KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.
As a market leader for 20+ years, ManageEngine crafts comprehensive IT management software with a focus on making your job easier. Our 120+ award-winning products and free tools cover everything your IT needs. From network and device management to security and service desk software, we're bringing IT together for an integrated, overarching approach to optimize your IT.
A modern approach to securing privileged accounts is to apply the principle of Zero Trust: Never trust, always verify. While Zero Trust is not an off-the-shelf solution, it is modern vendors of PAM solutions that recommend using this security principle to cement the technical capabilities of their products. This webinar will provide actionable insights for organizations to employ Zero Trust security in their overall PAM strategy and operations.
Paul Fisher, Senior Analyst at KuppingerCole, will look at the origins of Zero Trust theory and its development as well as how Zero Trust fits into the KuppingerCole identity and cybersecurity fabric architecture concepts. He will address how Zero Trust can assist in managing cloud entitlements and discuss we 100% Zero Trust is possible. Srilekha Sankaran, product consultant for PAM solutions at ManageEngine, will address the risks of insider threats and privilege misuse in the era of hybrid work, and discuss the management and elimination of the risks posed by standing privileges.
Privileged Access Management (PAM) has assumed a critical role in protecting the most valuable data and services within organizations from theft, loss, and unauthorized access. But as companies and other organizations have become more complex and embrace digital transformation, PAM is also taking on a core operational function to achieve better insight into data usage and contribute to agile working processes.
The past few months have not only been disruptive to business models, but also to the way many people work. Working from Home (WfH) is the new normal for many of us, but it comes with many challenges, for workers, for their managers, for the IT teams. One of the biggest challenges is finding the right balance between enabling WfH and security.
IAM and therein IGA (Identity Governance & Administration) focuses on managing identities and their access across a variety of systems. That is essential, particularly for heterogeneous environments. However, there are two aspects that aren’t well-addressed by many of today’s IGA products:
Where these requirements aren’t served well by existing IGA implementations or where these are just too complex for the customer’s IT infrastructure, targeted tools that work around Microsoft Active Directory (AD) and, nowadays, Azure AD, come into play – with the depth, adding to the breadth of IGA, or as standalone solutions for customers that don’t have and need a full IGA solution. In this webinar, we look at how a complete IAM infrastructure looks like and which capabilities are best provided by which tools for different scenarios.
Many people still have only a vague idea how to start planning for the GDPR, even after reading numerous publications and discussions and being bombarded from all directions with promises to solve all compliance challenges once and for all. This is completely understandable, since the regulation with its 11 chapters and 99 articles is very difficult to comprehend, to say nothing about translating the mixture of technical and legalese terms into concrete actions. The goal of this webinar is to help people decrypt the bureaucratic language of the regulation, to clarify each of its major requirements, such as managing user consent, appointing a data protection officer and reporting data breaches, and outline an actionable plan that your company needs to adopt to comply with them. Last but not least, we are going to explain how to select the right security solutions that will help you achieve compliance and how avoid false promises of “GDPR-compliant software”.