News Archive

Leadership Compass

Leadership Compass: Identity Governance & Administration (IGA) - 80063

The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the IGA market, providing you a compass to help you find the products that can meet the criteria necessary for successful IGA deployments.

Executive View

Executive View: SailPoint Predictive Identity - 80124

SailPoint Predictive Identity is a SaaS platform that adds AI-based capabilities to IGA. These include analysis of access risks, recommendations for approving or revoking entitlements during access review, and automated optimization of access models, amongst others. The solution provides significant improvements in user experience of IGA, compared to traditional IGA approaches, while also delivering “explainable AI”, informing about why certain recommendations are given.

Blog

KuppingerCole Analyst Chat: The Dark Side of the API Economy

Matthias Reinwarth and Alexei Balaganski discuss the challenges of explosive API growth without proper security controls in place.

Webcast

Access all Apps with Azure AD: A Single Identity Solution for Secure Access

Most businesses already rely on Azure Active Directory for secure, seamless access to Microsoft services like Office 365 and Azure. But with more applications being used than ever before, organizations are asking themselves what bigger role Azure Active Directory can play in securing their entire application ecosystem. Today, secure application access is a key challenge organizations face when implementing a Zero Trust strategy. Applications can live anywhere – in the cloud, on-premises, as a service, or on a mobile device – and are used from anywhere, at any time by...

Webcast

KuppingerCole Analyst Chat: The Dark Side of the API Economy

Matthias Reinwarth and Alexei Balaganski discuss the challenges of explosive API growth without proper security controls in place.

Blog

Why IAM From the Cloud is the New Normal

Martin Kuppinger explains the benefits of Identity and Access Management delivered from the cloud.

Webcast

The Security & Identity Challenges of Modern IT: Agile IT & DevOps Done Right & Secure

Security and identity must evolve in order to support today’s IT. While traditional IT appears being rather simple to secure, current security risks necessitate a greater degree of agility: shifting to DevOps paradigms, implementing a CI/CD chain, running services in hybrid cloud environments (or wherever else). This requires a security angle on DevOps, which you might name DevSecOps. Such an approach includes security and identity as a service, which has been referred to in the past as Application Security Infrastructures. It requires adequate protection of both the DevOps tools...

Webcast

Why IAM From the Cloud is the New Normal

Martin Kuppinger explains the benefits of Identity and Access Management delivered from the cloud.

Blog

Security Should Not Become a "Business Disabler"

Webcast

Security Should Not Become a "Business Disabler"

Blog

KuppingerCole Analyst Chat: Making IAM Projects Succeed - Why You Need a Solution Architecture

Matthias Reinwarth and Graham Williamson are talking about designing an IAM project architecture.

Webcast

KuppingerCole Analyst Chat: Making IAM Projects Succeed - Why You Need a Solution Architecture

Matthias Reinwarth and Graham Williamson are talking about designing an IAM project architecture.

Blog

CoronaApp: Time to Act Now, Not to Talk

Kuppingercole's Principal Analyst Martin Kuppinger gives his opinion on problems and arguments surrounding various apps for tracking the spread of the virus. And privacy is not the biggest challenge here... You can watch his speech in English or in German below.

Blog

KuppingerCole Analyst Chat: Fraud Reduction Intelligence Platforms

Matthias Reinwarth and John Tolbert explain the meaning behind the term and talk about various factors that help identify fraudulent transactions in different industries.

Webcast

Managing a Crisis: Prepare for Weathering the Next Storm to Come

While the Covid-19 crisis is still in full effect, many businesses have mastered the first phase of disruption. Now, the time starts to plan for the future, at many levels – financials, business models, product strategies, and more. One of these topics must be Business Continuity & Resilience Management (BCRM), for being better prepared for weathering the next storm to come. And that will come, be it the next peak of Covid-19, be it a major natural disaster hitting your business, be it – and that is the one with the highest probability – a severe cyberattack. And...

Webcast

CoronaApp: Time to Act Now, Not to Talk

Kuppingercole's Principal Analyst Martin Kuppinger gives his opinion on problems and arguments surrounding various apps for tracking the spread of the virus. And privacy is not the biggest challenge here...

Webcast

KuppingerCole Analyst Chat: Fraud Reduction Intelligence Platforms

Matthias Reinwarth and John Tolbert explain the meaning behind the term and talk about various factors that help identify fraudulent transactions in different industries.

Executive View

Executive View: IBM Watson - 80232

IBM Watson is a computing platform that aims to meet the AI needs of any organization – those that wish to develop projects themselves, or those who wish to gain standard capabilities quickly. The comprehensive attention to data management, analytics, model training, deployment, and lifecycle management make the portfolio of IBM Watson products a strong choice for enterprises.

Leadership Brief

Leadership Brief: Mitigating Availability & Security Risks in Centralized Digital Workplace Delivery - 80223

Centralizing delivery of digital workplaces can bring cost, efficiency and productivity rewards but security and risk management must be baked in if availability is not compromised by cyber attacks or unexpected disruption.

Blog

Cybersecurity of Tomorrow: Delivered Entirely From the Cloud

As businesses embrace the Digital Transformation and become increasingly cloud-native, mobile and interconnected, the corporate network perimeter is gradually disappearing, exposing users to malware, ransomware, and other cyber threats. Traditional perimeter security tools no longer provide adequate visibility, threat protection, and scalability, nor can they offer convenience and productivity for users on the go. In a crisis, a cybersecurity strategy is a matter of survival The previous paragraph summarizes what KuppingerCole, along with many other industry experts, has been preaching...

Blog

Sind die BSI Richtlinien für Gesundheitsanwendungen richtig und ausreichend?

Nie war Digital Healthcare so wichtig wie heute, in Zeiten von COVID-19. Das Bundesamt für Sicherheit in der Informationstechnik (BSI) hat eine Richtlinie für sichere Anwendungen im Gesundheitswesen vorgestellt. Richtig und wichtig, auch Security by Design und Privacy by Design für die Vertraulichkeit sensitiver Daten. Nur: Ohne ausreichende Budgets wird es nicht funktionieren.

Virtual Event

Jun 16, 2020: Cloud First - Strategy & Roadmap

This KuppingerCole Virtual Event will help you navigate the tough decisions your company has to make in pursuing a cloud-first strategy and provide answers to complex questions to help identify a clear path ahead and ensure your business gains maximum benefit from a well-planned and carefully considered strategy.

Virtual Event

Jun 02, 2020: Cybersecurity & Enterprise Risk Management

In this Virtual Event, you will learn about current trends and developments in cybersecurity and how to minimize cyber risks in your enterprise.

Webcast

Sind die BSI Richtlinien für Gesundheitsanwendungen richtig und ausreichend?

Webcast

Die Krise bewältigen: So überstehen Sie den nächsten Sturm

Während die Covid-19-Krise noch in vollem Gange ist, haben viele Unternehmen die erste Phase des Umbruchs gemeistert. Jetzt ist es an der Zeit, auf vielen Ebenen – Finanzen, Geschäftsmodelle, Produktstrategien und mehr – für die Zukunft zu planen. Eines dieser Themen muss das Business Continuity & Resilience Management (BCRM) sein, um besser auf den nächsten Sturm vorbereitet zu sein. Und der wird kommen, sei es der nächste Anstieg von Covid-19, sei es eine große Naturkatastrophe, die Ihr Unternehmen trifft, oder sei es – und das...

Blog

Zero Trust Paradigm for the Future of Security

Martin Kuppinger explains the meaning behind the popular buzzword.

Webcast

Zero Trust Paradigm for the Future of Security

Martin Kuppinger explains the meaning behind the popular buzzword.

Executive View

Executive View: Soterion for SAP - 80113

Soterion for SAP is a GRC (Governance, Risk & Compliance) solution targeted at SAP environments and delivering major capabilities in that space. The solution is available as both on premises solution and in an as-a-service model. Soterion has put specific emphasis on delivering a solution for GRC and access control in SAP environments that is easy-to-use, coming with a business-friendly user interface.s

Whitepaper

Whitepaper: Fast Access Management in the Hybrid Cloud for SMBs - 80137

Moving to the cloud sets new challenges for managing access to critical IT environments for small and medium-size businesses (SMBs). These include managing access to multi-cloud services that are used on-demand but discarded when no longer needed, finding a scalable solution without big IT projects and costs, and managing administrative access with limited resources. At the same time, organizations must ensure subcontractors get the right level of privilege for the task at hand but don't walk away with access credentials. SMBs must also protect the company from privileged credential...

Webcast

AI Governance From a Practical Perspective

How can you ensure that your Artificial Intelligence project does not become a liability? An improper implementation, a socially insensitive data label, or negligent data management can easily lead to an auditing nightmare. What are the best practices to safely utilize and govern AI? This webinar highlights key considerations when implementing an AI application, particularly for use in IAM. Learn the key questions to ask when implementing an AI project so that governance and audits do not become an issue later.  Many AI projects falter or fail when they encounter a governance...

Blog

KuppingerCole Analyst Chat: Five Key Topics for Cybersecurity

Matthias Reinwarth and Martin Kuppinger identify the key topics for cybersecurity in the times of crisis.

Webcast

KuppingerCole Analyst Chat: Five Key Topics for Cybersecurity

Matthias Reinwarth and Martin Kuppinger identify the key topics for cybersecurity in the times of crisis.

Blog

KuppingerCole Analyst Chat: Beyond Prevention - the Bigger Picture of Cyber Security

Matthias Reinwarth and Christopher Schütze are taking a look at five different phases of cyber security.

Webinar

May 13, 2020: Beating Fraudsters at Their Own Game With Fraud Reduction Intelligence Platforms

Fraud continues to be a major challenge for many organizations today. Industries such as finance, banks, payments, insurance, gaming, telecommunications, health care, etc. are dealing with increasing amounts of fraud and escalating sophistication of attacks. Account Takeovers (ATOs), synthetic fraud, and bots are a pervasive problem and continue to drain revenue from many businesses.

Webcast

A Compass for Choosing the Right Fraud Reduction Intelligence Platform

Companies are turning to Fraud Reduction Intelligence Platforms to reduce account takeover (ATO), synthetic fraud, bots, and other forms of fraud, which continue to be a pervasive and revenue-draining problem across many industries.

Webcast

KuppingerCole Analyst Chat: Beyond prevention - The Bigger Picture of Cyber Security

Matthias Reinwarth and Christopher Schütze are taking a look at five different phases of cyber security.

Executive View

Executive View: Hitachi ID IAM Suite - 80399

Enterprise IAM suites today need to meet an ever-growing list of IT requirements, which includes process automation, self-service, and identity-related administration and governance capabilities. Hitachi ID offers a well-integrated all-in-one IAM package that can meet these enterprise business requirements.

Executive View

Executive View: Sophos Intercept X - 80227

Sophos Intercept X is an endpoint security solution that is powered by a deep learning neural network, anti-exploit techniques, and anti-ransomware technology to provide advanced detection for all types of threats, especially ransomware, fileless/in-memory malware and malware that exploits unknown vulnerabilities in operating systems and application software.
Sophos Intercept X also offers optional integrated Endpoint Detection and Response response capabilities as well as Managed Threat Response services.

Blog

AI Landscape: More Complicated Than You Might Have Thought

I’m by no means an AI expert. Sure, I’ve been following the topic with much curiosity ever since reading an article about thinking machines back in 1990. Also, having a degree in mathematics sometimes helps to understand certain technicalities behind product labels. Still, I’m neither an AI developer nor a data scientist – I’m just an industry analyst whose primary job is to understand what new technologies and services appear on the market and to explain them to people who know even less than I do… Dispelling Myths When it comes to the recent media...

Blog

What Role Is Artificial Intelligence Playing During the COVID-19 Pandemic?

Novel coronavirus has impacted almost every country in the world. Millions have been infected, while fatalities caused by Covid-19 recently exceeded 100 thousand. Governments, science institutions and private companies are, among other methods, using Artificial Intelligence to find optimal ways of tackling the pandemic. Searching for the cure Using AI for finding novel drugs is not new. For several years now, large pharmaceutical companies have been collaborating with start-ups and established vendors for faster and optimal search for the desired medicine. AI has even been used to find...

Blog

Why Adaptive Authentication is the Future

Martin Kuppinger explains adaptive authentication.

Blog

COVID-19 Contact Tracing: Privacy Is not the only Challenge

In the UK there are plans to use a mobile ‘phone app to trace people who have been in contact with someone who has COVID-19 to warn them to go into quarantine in order to slow the spread of the virus. This approach is reported to have been successful in other countries, but it has raised concerns over individual privacy and how the government might use the data. However, while data analytics and other techniques can help with the pandemic privacy is not the only challenge. Quarantine Works Plagues are not new, and history has taught us that the most effective response to a plague is...

Webcast

Why Adaptive Authentication is the Future

Martin Kuppinger explains adaptive authentication.

Whitepaper

Whitepaper: Enhanced Privilege Access Management Solutions - 80176

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Changing business practices, agile software development and digital transformation has meant that PAM solutions need an enhanced set of features to reduce the risk of privileged accounts being hijacked in this more challenging operating environment.

Blog

KuppingerCole Analyst Chat: Setting Your Cybersecurity Priorities Right

Matthias Reinwarth and Martin Kuppinger explain what you could be doing wrong with regards to cybersecurity priorities.

Webcast

KuppingerCole Analyst Chat: Setting Your Cybersecurity Priorities Right

Matthias Reinwarth and Martin Kuppinger explain what you could be doing wrong with regards to cybersecurity priorities.

Blog

KuppingerCole Analyst Chat: Protecting Your Organization Against Ransomware

Matthias Reinwarth and Alexei Balaganski discuss the history of ransomware and the measures needed to protect yourself against it.

Webcast

KuppingerCole Analyst Chat: Protecting Your Organization Against Ransomware

Matthias Reinwarth and Alexei Balaganski discuss the history of ransomware and the measures needed to protect yourself against it.

Executive View

Executive View: Indeed Certificate Manager - 80178

Indeed Certificate Manager is a platform for centralized management of enterprise public key infrastructures. Its modular, hardware-agnostic architecture and innovative remote management capabilities help reduce management costs, improve productivity, and strengthen your company’s overall security and compliance posture.

Leadership Brief

Leadership Brief: Managing Non-Human Identities - 80278

As digital transformation gains momentum, new types of digital identity are emerging and growing rapidly. Identity management has traditionally focused on human identities, but non-human identities are proliferating and must not be overlooked. This Leadership Brief looks the importance of managing non-human and human identities in the same way, and how to approach achieving that.

Webinar

Apr 22, 2020: Die Krise bewältigen: So überstehen Sie den nächsten Sturm

Während die Covid-19-Krise noch in vollem Gange ist, haben viele Unternehmen die erste Phase des Umbruchs gemeistert. Jetzt ist es an der Zeit, auf vielen Ebenen – Finanzen, Geschäftsmodelle, Produktstrategien und mehr – für die Zukunft zu planen.

Webinar

Apr 23, 2020: Managing a Crisis: Prepare for Weathering the Next Storm to Come

While the Covid-19 crisis is still in full effect, many businesses have mastered the first phase of disruption. Now, the time starts to plan for the future, at many levels – financials, business models, product strategies, and more.

Congress

May 18 - 21, 2021: European Identity & Cloud Conference 2021

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Blog

IAM Projects Stalling – Too Tools-Centric

Martin Kuppinger explains the reasons why so many Identity and Access Management projects can stall or even fail.

Webcast

IAM Projects Stalling – Too Tools-centric

Martin Kuppinger explains the reasons why so many Identity and Access Management projects can stall or even fail.

Press Release

KuppingerCole Cancels EIC 2020 Due to Ongoing Coronavirus Pandemic

Wiesbaden, April 7, 2020 – KuppingerCole Analysts AG officially cancels EIC 2020 due to the ongoing coronavirus pandemic. "Although we couldn’t wait to host you, the safety and health of our speakers, partners, participants, and team is too precious to risk," say Board Member Joerg Resch. "We take the guidance of our public health authorities – global and local – to heart, and have made our decision based on their recommendations."

Advisory Note

Advisory Note: Emerging Technologies Fostering Digital Business Innovation: Utilities & Energy - 80265

The energy and utilities sector will need to adapt to new industry trends of digitalization, decentralization, and the advent of a new type of consumer: the prosumer. Smart grids are a more efficient offering for energy management, and new business models beyond the prosumer will require the partnership of different actors in the industry. Emerging technologies like artificial intelligence (AI), blockchain, and IoT have can contribute to achieving these goals, but they are most impactful as supportive technologies that enable a deeper company transformation.

Blog

PEPP-PT: Bridging the Gap Between COVID-19 Pandemic Control and Privacy by Design

The use of modern information technology, in particular mobile data, is seen as a central measure in containing the current pandemic. However, the Corona App, which is used in South Korea to track the chains of infection, uses a variety of data (GPS, surveillance cameras, credit card data) to track the movements of potentially infected people, and does so in complete disregard of the privacy of those affected. Access to personal mobility data, combined with information on actual infections and diseases, holds the promise of providing better insight into the pathways of infection and the...

Blog

KuppingerCole Analyst Chat: Cybersecurity in the Enterprises in the Age of WFH

Matthias Reinwarth and Martin Kuppinger are discussing the security challenges enterprises are now facing with the majority of employees working from home.

Webcast

KuppingerCole Analyst Chat: Cybersecurity in the Enterprises in the Age of WFH

Matthias Reinwarth and Martin Kuppinger are discussing the security challenges enterprises are now facing with the majority of employees working from home.

Blog

Cybersecurity Awareness Training: Die wichtigsten Punkte in fünf Minuten

Martin Kuppinger spricht über die wichtigsten Aspekte von Cybersecurity, die man als Nutzer beachten sollte.

Leadership Brief

Leadership Brief: The Information Protection Life Cycle and Framework: Control Access - 80372

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the third in the series introducing the Information Protection Life Cycle and Framework.

Executive View

Executive View: Vectra Cognito - 80230

Vectra Cognito is a Network Detection and Response (NDR) platform supported by threat research and Artificial Intelligence (AI) in the form machine learning (ML) and Deep Learning for analyzing enterprise network traffic on premise and in the cloud to detect and respond to malicious activity by adversaries, with threat investigation and threat hunting capability.

Executive View

Executive View: R&S®Trusted Gate von Rohde & Schwarz Cybersecurity - 80400de

Transparente, datenzentrische Sicherheit in nicht vertrauenswürdigen Infrastrukturen. Zuverlässige Kontrolle und Überwachung von sensiblen Informationen, die in öffentlichen Clouds und Kollaborationswerkzeugen (z.B. Microsoft Office 365, SharePoint, Teams) gespeichert sind. Virtualisierung, Verschlüsselung und Aufteilung von Daten, um eine sichere und bequeme Zusammenarbeit für Multi-Cloud-, firmeninterne und hybride Speicherumgebungen und echte Datensouveränität zu ermöglichen. 

Webcast

Cybersecurity Awareness Training: Die wichtigsten Punkte in fünf Minuten

Martin Kuppinger spricht über die wichtigsten Aspekte von Cybersecurity, die man als Nutzer beachten sollte.

Blog

IAM Projects Stalling – Too Big to Win

Martin Kuppinger explains the reasons why so many Identity and Access Management projects can stall or even fail.

Blog

Working Securely at Home During the Pandemic

Working securely at home during the pandemic As more people are working from home than ever before, there is an increasing demand for communication services. But security needs to be a key consideration as businesses adapt to a new way of working, as my colleagues John Tolbert, Matthias Reinwarth, and Alexei Balaganski have pointed out in their recommendations on responding to the Covid19 pandemic. The move to cloud is obvious For many organizations, meeting the challenges presented by the pandemic means making a quick move to the cloud, but as Matthias points out, this must be managed...

Webcast

IAM Projects Stalling – Too Big to Win

Martin Kuppinger explains the reasons why so many Identity and Access Management projects can stall or even fail.

Blog

KuppingerCole Analyst Chat: How to Protect Data in a Hostile World

Matthias Reinwarth and John Tolbert are talking about the challenges of data protection in modern times.

Webcast

KuppingerCole Analyst Chat: How to Protect Data in a Hostile World

In the first official episode of the KuppingerCole Analyst Chat podcast, Matthias Reinwarth and John Tolbert are talking about the challenges of data protection in modern times.


Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]