Partner Details

Illusive Networks stops cyberattacks by destroying attackers’ ability to make decisions as they move toward their targets. Illusive’s simple, agentless solutions eliminate high-risk pathways to critical systems, detect attackers early, and capture real-time forensics to minimize incident impact so that organizations can function with greater confidence and cyber agility.


 Sponsored Events

Date Title
Oct 28, 2020 Webinar

Using Deception for Early and Efficient Threat Detection

Most organizations are benefiting from the scalability, flexibility, and convenience of modern cloud services and new, highly distributed hybrid corporate networks. Unfortunately, many have also learned the hard way that defense of these systems and the assets they contain continue to remain prone to and the victim of cyberattacks and other security risks.

May 12 ‑ May 15, 2020 Congress

European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Sep 12, 2019 Webinar

How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”

Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.

 Reports

Date Title Price
Oct 29, 2020

Illusive Platform

Illusive Networks’ distributed deception platform is a highly scalable, intelligence-driven security solution that offers unprecedented visibility into corporate security posture from…

free

 Videos

Date Language Title
Oct 29, 2020

Using Deception for Early and Efficient Threat Detection

Most organizations are benefiting from the scalability, flexibility, and convenience of modern cloud services and new, highly distributed hybrid corporate networks. Unfortunately, many have also learned the hard way that defense of these systems and the assets they contain continue to remain pron...

Sep 12, 2019

How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”

Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive...


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Informatica is Moving Data Management to the Cloud

Informatica is Moving Data Management to the Cloud
Martin Kuppinger

Introducing Intelligent Data Management Cloud (IDMC) as a Comprehensive, Cloud-Native, and Cloud-First Approach to Data Management Data is the new gold, the new oil, or whatever. In the cloud, you only own the data, but not the applications, systems, or networks anymore. Data is essential for Digital Transformation. There is so much data that is sprawling that it is hard to keep control of it. And, within the SaaS and PaaS tenants, data is what belongs to the tenant. Many organizations fail in [...]

Latest Insights

Hot Topics


Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00