News Archive

Buyer's Compass

Buyer’s Compass: Unified Endpoint Management

Unified Endpoint Management refers to comprehensive solutions with capabilities that support a range of endpoint types. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will help prepare your organization to conduct RFIs and RFPs for Unified Endpoint Management.

Leadership Compass

Datenbank- und Big-Data-Sicherheit

Dieser Leadership Compass bietet einen Überblick über den Markt für Datenbank- und Big-Data-Sicherheitslösungen sowie einen Leitfaden und Empfehlungen für die Wahl von denjenigen Produkten zum Schutz und zur Verwaltung vertraulicher Daten, die Ihre Anforderungen am besten erfüllen. Wir betrachten das breite Spektrum der beteiligten Technologien, die Produkt- und Servicefunktionalitäten der Anbieter, die relativen Marktanteile und innovative Ansätze zur Implementierung eines konsistenten und umfassenden Datenschutzes in Ihrem Unternehmen.

Executive View

Cysiv SOCaaS

Cysiv SOCaaS is a Security Operations Center (SOC) as a Service offering based on Cysiv's cloud-native, co-managed platform that is highly scalable, supports multi-tenancy, and ingests telemetry from any source that generates logs.

Webcast

Expert Chat: Interview with Thomas Malta

Webcast

KuppingerCole Analyst Chat: Applying The Zero Trust Principle To The Software Supply Chain

Martin Kuppinger is one of the founders and the principal analyst of KuppingerCole and he is steering the overall development of the topics covered in KC's research, events and advisory. He joins Matthias to talk about the importance of extending Zero Trust to cover software security, for software in any form (embedded, COTS, as-a-service) and regardless of whether it’s home-grown or externally procured.

Blog

The Road To CIAM Success – Why an Identity Fabric Powers Digital Transformation

The Ugly Face of Yesterday’s CIAM We all have multiple different personas. But before we put on our hats as identity “experts” -  either as architects, implementers or vendors - let us start by simply being consumers.  Consumers of online services for banking, e-commerce, education, entertainment, and more.  And by thinking as consumers, we can all tell endless stories of poor user experiences with respect to using those services. Those poor user experiences are essentially putting an invisible barrier to entry to the applications and goods we wanted to...

Buyer's Compass

Buyer’s Compass: SOAR

Security Orchestration Automation & Response (SOAR) refers to comprehensive solutions with capabilities that support a range of security tools and data sources. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will help prepare your organization to conduct RFIs and RFPs for SOAR solutions.

Webcast

Filipi Pires: Trust or Not Trust? Is there new mindset about CyberSecurity using Zero Trust?

Webcast

Dimitri Lubenski, Dr. Jan Herrmann: The Role of IAM within Zero Trust Architectures at Siemens

Webcast

Roger Halbheer: Zero Trust - Security Through a Clearer Lens

Join us to understand how Zero Trust transforms your security strategy and makes you more resilient to a range of attacks. We will share a roadmap for leaders, architects, and practitioners, as well as talk about some quick wins and incremental progress on this journey.

Webcast

Eleni Richter: Zero Trust Use Cases

Webcast

Panel - Zero Trust in the Enterprise

Webcast

Henk Marsman: From Trust to Zero - Lessons from Halfway in a Large Enterprise Environment

Webcast

Rebecca Nielsen: What is Strong Authentication in a Zero Trust Environment

Webcast

Scott Rose: Zero Trust 101

Webcast

Matthias Reinwarth: Zero Trust for Reducing the Risks of Security Incidents

Webcast

Panel - Zeroing in on Zero Trust: A Paradigm Shift in Cybersecurity

Webcast

Expert Chat: Interview with Stefan Würtemberger

Webcast

Bryan Meister: Navigating Enterprise Enablement and Zero Trust

Webcast

John Tolbert: Zero Trust for Reducing the Risks of Security Incidents

Webcast

Paul Simmonds: Alignment of Zero Trust with Business Strategy

Whitepaper

Identity Governance Herausforderungen mit ForgeRock Autonomous Identity bewältigen

Die meisten Organisationen sehen den Vorteil von Identity Governance und Administration (IGA), erkennen jedoch, dass es in der Praxis Herausforderungen hat, denn bestimmte Aufgaben sind komplex und schwerfällig. Bestehende IGA-Lösungen kommen dadurch an ihre Grenzen und werden als unzureichend empfunden. Unternehmen benötigen neue, dynamischere Ansätze mit einem hohen Automatisierungsgrad. Künstliche Intelligenz (KI) und maschinelles Lernen (ML) tragen das Versprechen in sich,  Automatisierung für komplexe Aufgaben zu liefern. ForgeRock Autonomous...

Virtual Event

Apr 14, 2021: Balancing SAP Security: Access, Protection, Authorization

Join KC live event to hear experts from the SAP together with invited speakers and moderators talking about the key SAP security concepts and solution, discussing how to navigate the path from traditional SAP Access Control towards the new solutions of SAP, how to integrate SAP security and identity requirements into a broader perspective, and more.

Virtual Event

Jun 23, 2021: Managing Digital Workflows with ServiceNow

Join senior practitioners from research and enterprise as they discuss the current state of ITSM, highlight business opportunities brought about by SerivceNow and demonstrate live use-cases enabled by the platform. IT professionals from enterprise, SMEs, and government institutions - be sure not to miss out on this exciting KCLive event!

Webcast

Where to Start Your IAM Modernization Journey

Many enterprises are nowadays dealing with the modernization of their Identity & Access Management. Modernizing Identity Governance and Administration (IGA) and well as Access Management at the same time can become too complex.

In this video blog post, Martin gives practical advice on how enterprises can get their priorities straight.

Webcast

Privileged Access Management from a CISO Perspective

Privileged user accounts are significant targets for attacks as they have elevated permission, access to confidential data and the ability to change settings. And if compromised, the amount of damage to an organization can be disastrous. No wonder that this is on the mind of our chief information security officers. Join our CEO Berthold and Rob Edmondson, Technology Strategist at Thycotic in this conversation!

Virtual Event

May 27, 2021: Enabling the Future of Identity and Access Management

Join the KCLive Event on the future of identity and access management to learn how to implement an interconnected IAM architecture designed for the post-pandemic era.

Virtual Event

May 11, 2021: Modern IGA Capabilities for Identity-Centric Security

Join the KCLive Event on IGA capabilities for identity-centric security to challenge legacy IGA and get insights on reducing security risk, strengthen compliance and improve efficiency with a modern future-oriented approach.

Webcast

KuppingerCole Analyst Chat: The Need For New Drivers to Improve Cybersecurity

The press, security vendors, politicians and analysts alike currently often focus only on the recent SolarWinds security incident and its exceptional features and effects While this is in fact an extremely important topic to learn from and to clean up, the shadow of this hype causes that at the same time it is often neglected that even very basic cybersecurity aspects are poorly addressed in many organizations. Alexei and Matthias look beyond the hype and discuss the need for new initiatives to achieve an actual adoption of proper measures to improve basic cybersecurity hygiene in...

Whitepaper

Overcoming Identity Governance Challenges with ForgeRock Autonomous Identity

Most organizations see the value of identity governance and administration (IGA). However, they recognize that it has its challenges in practice, with certain tasks being complex and cumbersome. As a result, existing IGA solutions are faltering. Dynamic businesses require new approaches with a high degree of automation. Artificial intelligence (AI) and machine learning (ML) bear the promise of delivering such automation to complex tasks. ForgeRock Autonomous Identity implements such capabilities for ForgeRock and third-party IGA platforms, ensuring that more organizations can use them...

Executive View

HID Global Authentication Platform

HID Global offers robust and highly secure solutions for identity and access management, including physical access controls, smart identity card manufacturing and credential issuance, biometric authentication, and mobile/remote identity proofing. HID Global’s Authentication Platform combines each of these elements into a packaged service that is suitable for B2B, B2C, B2E, and G2C use cases.

Leadership Compass

Privileged Access Management for DevOps

Privileged Access Management (PAM) is an important area of access risk management and identity security in any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But, changing business practices, hybrid IT, cloud and other aspects of digital transformation has meant that users of privileged accounts have become more numerous and widespread. One area in sharp focus is DevOps support which has become essential to many organizations looking to become more responsive and innovative. Application developers and other agile...

Press Release

Move Towards Zero Trust Architectures Accelerated by Coronavirus Pandemic

The coronavirus pandemic has accelerated trends toward Zero Trust (ZT) architectures. Multi-factor authentication (MFA) is often a key technology addition that can help realize Zero Trust as well as decrease risks of insider threat and some types of industrial espionage. Organizations are moving to passwordless and MFA methods to increase security and decrease support costs. These are some key findings of the latest Leadership Compass on Enterprise Authentication by KuppingerCole Analysts AG.

Webinar

Mar 24, 2021: Identity ist kein Selbstzweck – Unternehmenskritische Applikationen mit Identity Security absichern

Die Corona-Pandemie hat die Digitalisierungsbemühungen in der DACH-Region angetrieben, aber auch Grenzen aufgezeigt. Die digitale Identität von Angestellten steht immer häufiger im Fokus des Interesses – sowohl von Sicherheitsbeauftragten als auch von Hackern. Identity Security ermöglicht Compliance über Plattformen und Anwendungen hinweg; sie hilft Komplexität und Kosten in den Griff zu bekommen.

Webinar

Mar 18, 2021: Maturing a Zero-Trust Strategy for the Extended Enterprise

In the digital era, a 20th century perimeter-based approach to security is no longer appropriate or effective in securing the modern extended enterprise. Instead, a more flexible, identity-based approach is required that can be implemented at every layer of IT, from devices and networks to applications and data.

Blog

The Next Level of Zero Trust: Software Security and Cyber Supply Chain Risk Management

The recent SolarWinds incident has shed a light on an area of cybersecurity that is not frequently in focus. Better said, it is “again has shed a light”, if we remember the Heartbleed incident that happened back in 2014. Back then, my colleague Alexei Balaganski wrote in a blog post that “software developers (both commercial and OSS) […] should not rely blindly on third-party libraries, but treat them as a part of critical infrastructure”. What we need is a defined approach and consequent enforcement of what, in a slightly awkward manner, is called C-SCRM or...

Leadership Compass

Enterprise Authentication Solutions

This report provides an overview of the Enterprise Authentication Solutions market and provides you with a compass to help you to find the solution that best meets your needs. We examine the Enterprise Authentication market segment, product/service functionality, relative market share, and innovative approaches to providing modern solutions in this space.

Virtual Event

Apr 28, 2021: Operationalizing Privileged Access Management

Join this KCLive Event to operationalize privileged access management in your enterprise. Gain expert insights into effective credentials management, best practices, PAM for DevOps and deploying PAM in your organization.

Virtual Event

Mar 10, 2021: Rethinking the Risks in Your Software Supply Chain

Join KCLive Vision the 1-hour virtual session combining presentation, interview, and open mic discussion with the audience.

Webcast

KuppingerCole Analyst Chat: The SOCaaS Market Segment - A First Look

The Security Operations Center-as-a-Service (SOCaaS) market has emerged and continues to develop in response to demand for security monitoring, analysis, detection, response, and improvement recommendations either instead of or as a supplement to permanent on-premises SOCs. KuppingerCole Analyst Warwick Ashford joins Matthias for this week's episode and shares some insights into this evolving market segment he gained during his recent research.

Blog

Zero Trust: We’re Nowhere Near the End of the Story Yet

Oh, how time flies! It seems that the whole story of Zero Trust as a revolutionary concept for designing computer networks began just yesterday, but it’s been over a decade already. In fact, the very idea that was later somewhat awkwardly named “de-perimeterization” was being discussed nearly 20 years ago. Back then, in the early 2000s, years before the era of the cloud and ubiquitous presence of smart mobile devices, organizations were already feeling the pressure to reorganize their networks for the digital transformation – establishing communications to their...

Executive View

BeyondTrust Endpoint Privilege Management

Privileged Access Management (PAM), of which Endpoint Privilege Management (EPM) is a part, is an essential component in protecting organizations against cyber-attacks, ransomware, malware, phishing, and data leaks. No longer a tool for protecting admin accounts, privilege management now extends across the entire organization, from on-premises and cloud infrastructure to every user, no matter where are working from, or what they are accessing. A critical role of PAM is controlling the use of privileges, increasingly these days in remote and work-from-home environments. 

Webcast

Dr. Carsten Stöcker: Digital Identity for Enterprises

Webcast

Oliver Terbu: Beyond the Status Quo: Secure Trusted P2P Messaging

Webcast

Raj Hegde, Lauren Zuber: Welcome Session

Webcast

Anne Bailey: Market Compass: What does the Future Require of Identity?

There are several external drivers that are putting pressure on the way we manage identity, made especially clear over the last year: digitalization, privacy, user-centricity, and reuse. Rather than resist the change, let us consider what would happen to identity if we translated these pressures into requirements. Which capabilities are accelerated from the sidelines to being star players? What approaches best fit these future requirements? And how does decentralized identity come into play? In this talk, Anne Bailey will pull from the insights of the upcoming Market Compass...

Webcast

Christoph Burger: Blockchain: From Processes to Hybrid Platforms - The Case of the Energy Industry

Webcast

Helge Michael: IDunion - How to Build a Decentralized Identity Ecosystem

Webcast

Dr. Harry Behrens: How Cryptographically Verified DID-Based Credentials will Transform KYC, Access Control and Ticketing?

Webcast

Panel - Decentralizing the Enterprise: Getting Started

Webcast

Kim Hamilton Duffy: Decentralized Identity: A Quick Survey of the Standards, Use Cases, Approaches, and Pitfalls

Webcast

Pamela Dingle: Timely Disruption - Why is Decentralized Identity Different?

Webcast

Panel - Navigating the Decentralized Identity Landscape: Opportunities and Challenges in the Next Decade

Webcast

Dr. Matthias Artzt: Blockchain and GDPR – Tensions between Blockchain Technology and Data Protection Principles

Webcast

Bruce Pon: Data Monetization Model for the Decentralized Web

Webcast

Marleen Oberheide: Data Ethics: Moving Beyond Privacy into Data Ethics & Trust

Webcast

Ken Ebert: A Stepwise Approach to Deploying Decentralized Identity

Press Release

Inventiveness a Differentiating Factor for Vendors of Access Management Solutions

Vendors of access management solutions are increasingly trying to differentiate themselves from one another. To achieve this, they enhance their solutions in areas such as strong adaptive authentication, dynamic authorization, access intelligence, providing APIs and API security, fraud detection, automation, and using a more modern containerized and microservice-related product delivery.

Leadership Compass

Access Management

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your compass for finding the right path in the market.

Buyer's Compass

Identity Governance & Administration (IGA)

Identity Governance and Administration (IGA) refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets that are now commonly aided by intelligent features. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful on-premises IGA deployments. This document will help prepare your organization to conduct RFIs and RFPs for Identity Governance & Administration (IGA).

Webcast

KuppingerCole Analyst Chat: Post-SolarWinds Software Security Strategies

More than a month into the post-SolarWinds-incident era Alexei joins Matthias to discuss further lessons learned and strategic approaches towards improving security in organizations depending on diverse cyber supply chains and their imminent threats. But they go beyond and look at the necessary changes between management awareness and software development security.


Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]