KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Sharelock is an Identity-centric threat detection and response platform based on the behavioural analysis of machines and users. Sharelock detects the unpredictable, learns, evolves and reacts continuously to Identity-centric Threats. Sharelock can ingest any dataset in real-time (e.g. SaaS application via APIs such as MS365, GSuite) or traditional on-prem log ingestion format (e.g. Syslog, Filebeat, CEF). Sharelock was founded in 2017 by a team of serial Identity & Security entrepreneurs with a proven track record of building innovative technology and scaling it globally (CrossIdeas, acquired by IBM)
Join experts from KuppingerCole Analysts and AI-assisted behavioral analysis firm Sharelock as they discuss why Identity Threat Detection & Response (ITDR) is a crucial component of an overall Identity & Access Management (IAM) strategy, why Cloud Workload Protection (CWP) is a growing security concern, and how these issues can be addressed.
Martin Kuppinger, Principal Analyst at KuppingerCole will explain why we need to get better at protecting the digital identities of human and non-human actors in an age where the majority of cyber-attacks is identity-based, and why we need AI to be successful.
Andrea Rossi, Senior Identity & Cybersecurity expert at Sharelock will introduce the Sharelock behavioral anomaly detection platform and describe how ITDR platforms can augment IAM controls to identify potential security breaches and take preventive actions. He will also explain how a combination of ITDR and CWP can address run-time DevOps security requirements.