Partner Details
Kennedydamm 24 • 40547 Düsseldorf • Deutschland
Phone: +49 21188271400
Internet: https://www.cyberark.com/
CyberArk is the #1 provider in privileged account security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise—on premises, in the cloud, on endpoints, and throughout the DevOps pipeline. Privileged accounts, credentials, and secrets allow anyone who gains possession of them to control organization resources, disable security systems, and access vast amounts of sensitive data.
CyberArk is the only public company 100% focused on privileged account security, and is trusted by more than 3,650 of the world’s leading organizations, including more than 50 % of the Fortune 100 and nearly 30% of the Global 2000, in almost 90 countries.
Sponsored Events
Date | Title |
---|---|
Jun 18, 2020 |
Webinar
The Future of Privileged Access Management and Reducing Risk for Modern Digital EnterprisesWhile Privileged Access Management (PAM) must still fulfill its core function of protecting privileged accounts, the next generation of PAM solutions can do so much more for your organization. As organizations embrace cloud, hybrid-IT, DevOps, remote working, digital workplaces, RPA and other transformational technologies the role of PAM has changed to secure these trends at zero point. Privileged accounts are no longer the domain of administrators or super users but for users right across the organization – including non-human entities such as applications and machines. |
May 15 ‑ May 18, 2018 |
Congress
European Identity & Cloud Conference 2018Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
Mar 07, 2018 |
Executive Dinner
Executive Dinner in StuttgartKuppingerCole personally invite you to a valuable evening of networking, interaction, engagement and quality dining experience at the Steigenberger Graf Zeppelin Hotel, Arnulf-Klett-Platz 7, 70173 Stuttgart, Germany. |
May 09 ‑ May 12, 2017 |
Congress
European Identity & Cloud Conference 2017European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security. |
Mar 23, 2017 |
Webinar
Personal data breach and the GDPR – Prevention, Detection and NotificationThe general data protection regulation (GDPR) as issued by the European Union will be a major challenge for literally any organisation doing business in Europe. In roughly 15 months from now it will reach legally binding status in every country within the European Union. And beyond: Probably one of the most striking characteristics of the new regulation that is constantly underestimated is the scope of its applicability. It actually applies in all cases where the data controller or the data processor or the data subject is based in the EU. This includes all data processors (e.g. cloud service providers) or data controllers (e.g. retailers, social media, practically any organisation dealing with personally identifiable information) which are outside the EU, especially for example those in the US. |
Nov 17, 2016 |
Webinar
Sicherheit in den operativen Systemen der Industrie 4.0Unter dem Begriff Operational Technology werden die Technologien zusammengefasst, die die Transformation von Waren und Dienstleistungen betreffen, etwa in produzierenden Unternehmen oder bei Energieversorgern (ICS: Industrial Control Systems & SCADA: Supervisory Control and Data Acquisition). |
May 10 ‑ May 13, 2016 |
Congress
European Identity & Cloud Conference 2016European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. |
Mar 15, 2016 |
Webinar
Whitelisting und darüber hinausNicht Server und Cloud, sondern die Arbeitsplatzrechner von Unternehmensmitarbeitern stellen die große Masse der Unternehmens-IT dar. Damit steht jeder Arbeitsplatzrechner im Fokus potentieller Angreifer und muss nachhaltig vor einer Vielzahl von internen wie externen Angriffen und Fehlbenutzungen geschützt werden. Firewalls und Virenscanner stellen heute akzeptierte und weitgehend implementierte Sicherheitsmaßnahmen dar. Der Schutz des klassischen Desktops, aber auch von Server-Systemen, vor der Ausführung unerwünschter Software durch Anwender wie Administratoren ist eine kontinuierliche Herausforderung. |
May 19, 2015 |
Webinar
Bedrohungen für privilegierte Zugänge erkennen und abwendenMit den jüngsten Sicherheitsvorfällen rücken Systemadministratoren und privilegierte Zugangsdaten weiter in das Zentrum des Interesses. Die nicht abreißenden Schlagzeilen über Fälle von Datendiebstahl bei Unternehmen und Behörden zeigen, dass es sich nicht um Einzelfälle handelt, sondern um ein Problem, dem sich alle Unternehmen stellen müssen. |
May 05 ‑ May 08, 2015 |
Congress
European Identity & Cloud Conference 2015European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. |
May 13 ‑ May 16, 2014 |
Congress
European Identity & Cloud Conference 2014European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT. |
Mar 24, 2014 |
Webinar
Mitigate targeted attacks with privileged account analyticsTargeted attacks continue to hit the headlines as the pinnacle of cyber-attacks faced by businesses. Once the perimeter defenses fail to defend against targeted attacks, the mitigation focus has shifted to inside the network. Security analytics focused on privileged account activity can increase detection rates, cost less and be easier to operate. Learn how advanced and insider attacks maneuver throughout your organization, and where and how to intercept them with targeted privileged account analytics. |
Apr 17 ‑ Apr 20, 2012 |
Congress
European Identity & Cloud Conference 2012With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
Feb 02, 2012 |
Webinar
Back to the ROOTsIn diesem Webinar erläutert zunächst Martin Kuppinger die aktuellen Trends im Markt für PxM (Privileged Access, Account, Identity, User Management) und die Frage, wo und wie man PxM-Lösungen mit seiner übrigen Identity und Access Management-Infrastruktur verbinden sollte. Daran anschliessend stellt Jochen Koehler von Cyber-Ark praktische Ansätze zur Verwaltung von privilegierten Identitäten vor. |
Nov 30, 2010 |
Webinar
Privileged Cloud Identity ManagementIn diesem Webinar wird zunächst Martin Kuppinger von KuppingerCole eine grundlegende Einführung in das Management privilegierter Benutzer im Unternehmen, innerhalb von Outsourcing-Verhältnissen und in der Public Cloud geben. Der Schwerpunkt wird hier insbesondere auf der Frage liegen, welche Anforderungen an einen Public Cloud oder Outsourcing Dienstleister zu stellen sind, damit Ihr internes (PUM) durch die Hinzunahme von Cloud Services nicht kompromittiert wird. Jochen Koehler vom Privileged Identity Management Spezialisten Cyber-Ark wird daran anschliessend einen überaus interessanten Einblick in die Praxis geben und die Strategie seines Unternehmens zur Absicherung Ihrer Cloud-Strategie erläutern. |
May 04 ‑ May 07, 2010 |
Congress
European Identity Conference 2010With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
May 04 ‑ May 07, 2010 |
Congress
CLOUD 2010Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are - Join us in Munich for an exciting event beyond the hype. |
May 04 ‑ May 07, 2010 |
Congress
Mittelstandsdialog InformationssicherheitDie Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist für jedes Unternehmen unverzichtbar, unabhängig von dessen Größe. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit können sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die Möglichkeit, den für Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden. |
Mar 19, 2009 |
Webinar
Wer war Root?Der Umgang mit privilegierten Benutzerkonten, wie beispielsweise "ROOT", birgt hohe Risiken. In diesem Webinar führen wir Sie in die Grundlagen des Privileged Account Management (PAM) ein und geben Ihnen wertvolle Praxistipps, wie Sie Ihr Netzwerk wirksam gegen interne und externe Bedrohung schützen können. |
Apr 22 ‑ Apr 25, 2008 |
Congress
European Identity Conference 2008For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event. |
Reports
Date | Title | Price |
---|---|---|
Feb 11, 2021 |
Privileged Access Management for DevOpsPrivileged Access Management (PAM) is an important area of access risk management and identity security in any organization. Privileged accounts have traditionally been given to… |
free |
Feb 09, 2021 |
Enterprise Authentication SolutionsThis report provides an overview of the Enterprise Authentication Solutions market and provides you with a compass to help you to find the solution that best meets your needs. We examine the… |
free |
Feb 02, 2021 |
Access ManagementThis Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your compass for… |
free |
Aug 28, 2020 |
CyberArkPrivileged Access Management (PAM) has evolved into a set of technologies that address some of today's most critical areas of cybersecurity in the context of digital transformation and… |
free |
May 12, 2020 |
Leadership Compass: Privileged Access Management - 80088Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators… |
€1295.00 |
Mar 26, 2020 |
Executive View: CyberArk Privilege Cloud - 80122Privileged Access Management (PAM) has evolved into a set of technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital transformation and… |
€190.00 |
Aug 29, 2019 |
Whitepaper: KRITIS - Kritische Infrastrukturen verstehen und schützen - 80194Organisationen oder Institutionen, die für die Öffentlichkeit wichtig sind, werden als Kritische Infrastrukturen (KRITIS = "Kritische Infrastrukturen") bezeichnet. Als solche… |
free |
Aug 29, 2019 |
Whitepaper: KRITIS – Understanding and protecting critical infrastructure - 80065Organizations or institutions that are essential for the public are called Critical Infrastructure (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to… |
free |
Mar 25, 2019 |
Executive View: CyberArk Privileged Session Manager for Web - 79034Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally accessible… |
€190.00 |
Mar 25, 2019 |
Leadership Compass: Privileged Access Management - 79014Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the… |
€1295.00 |
Nov 29, 2018 |
Leadership Compass: Cloud Access Security Brokers - 70614How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for… |
€1295.00 |
Aug 03, 2017 |
Leadership Compass: Privilege Management - 72330Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische… |
€1295.00 |
Jun 12, 2017 |
Leadership Compass: Privilege Management - 72330Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and… |
€1295.00 |
May 02, 2017 |
Executive View: Vendor Overview CyberArk - 70280CyberArk is a pioneer in Privileged Account Security, and is widely recognized as the leader in this sector. Building upon a strong base product, CyberArk has enhanced its offering to include… |
€190.00 |
May 03, 2016 |
Executive View: CyberArk Privileged Threat Analytics - 71540CyberArk’s latest major release of Privileged Threat Analytics is a capable and focused solution for the mitigation of threats caused by the abuse or misuse of privileged system… |
€190.00 |
Aug 18, 2014 |
Executive View: CyberArk Privileged Threat Analytics - 70859In some form, Privilege Management (PxM) already existed in early mainframe environments: those early multi-user systems included some means to audit and control administrative and shared… |
€190.00 |
Dec 22, 2010 |
Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257From the KuppingerCole perspective it is mandatory to quickly address the PxM challenges which exist in any IT environment. This requires solutions which cover all (or at least most) of the… |
€95.00 |
Mar 30, 2010 |
Vendor Report: Cyber-ArkCyber-Ark has established itself as one of the leading vendors of Privileged Access Management (PAM) solutions and offers one of the most functionally comprehensive products in the market. In… |
€95.00 |
Mar 15, 2010 |
Vendor Report: Cyber-ArkCyber-Ark hat sich als einer der führenden Anbieter im Bereich von Privileged Access Management (PAM) etabliert und dürfte derzeit die größte funktionale Breite im Markt… |
€95.00 |
Videos
Date | Language | Title |
---|---|---|
Jun 19, 2020 |
![]() |
The Future of Privileged Access Management and Reducing Risk for Modern Digital EnterprisesWhile Privileged Access Management (PAM) must still fulfill its core function of protecting privileged accounts, the next generation of PAM solutions can do so much more for your organization. As organizations embrace cloud, hybrid-IT, DevOps, remote working, digital workplaces, RPA and other tra... |
Mar 24, 2017 |
![]() |
Personal data breach and the GDPR – Prevention, Detection and NotificationThe general data protection regulation (GDPR) as issued by the European Union will be a major challenge for literally any organisation doing business in Europe. In roughly 15 months from now it will reach legally binding status in every country within the European Union. And beyond: Probably one ... |
Nov 18, 2016 |
![]() |
Sicherheit in den operativen Systemen der Industrie 4.0Unter dem Begriff Operational Technology werden die Technologien zusammengefasst, die die Transformation von Waren und Dienstleistungen betreffen, etwa in produzierenden Unternehmen oder bei Energieversorgern (ICS: Industrial Control Systems & SCADA: Supervisory Control and Data Acquisition). |
May 22, 2016 |
![]() |
John Worrall - The Most Travelled Attack Route: Securing the Privileged PathwayPrivileged accounts have been at the center of each recent high-profile attack. This session will explain how hackers that successfully exploit these accounts are able to gain a privileged foothold, allowing them unfettered access to elevate privileges and move about the network freely without detection. |
Mar 15, 2016 |
![]() |
Whitelisting und darüber hinausNicht Server und Cloud, sondern die Arbeitsplatzrechner von Unternehmensmitarbeitern stellen die große Masse der Unternehmens-IT dar. Damit steht jeder Arbeitsplatzrechner im Fokus potentieller Angreifer und muss nachhaltig vor einer Vielzahl von internen wie externen Angriffen und Fehlbenutzunge... |
May 19, 2015 |
![]() |
Bedrohungen für privilegierte Zugänge erkennen und abwendenMit den jüngsten Sicherheitsvorfällen rücken Systemadministratoren und privilegierte Zugangsdaten weiter in das Zentrum des Interesses. Die nicht abreißenden Schlagzeilen über Fälle von Datendiebstahl bei Unternehmen und Behörden zeigen, dass es sich nicht um Einzelfälle handelt, sondern um ein P... |
May 15, 2015 |
![]() |
Yariv Lenchner - Securing Privileged Identities in OT (Operational Technology) and Industrial Control SystemsIn the last years we see that privileged accounts in Operational Technology (OT) environments (e.g. critical infrastructure) have an even higher importance and criticality than in the traditional IT. OT networks and the Internet of Things (IoT) implementations are taking shape and are being connected to enterprise networks and to the internet. This brings many business advantages but also opens these once isolated technologies to advance threats. Securing these privileged account and their privileged sessions are a critical security practice for enterprises and critical infrastructure operators. |
Mar 25, 2014 |
![]() |
Mitigate Targeted Attacks with Privileged Account AnalyticsTargeted attacks continue to hit the headlines as the pinnacle of cyber-attacks faced by businesses. Once the perimeter defenses fail to defend against targeted attacks, the mitigation focus has shifted to inside the network. Security analytics focused on privileged account activity can increase ... |
Feb 02, 2012 |
![]() |
Back to the ROOTsIn diesem Webinar erläutert zunächst Martin Kuppinger die aktuellen Trends im Markt für PxM (Privileged Access, Account, Identity, User Management) und die Frage, wo und wie man PxM-Lösungen mit seiner übrigen Identity und Access Management-Infrastruktur verbinden sollte. Daran anschliessend stel... |
Dec 02, 2010 |
![]() |
Privileged Cloud Identity ManagementIn diesem Webinar wird zunächst Martin Kuppinger von KuppingerCole eine grundlegende Einführung in das Management privilegierter Benutzer im Unternehmen, innerhalb von Outsourcing-Verhältnissen und in der Public Cloud geben. Der Schwerpunkt wird hier insbesondere auf der Frage liegen, welche Anfo... |
Mar 20, 2009 |
![]() |
Wer war Root? Was Sie über Privileged Account Management (PAM) wissen solltenDer Umgang mit privilegierten Benutzerkonten, wie beispielsweise "ROOT", birgt hohe Risiken. In diesem Webinar führen wir Sie in die Grundlagen des Privileged Account Management (PAM) ein und geben Ihnen wertvolle Praxistipps, wie Sie Ihr Netzwerk wirksam gegen interne und externe Bedrohung schüt... |
KuppingerCole PLUS
Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Blog
Informatica is Moving Data Management to the Cloud


Introducing Intelligent Data Management Cloud (IDMC) as a Comprehensive, Cloud-Native, and Cloud-First Approach to Data Management Data is the new gold, the new oil, or whatever. In the cloud, you only own the data, but not the applications, systems, or networks anymore. Data is essential for Digital Transformation. There is so much data that is sprawling that it is hard to keep control of it. And, within the SaaS and PaaS tenants, data is what belongs to the tenant. Many organizations fail in [...]
Latest Insights