Partner Details
575 Eighth Avenue Suite 1212 • NY 10018 New York • USA
Phone: +1 212 380 14 65
Fax: +1 212 208 46 49
Email: info@blackbird-group.com
Internet: http://www.blackbird-group.com/
A leader in automation and compliance management, the Blackbird Group provides insight for enhanced governance and cost efficiencies across the Microsoft Windows infrastructure. Blackbird’s innovative solutions help organizations make the most of their Windows investments through automated audit, recovery, event management and reporting. The Blackbird Group is a privately held company with more than 15 million seats under management and is a Microsoft Managed and Gold Certified ISV Partner. It’s headquartered in Manhattan, New York. For more information please go to www.blackbird-group.com
Sponsored Events
Date | Title |
---|---|
Jun 09 ‑ Jun 10, 2021 |
Virtual Event
Cyber Access Summit 2021Erfahren Sie alles rund um modernes Access Management auf dem virtuellen KCLive Event Cyber Access Summit 2021 am 9. und 10. Juni. Jetzt anmelden! |
May 19, 2021 |
Webinar
Finding Your Path to Zero TrustAs users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations. |
Nov 17 ‑ Nov 18, 2020 |
Virtual Event
Cyber Access Summit 2020Willkommen zum Cyber Access Summit (CAS) 2020! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2020 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus. |
Nov 09 ‑ Nov 11, 2020 |
Virtual Event
Cybersecurity Leadership Summit 2020In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS20) virtually, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats. |
Nov 04, 2020 |
Webinar
Operationalizing Least PrivilegeStriking the balance between enabling users and administrators to be productive whilst protecting your sensitive systems and data is becoming ever more challenging. Attackers are often one step ahead of organizations, and even those with the most comprehensive security systems and controls in place find that an attacker will discover and exploit their Achilles’ heel. |
Sep 03, 2020 |
Virtual Event
The Three Fundamentals to Enterprise Identity SuccessOrganisations of all sizes are recognizing the need for a modern enterprise identity program to help fast track digital transformation, cloud adoption and Zero Trust initiatives. In order to capture the full capabilities, benefits and security of a modern enterprise identity program, you need the integration of solutions that cover all users, permissions and privileges. Attend this virtual event to learn how the integration between Identity and Access Management, Identity Governance and Privileged Access Management can protect your critical systems and data, reduce risk and help you quickly adapt to the changing demands of your business. During the event KuppingerCole, Ping Identity, SailPoint, BeyondTrust and other industry experts will provide attendees with best practices and guidance on how to achieve their goals from an identity program. |
Jun 25, 2020 |
Webinar
Minimizing Security Impacts of a Growing Remote WorkforceMany organisations are implementing remote working policies and need to quickly support an unprecedented increase in the number of remote employees. |
Nov 19, 2019 |
Webinar
6 Myths of Privileged Access Management BustedIndustry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve. |
May 14 ‑ May 17, 2019 |
Congress
European Identity & Cloud Conference 2019Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 950 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
May 15 ‑ May 18, 2018 |
Congress
European Identity & Cloud Conference 2018Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
Apr 19, 2018 |
Webinar
Privileged Attack Vectors: Verständnis und Minimierung interner und externer Cyber-RisikenEine der unglücklichen Folgen des fortschreitenden Digitaltransformationsprozesses ist die ständig steigende Komplexität der IT-Infrastrukturen von Unternehmen. Die Einführung von Cloud-Technologien, der Ausbau der mobilen Arbeitskräfte und die zunehmende Abhängigkeit von ausgelagerten IT-Mitarbeitern haben dazu geführt, dass der sichere Unternehmensbereich nahezu vollständig verschwunden ist und die Überwachung und Kontrolle privilegierter Zugänge sehr komplex und teuer geworden ist. |
Jun 28, 2017 |
Webinar
Interoperability and Intelligence: Two Keys to a Successful Privilege Management DeploymentAs businesses are becoming increasingly digital, their IT infrastructures are continuously growing in scale and complexity, with vast numbers of previously disparate systems and platforms woven together by new communications channels. Many of these systems are no longer located within the corporate perimeter, having partially or completely migrated to the cloud. Even those which still remain on.premises, must be constantly accessible to mobile workers, external contractors or support engineers. |
May 09 ‑ May 12, 2017 |
Congress
European Identity & Cloud Conference 2017European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security. |
Oct 06, 2016 |
Webinar
State-of-the-Art Privilege Management by DesignThe challenges for securely managing and monitoring access to administrative accounts are changing continuously. This is true for business processes, job profiles, legal and regulatory requirements and the underlying IT infrastructure. And it is true for the changing threat landscape. |
May 10 ‑ May 13, 2016 |
Congress
European Identity & Cloud Conference 2016European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. |
Nov 17, 2015 |
Webinar
The Seven Keys to a Successful Privileged Account Management StrategyHow can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to mitigate the risks posed by insider threats, prevent data breaches, and meet compliance requirements. |
Apr 17 ‑ Apr 20, 2012 |
Congress
European Identity & Cloud Conference 2012With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
Reports
Date | Title | Price |
---|---|---|
Feb 11, 2021 |
Privileged Access Management for DevOpsPrivileged Access Management (PAM) is an important area of access risk management and identity security in any organization. Privileged accounts have traditionally been given to… |
free |
Feb 04, 2021 |
BeyondTrust Endpoint Privilege ManagementPrivileged Access Management (PAM), of which Endpoint Privilege Management (EPM) is a part, is an essential component in protecting organizations against cyber-attacks, ransomware, malware,… |
free |
May 12, 2020 |
Leadership Compass: Privileged Access Management - 80088Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators… |
€1295.00 |
May 07, 2019 |
Executive View: BeyondTrust Password Safe - 80067BeyondTrust’s Produktportfolio bietet eine gut integrierte Privileged Access Management (PAM) Suite mit einer Reihe von Funktionen für die Erkennung und Minderung von… |
€190.00 |
Apr 26, 2019 |
Executive View: BeyondTrust Password Safe - 80067BeyondTrust’s portfolio of products provides a well-integrated Privileged Access Management (PAM) suite with a range of capabilities for detection and mitigation of security… |
€190.00 |
Mar 25, 2019 |
Leadership Compass: Privileged Access Management - 79014Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the… |
€1295.00 |
Dec 28, 2017 |
Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363BeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for… |
€190.00 |
Nov 06, 2017 |
Executive View: BeyondTrust PowerBroker PAM - 70275BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged… |
€190.00 |
Aug 03, 2017 |
Leadership Compass: Privilege Management - 72330Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische… |
€1295.00 |
Jun 12, 2017 |
Leadership Compass: Privilege Management - 72330Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and… |
€1295.00 |
Apr 28, 2016 |
Executive View: BeyondTrust PowerBroker - 71504BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged… |
€190.00 |
Mar 05, 2015 |
Executive View: BeyondTrust PowerBroker Auditor Suite - 70891BeyondTrust PowerBroker Auditor Suite is a set of auditing tools for Windows environments. Together they provide a unified real-time insight and an audit trail for file system, SQL Server,… |
€190.00 |
Jan 31, 2012 |
Product Report: Blackbird Management Suite - 70402The Blackbird Management Suite is well architected and is designed to include high levels of integration with the existing support modules for Active Directory and the Windows Server File… |
€295.00 |
Videos
Date | Language | Title |
---|---|---|
Nov 20, 2020 |
![]() |
Mohamed Ibbich: Welche Rolle spielt ein umfassender Privileged Access Management-Ansatz bei der sicheren Anbindung einer Remote- & Hybrid-Belegschaft?Viele Organisationen stehen vor der Herausforderung Richtlinien für das Arbeiten aus dem Home-Office zu implementieren, um unter anderem eine stetig steigende Anzahl an Remote- und Hybrid-Mitarbeitern zu unterstützen. Während ein hybrides Arbeitsmodell eine interessante und aufregende Entwicklung darstellt, waren viele Organisationen nicht auf diese rasche, anfängliche Verlagerung der Arbeitsstruktur in Hybrid- oder Remote-Modelle vorbereitet. Die Nutzung einer Privileged Access Management-Lösung kann federführend dabei unterstützen, Sicherheitsauswirkungen dieser wachsenden Remote- und Hybrid-Belegschaft zu minimieren. Der Vortrag zeigt auf, wie diese neuen Arbeitsmodelle sicher supported sowie weiter ausgebaut werden können und legt dar, welche Rolle ein ganzheitlicher Privileged Access Management-Ansatz hierbei spielt. Ferner behandelt der Vortrag: CISO-Überlegungen bezüglich einer sich wandelnden Arbeitsbelegschaft sowie Sicherheitsauswirkungen einer schnellen Transformation „New Normal“: Implementierung & Skalierung starker Sicherheitsprotokolle, um eine hybride Belegschaft zu ermöglichen Wichtigkeit eines ganzheitlichen PAM-Ansatzes zur Absicherung jeglicher Privilegien, immer und überall |
Nov 20, 2020 |
![]() |
Panel - Die Rolle von PAM und wie man mit aktuellen Sicherheitsrisiken umgeht |
Nov 12, 2020 |
![]() |
Panel - Zero Trust Paradigm for the Future of Security |
Nov 05, 2020 |
![]() |
Operationalizing Least PrivilegeStriking the balance between enabling users and administrators to be productive whilst protecting your sensitive systems and data is becoming ever more challenging. Attackers are often one step ahead of organizations, and even those with the most comprehensive security systems and controls in pla... |
Jun 26, 2020 |
![]() |
Minimizing Security Impacts of a Growing Remote WorkforceMany organisations are implementing remote working policies and need to quickly support an unprecedented increase in the number of remote employees. |
Nov 20, 2019 |
![]() |
6 Myths of Privileged Access Management BustedIndustry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve. |
Apr 20, 2018 |
![]() |
Privileged Attack Vectors: Verständnis und Minimierung interner und externer Cyber-RisikenEine der unglücklichen Folgen des fortschreitenden Digitaltransformationsprozesses ist die ständig steigende Komplexität der IT-Infrastrukturen von Unternehmen. Die Einführung von Cloud-Technologien, der Ausbau der mobilen Arbeitskräfte und die zunehmende Abhängigkeit von ausgelagerten IT-Mitarbe... |
Jun 29, 2017 |
![]() |
Interoperability and Intelligence: Two Keys to a Successful Privilege Management DeploymentAs businesses are becoming increasingly digital, their IT infrastructures are continuously growing in scale and complexity, with vast numbers of previously disparate systems and platforms woven together by new communications channels. Many of these systems are no longer located within the corpora... |
Oct 07, 2016 |
![]() |
State-of-the-Art Privilege Management by DesignThe challenges for securely managing and monitoring access to administrative accounts are changing continuously. This is true for business processes, job profiles, legal and regulatory requirements and the underlying IT infrastructure. And it is true for the changing threat landscape. |
May 23, 2016 |
![]() |
Patric Schmitz - Managing User Risk: How to Constrain, Control and EmpowerA large proportion of time spend securing IT systems involves managing user risk in a variety of guises. Balancing the need to be secure against the needs of users to be productive in their day-to-day activities is an on-going challenge. In this session I will show how you can deliver reductions in user risk without impacting their productivity. How IT Security can empower users to do more with less risk. |
Nov 18, 2015 |
![]() |
The Seven Keys to a Successful Privileged Account Management StrategyHow can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to mitigate ... |
KuppingerCole PLUS
Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Blog
Informatica is Moving Data Management to the Cloud


Introducing Intelligent Data Management Cloud (IDMC) as a Comprehensive, Cloud-Native, and Cloud-First Approach to Data Management Data is the new gold, the new oil, or whatever. In the cloud, you only own the data, but not the applications, systems, or networks anymore. Data is essential for Digital Transformation. There is so much data that is sprawling that it is hard to keep control of it. And, within the SaaS and PaaS tenants, data is what belongs to the tenant. Many organizations fail in [...]
Latest Insights