen

Da mittlerweile mehr als zwei Drittel aller Beschäftigten remote arbeiten, möchten Unternehmen Ihren Nutzern sichere und flexible Arbeitsmöglichkeiten über alle Plattformen und Geräte hinweg anbieten. Und da sich 85% Ihres Datenverkehrs bereits in der Cloud befindet, schützen Sie Ihre Nutzer und Daten am besten mit Security aus der Cloud. Aber wie?

Webcast

Explore the Cutting Edge of Data-Driven Customer Experience

To accomplish complex and critical missions, market leaders are turning to a new generation of customer data platforms (CDPs). They uncover hidden revenue opportunities by unifying all sources of customer data into comprehensive and actionable profiles.

Blog

MySQL Analytics Engine: Almost Too Good to Be True?

Whether you’re a fan of MySQL or not, you cannot dispute the fact that it is the world’s most popular open-source database by a large margin (incidentally, it’s also the second most popular database ever, behind only its owner Oracle’s flagship commercial product). 25 years after its inception, MySQL has evolved into an essential and truly ubiquitous component of every web application stack and cloud platform. Even though some database experts might frown upon it for lacking “enterprise capabilities”, it is widely used by the largest enterprises around...

Webcast

KuppingerCole Analyst Chat: Verified Digital Identities

Annie joins Matthias to talk about the topic of Verified Digital Identity. They explore what these are, why they are becoming increasingly important and where they add new aspects to the concept of digital identity. A special focus is put on existing and emerging use cases, where verified digital identities can be beneficial to all types of real life entities in their day by day interaction.

Webcast

There Is No Successful Digital Transformation Without Strong Identity Management

2020 will go down in history as the year in which many companies gave their stagnating digital transformation initiatives a big new push. Due to the pandemic, organizations were forced to rapidly scale up their remote working facilities, secure employee-owned devices (Bring Your Own Devices (BYODs) , and maintain a secure environment for enterprise and customer identities . However, when it comes to their identity architecture, the picture is typically fragmented. They may have a general Identity and Access Management (IAM) platform from one company, a Privileged Access Management (PAM)...

Blog

Ivanti’s Zero Trust Journey

Ivanti has completed its acquisition of MobileIron and Pulse Secure. Ivanti, headquartered in Salt Lake City, had its roots in desktop management (LANDESK), evolved into endpoint and patch management, and had added full IT asset, service, and workspace management, as well as IAM capabilities. Though headquartered in North America, Ivanti had already become a global IT solutions provider. Pulse Secure, a strong secure access vendor, was spun-out from Juniper Networks in 2014. MobileIron was dedicated to mobile device management, mobile security, and authentication since it was established...

Webcast

Dr. Danish Rafique: Path to AI Production - A Strategy for Value Creation

Congratulations. Your AI business case is crisp; you already have a data strategy in place; your proof-of-concept looks and feels great; you have the right talent to build the AI product or service which will push your organisation directly into the digital age. Sounds familiar? It is at this stage where most organisations give up on the AI initiatives due to lack of value creation. Why is that, one might ask? The business case was already locked, among other aspects, where's the problem at? One word: Production. AI products and services are notoriously different in terms of production...

Webcast

Sina Brandstetter: Implementing AI Ethics @ Bosch

Webcast

Francesco Stasi: AI-Driven Insights From Historical Customer and Employee Conversations: The Next Frontier for Data-Driven Businesses

Webcast

Peter Voss: The Third Wave of AI

Webcast

Marisa Monteiro Borsboom: Essay on Leadership Blindness on AI and Its Impact on the Digital and Human Transformation - Do We Know What We Need to Know?

Webcast

Priti Padhy: Next Wave AI Transformation with Explainable AI

Over the last year, an unprecedented scale of digital transformation has resulted in exponential growth of organisational data, which could impact decision making. Using machine learning approaches to mine and reason through masses of data is ineffective. In this session you will learn that while the first wave of AI involved many narrow applications, the next wave will help generate a dynamic understanding of relationships and patterns in a corpus of information. This understanding primarily happens through explainable AI.  It will become a key part of enterprise digital...

Webcast

Prof. Dr. Christoph von der Malsburg: AI Beyond Deep Learning

So far, AI relies totally on human intelligence, in the form of human-written programs in classical AI or the human-provided sample data of deep learning.  The pursuit of AI over the last five decades has been caught within a fixed conceptual framework. Given the current level of tremendous attention, investment, technological infrastructure and application potential, maybe we are just a simple fundamental change in perspective away from a tremendous technological explosion.

Webcast

Martin Kuppinger: Where AI, Industrial IoT, Consumer IoT, Blockchain, Decentralized Identity, and Edge Computing Meet

Cybernetix Is What Makes Things Move, From Production to Modern 5G Based Public Infrastructures Cybernetix is not a new discipline. However, it appears being more important than ever before. It is ubiquitous when it comes to AI (Artificial Intelligence). And when AI meets industrial IoT (Internet of Things) and OT (Operational Technology) , it is about the cybernetic model. In contrast to past times, it is about hundreds of signals per second per thing, device, and machine, which needs to be processed and used for optimization. No way doing so without AI. When looking at public...

Webcast

Managing Azure AD – Regardless of How You Use It

Microsoft Azure Active Directory (Azure AD) has gained widespread adoption. Coming with Microsoft Azure Cloud as well as Microsoft 365 (i.e. Office 365), it appears in many organizations just because of decisions made outside of the IAM team.

Webinar

Mar 17, 2021: Enabling Zero Trust With Dynamic Authorization

Increased global competition is driving businesses to adopt new technologies to enhance existing processes and enable new business models, new revenue streams, and greater interactions with partners and customers through Digital Transformation.

Webcast

Zero Trust for the Workforce

While the concept of zero-trust networking is nearly a decade old, the last few years have seen its popularity in industry discussions grow exponentially.

Advisory Note

Redefining Access Governance: A broader perspective

Traditional approaches to Access Governance are no longer fit for purpose due to the complexity of modern IT environments, increased security risk, and growing regulatory compliance requirements.  A new risk-based and policy-based approach is needed to reduce the cost, effort, and complexity of overseeing and enforcing access entitlements, including access reviews and recertification.

Executive View

Elastic Security

Elastic Security is a security platform built on top of the Elastic Stack. It combines security information and event management, threat hunting, endpoint security, and cloud monitoring to help analysts prevent, detect, and respond to cyber threats more efficiently.


Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]