Partner Details

KuppingerCole, founded in 2004, is an international and independent Analyst organization headquartered in Europe. The company specializes in offering neutral advice, expertise, thought leadership and practical relevance in Information Security, Identity & Access Management (IAM), Governance (IAG), Risk Management & Compliance (GRC) as well as all areas concerning the Digital Transformation. KuppingerCole supports companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges. Maintaining a balance between immediate implementation and long-term viability is at the heart of KuppingerCole’s philosophy.

As a core element of KuppingerCole’s research, the company provides different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously research and update the company’s online research library, and perform manufacturer-independent advisory services.

Further, KuppingerCole organizes conferences, workshops, and webcasts in all fields of identity focused on information security, IAM, Cloud, Digital Risk and Digital Transformation. KuppingerCole’s yearly European Identity & Cloud Conference is Europe’s leading event for thought leadership and best practice in this area and covers the latest and future topics regarding the challenges in digital business.

KuppingerCole is the best advisory partner in making your business successful in the era of Digital Transformation.

You will find additional information on our website:
http://www.kuppingercole.com

For the latest news about KuppingerCole follow us on Facebook and Twitter:

KuppingerCole |  @KuppingerCole


 Sponsored Events

Date Title
Oct 16, 2020 Webinar

Webinar KuppingerCole & Kapstone

Details will follow

Sep 27, 2018 Webinar

Making Sense of the Top 5 Latest Cybersecurity Trends

Let’s face it: with each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of their IT infrastructures mean that the attack surface for hackers and malicious insiders is increasing as well. Combined with the recent political developments such as the rise of state-sponsored attacks, new surveillance laws, and harsh privacy regulations, security professionals now have way too many things on their hands that sometimes keep them awake at night.

Jul 05, 2018 Webinar

Patients, People and Things - Managing Identities in Healthcare

Digital transformation is a game changer in the health sector and a core requirement is better identity management. The need for improved security in modern medical facilities, the growing reliance on monitoring devices and support for millennials in their health outcome management, all require improved healthcare IAM. This will eliminate administrative expense, implement up-to-date governance and facilitate the exploitation of known trends in healthcare.

Sep 04, 2017 Webinar

Security Benefits of Cloud Solutions

While organizations are becoming increasingly eager to embrace the cloud for multiple business benefits, for CISOs and CIOs these efforts bring new challenges to understand and evaluate security and privacy impacts by introducing cloud solutions to their enterprises. Adopting cloud services can dramatically improve flexibility and scalability of critical business applications, reduce time-to-market for new products and even unlock completely new business models.

Jul 19, 2017 Webinar

Customer Identity Management (CIAM) - Building the Foundations for a Next-Level User Experience

Digital Transformation is all about following the connected consumer into the new world of digital services, throughout all available channels, highly individualized, privacy aware, compliant and value driven "by design". CIAM describes the underlying infrastructure enabling your business to do so.

Mar 09, 2016 Seminar

How Blockchain Will Influence Your Business

CXP Group and KuppingerCole are pleased to invite you to the first Blockchain Seminar in Paris. The working language of the seminar will be english.

 Videos

Date Language Title
Apr 14, 2021

Britta Simms: Next Generation Cyber Resilient S/4HANA Transformations

Companies are under attack. More and more attacks result in costly and/or high-profile security breaches. The world is currently experiencing a wave of digital transformation, that brings with it not only new levels of complexities such as these, but also offers opportunities for organizations to strengthen their cyber resiliency. Accenture, together with strategic partner Onapsis, have developed an integrated approach to deliver security by design to our clients, at any phase of their digital SAP transformation journeys. This Accenture methodology has embedded security concepts as an integral part of the overarching solution – therefore enabling clients to better understand their respective security implications and opportunities in order to effectively “transform”. In this keynote, Accenture leader Britta Simms, responsible for SAP Platform Security in Europe, will present this joint approach to achieving integrated security by design, as part of the S/4 transformation lifecycle.

Apr 14, 2021

Jochen Fischer: SAP Applications Under Attack! How to Enforce the Three Lines of Defense

Apr 14, 2021

Mastering Today’s SAP Threat Landscape - Joint Interview with Accenture & Onapsis

In order to effectively protect organizations, the constantly changing threat landscape needs to be understood. Threats could initiate from inside or outside of the organization, targeting the infrastructure, applications or users to obtain business critical data. Our panel discussion will focus on the most recent SAP threats, what’s different with the move to S/4, and valuable lessons learned on the importance of an integrated approach. We will talk with Dr. Rene Driessel – SAP Security Lead DACH at Accenture and Frederik Weidemann – Chief Technical Evangelist at Onapsis, to dive deep into today’s SAP security landscape.

Apr 14, 2021

Alex Gambill: The Tricky Business of Protecting Your Assets in SAP: A Holistic Perspective

With 77 percent of the world’s transaction revenue touching SAP ERP systems, these crown jewels have long been the prime target for cybercrime and internal threats due to Separation of Duties (SOD) risks, weak access controls and lack of identity management and governance. Today, a holistic approach to security in SAP—and other business systems—is not a nice-to-have but a must-have. This session will give attendees a deep understanding of the current threat landscape and a 360 0  perspective on what is needed for not only integrated security but also audit and compliance in the complex SAP environment.

Apr 14, 2021

Marco Hammel: How to Avoid Costly SAP Security Pitfalls. Why to Make Security Start With People and Not With Tools

Apr 14, 2021

Panel: SAP Security in Context of a Corporate IT

Mar 26, 2021

Thom Langford: CISOs, Complexity, Containment (and other C-words)

The traditional paradigm of investing in protection of known threats alone has been declining over recent years, as attackers become more adaptable and capable. Combine this with increased threats and attacker ingenuity it is small wonder that a CISO’s role has become more complex. This leads to the inevitability of a security incident where the complex environments and inventive attacks collide. This presentation looks at three fundamentals:   Why traditional protective approaches are no longer effective enough. How complexity has made the CISO’s ability to respond more difficult. The importance of automation in the response process to address this paradigm shift CISOs now face

Mar 26, 2021

Stefan Schinkel: Tomorrow's SOC, Enabled Today with AI-Powered Detection, Prevention and Automation

Mar 26, 2021

Panel: Best Practices to Get Started on Your SOAR Journey

Mar 04, 2021

Simon Moffatt: The Road to CIAM Success: Why an Identity Fabric Powers Digital Transformation

Many organizations are undergoing new modes of operation, which is enabling them to develop a "digital instinct" for their customer's needs.  A correctly designed consumer identity management platform allows those organizations to excel, in an agile, secure, and business-enabling way.  What does success look like in the CIAM world and how do identity fabrics enable it?

Mar 04, 2021

Martin Kuppinger: Interview with Simon Moffatt

Mar 04, 2021

Tobias Urban: The Balance Between User Experience and Security

Logging in is such a common process, it’s easy to take for granted. However, that entry point to your application or service is also when organizations become responsible for the user’s digital identity. And with the increase in innovation, and use of technology to deliver products and services, there is an explosion in the number of sources from which users can gain access. Overlaying all of that is the constant evolution of the threat landscape and regulations that inevitably follow. Tech leaders who want to grow their position in the market must balance two goals: delivering security and customer experience. Join Auth0 as we discuss, and provide some insights on how to utilize a strategic approach to digital identities, that has helped customers such as Siemens, HolidayCheck, and EnBW to: Maintain and improve the user experience Provide an innovative - and differentiated - product or service, that can scale as the business grows Achieve the above two points, while still ensuring security and trust for their customers’ digital identities

Mar 04, 2021

Oliver Krebs: Anchoring Real Identity in a Digital World

In a world where you never meet our customers or employees face to face, it’s critical to anchor their real identity to their digital one. It’s only by doing this that you can securely provision access, verify high-risk actions, and deliver on an experience that keeps them engaged. In this session, Olli Krebs (VP Central EMEA at Onfido) will examine how document and biometric verification can seamlessly enable trust throughout the identity lifecycle. 

Feb 18, 2021

John Tolbert: Zero Trust for Reducing the Risks of Security Incidents

Feb 04, 2021

Marleen Oberheide: Data Ethics: Moving Beyond Privacy into Data Ethics & Trust

Nov 13, 2020

Christopher Schuetze: Safer With Security - How Fabrics Can Be Used to Manage the Complexity of Your Enterprise Security

A flexible architecture is an absolute must in order to keep pace with new challenges within a constantly evolving landscape. Christopher Schütze, Cybersecurity Practice Director and Lead Analyst at KuppingerCole, will look at methodologies that help to structure, reorganize, and extend the existing Cybersecurity landscape within your organization. He will examine current topics such as “Information is the new oil” and “Trust only with verification – Zero Trust” and how you can integrate this into your strategy. Information security and ensuring a high level of trust must be a fundamental part of Cybersecurity strategies in the years to come. This will help you to make the right choices and improve overall security, and learn how to be safer with security.

Oct 02, 2020

Jackson Shaw: Is it Time for an Identity Revolution?

Why have things like cell phones and automobiles become more advanced, intuitive and cost effective over time while managing Identity, particularly Identity Governance, has remained complex and expensive? The time and resources it takes to implement an identity project hinders the business and slows any hope of digital transformation. The frustration is real and ripping and replacing has not proved to be the answer. So what’s it going to take to truly get IGA right? In this thought-provoking session, Jackson Shaw, an experienced thought leader in IGA will discuss the need to rethink the core of identity and why it’s time for an IDENTITY REVOLUTION.

Oct 02, 2020

Interview with Jackson Shaw

Sep 08, 2020

Matthias Reinwarth: The Three Fundamentals of Enterprise Identity Success - My Take

Aug 21, 2020

Paul Fisher: In the Future PAM will Become Embedded in the IT Stack

Paul Fisher will expand on his analysis of how Privileged Access Management platforms will develop support for DevOps and other key users. This will mean that certain PAM functions will be embedded within the technology stack, opening up password free and secure access paths and enable rapid task fulfilment.

Jul 20, 2020

KC Virtual Awards

Jul 20, 2020

Panel: Addressing the Customers' „Pain Points“ - CIAM for Better Security and Compliance

In the digital-first environment, the threat of identity cybercrime is higher than ever. It is imperative for all the players to offer their customers frictionless, personalized and secure experience which can be quite challenging particularly when dealing with a large number of identities. Offering the more refined customer experience, understanding your customer without compromising security and compliance is not an easy feat. In this panel, our speakers will discuss the main critical points that need to be taking into account while enabling seamless customer identity capabilities, how to maintain a high level of security throughout all processes while collecting and storing the data, how to meet the demand of the customers who expect a personalized experience with easy access withmore control over the information companies store and share.

Jun 08, 2020

Matthias Reinwarth: Optimizing Your Cybersecurity Spending: Where to Put Your Money During and After the Crisis?

Jul 05, 2018

Patients, People and Things - Managing Identities in Healthcare

Digital transformation is a game changer in the health sector and a core requirement is better identity management. The need for improved security in modern medical facilities, the growing reliance on monitoring devices and support for millennials in their health outcome management, all require i...

Apr 25, 2018

An overview of the Leadership Compass: Endpoint Security Anti-Malware

Malware has been on the rise. Ransomware continues to grab the headlines. New malware variants proliferate by the millions. Old style manual malware analysis can't keep pace. But organizations are increasingly under attack. Fortunately, vendors have been enhancing and improving their products to ...


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Informatica is Moving Data Management to the Cloud

Informatica is Moving Data Management to the Cloud
Martin Kuppinger

Introducing Intelligent Data Management Cloud (IDMC) as a Comprehensive, Cloud-Native, and Cloud-First Approach to Data Management Data is the new gold, the new oil, or whatever. In the cloud, you only own the data, but not the applications, systems, or networks anymore. Data is essential for Digital Transformation. There is so much data that is sprawling that it is hard to keep control of it. And, within the SaaS and PaaS tenants, data is what belongs to the tenant. Many organizations fail in [...]

Latest Insights

Hot Topics


Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00