Partner Details

Shape Security, now part of F5, has developed the world’s first converged, AI-powered platform that maximizes business results - improving topline revenue and reducing bottom-line losses - by delivering application security, anti-fraud and user experience outcomes for web and mobile applications.  

Learn how Shape can deliver these outcomes for your business today www.shapesecurity.com


 Sponsored Events

Date Title
Nov 17 ‑ Nov 18, 2020 Virtual Event

Cyber Access Summit 2020

Willkommen zum Cyber Access Summit (CAS) 2020! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2020 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus.

Nov 09 ‑ Nov 11, 2020 Virtual Event

Cybersecurity Leadership Summit 2020

In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS20) virtually, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats.

Nov 23, 2010 Webinar

How to let your Access Management Scale – and Save Costs

In this webinar, Martin Kuppinger will talk about streamlined approaches to consistently implement access management in a way to have common identities and policies applied to authentication. Followed by Martin, Sara Buttle, Alfredo Vistola (both F5 Networks) and Patrick McLaughlin (Oracle) will describe their practical view on how an efficient, scalable access management should be implemented.

 Reports

Date Title Price
Feb 12, 2019

Leadership Compass: Access Management and Federation - 71147

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Web Access Management and Identity Federation on-premises platforms. Your…

€1295.00
Jul 30, 2013

Executive View: F5 Mobile App Manager - 70802

There are various approaches to tackle the BYOD challenge, from MDM (Mobile Device Management) to specialized, secure apps - for instance for email - virtualization approaches on mobile…

€190.00

 Videos

Date Language Title
Nov 16, 2020

Mario van Riesen: The Evolution of Application Security

Cyberattacks have rapidly evolved since the advent of online transacting almost 25 years ago, with attackers continually escalating and refining their evasion techniques. While organisations and individuals continue to mobilise in an attempt to mitigate the global disruptions taking place around them, cybercriminals have wasted no time in exploiting the COVID-19 pandemic. Today, attackers and fraudsters call upon a sophisticated suite of tools, including human-powered click farms, social engineering, and malware – all designed to defeat traditional defenses such as WAFs & CAPTCHAs.  This session will dive deeper into how organisations can keep pace with this precipitate shift and adjust their security postures accordingly, to more accurately reflect the realities of an ever-evolving threat landscape.  Discussion Points :   Attack Evolution  - navigate the automated application attack-roadmap as it has progressed from the commodification of Credential Stuffing and ATO schemes to some of the most cutting-edge examples of Manual Fraud capability.  Countermeasure Efficacy  - discover how F5’s Application Fraud portfolio addresses the whole spectrum of eCrime attacks deterring cybercriminals who continually retool to circumvent traditional countermeasures.  Inverting Friction  - understand how organisations can protect their customers and brand without compromising user experience or collecting PII. 

Nov 24, 2010

How to Let Your Access Management Scale - and Save Costs

In this webinar, Martin Kuppinger will talk about streamlined approaches to consistently implement access management in a way to have common identities and policies applied to authentication. Followed by Martin, Sara Buttle, Alfredo Vistola (both F5 Networks) and Patrick McLaughlin (Oracle) will ...


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Informatica is Moving Data Management to the Cloud

Informatica is Moving Data Management to the Cloud
Martin Kuppinger

Introducing Intelligent Data Management Cloud (IDMC) as a Comprehensive, Cloud-Native, and Cloud-First Approach to Data Management Data is the new gold, the new oil, or whatever. In the cloud, you only own the data, but not the applications, systems, or networks anymore. Data is essential for Digital Transformation. There is so much data that is sprawling that it is hard to keep control of it. And, within the SaaS and PaaS tenants, data is what belongs to the tenant. Many organizations fail in [...]

Latest Insights

Hot Topics


Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00