Director Cybersecurity Research

John Tolbert

John is the Director of Cybersecurity Research and Lead Analyst at KuppingerCole Analysts. John covers multiple cybersecurity and identity management topics, drawing upon his years of experience as a security specialist in both Fortune 500 companies and tech startups. John develops research strategies, conducts research, and advises enterprises on security architecture as well as security and identity management vendors on their product and service roadmaps. He has participated in technical standards development and was named an OASIS Distinguished Contributor in 2014. John regularly participates in KuppingerCole events and is often invited to speak at industry and security vendor events.

Roles & Responsibilities at KuppingerCole

As Director of Cybersecurity Research, John keeps up to date on threats, trends, and product developments across the industry, in order to set the agenda for cybersecurity research. As a Lead Analyst, he conducts research on established and leading-edge cybersecurity solutions.

Background & Education

As Lead Analyst, John covers a number of different research areas, outlined below. John also advises cybersecurity and IAM vendors, from startups to Fortune 500 companies, regarding their product and service roadmaps.

Areas of coverage

Cybersecurity

IAM

Professional Experience

John has specialized in security and identity management throughout his career, which spans working for companies in the manufacturing, aerospace and defense, and software industries.

Latest publications

Webinar Recording
Zero Trust Unveiled: Securing Critical Data in SAP, CAD, and PLM Systems
February 02, 2024
John Tolbert, Director of Cybersecurity Research and Lead Analyst at KuppingerCole Analysts, will provide an overview of the challenges and regulatory drivers of protecting sensitive unstructured and structured data such as found in CAD, PLM, and SAP systems. He will also discuss the…
Webinar Recording
Securing Your Digital Frontier: Navigating the Ever-Evolving Threat Landscape
January 12, 2024
Join security experts from KuppingerCole Analysts and Palo Alto Networks for an insightful and engaging webinar as they delve into the dynamic world of attack surface and threat management. They will discuss the challenges faced by organizations of all sizes, from small businesses to large…
Leadership Compass
Email Security
December 14, 2023
This report provides an overview of the Email Security market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing Email Security…
Webinar Recording
Become Cybersecurity Proactive With Attack Surface Management
December 14, 2023
Don’t miss this opportunity to join John Tolbert, Director of Cybersecurity Research and Lead Analyst at KuppingerCole Analysts, for this informative webinar to get an overview of ASM technologies and to find out how the ASM market is evolving, how these tools can be used by security…
Webinar Recording
The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
November 30, 2023
In this webinar, you will:  Gain an understanding of insider threats and their implications for financial institutions.  Win best practices for creating a robust insider threat program. Discover how to manage privileged access, monitor subcontractors and terminal…
Event Recording
The Shield of Innovation: How Technology Empowers Fraud Prevention
November 16, 2023
Fraud is a major cost to businesses worldwide. Banking, finance, payment services, and retail are some of the most frequent targets of fraudsters. However, insurance, gaming, telecommunications, health care, cryptocurrency exchanges, government assistance agencies, travel and hospitality,…
Analyst Chat
Analyst Chat #193: Dynamic Defenses - Evolving Strategies in Attack Surface Management
October 16, 2023
Matthias is joined by experts John Tolbert and Osman Celik to unpack the concept of Attack Surface Management (ASM) and its growing relevance in cybersecurity. They discuss the challenges posed by the ever-evolving nature of attack surfaces and the role of ASM solutions in managing these…
Webinar Recording
The Evolution of Secure Access in Critical Infrastructure
October 13, 2023
Join security experts from KuppingerCole Analysts and Cyolo as they discuss how access is evolving and the challenges that brings for OT/ICS/CIS environments. They will look at the potential benefits of technologies such as SIEM, SOAR, ITSM, PAM, IAM and XDR, and concepts such as MFA, ZTA,…
Executive View
cidaas CIAM
October 09, 2023
cidaas offers a complete customer identity and access management solution (CIAM) with many standard and advanced features. The cidaas solution is based on a micro-services architecture which facilitates rapid solution updates and scalability. cidaas enables some avant-garde use cases such as…
Webinar Recording
Digital Transformation in Financial Services Using Biometrics
September 20, 2023
Join identity experts at KuppingerCole Analysts and a global investment bank as they discuss new ways of complying with KYC (know your customer) and AML (anti money laundering) regulations in the Finance industry, while at the same time counteracting ever-evolving fraud schemes and…
Leadership Compass
Attack Surface Management
September 18, 2023
This report provides an overview of the Attack Surface Management market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing…
Blog
Who is Responsible for Operational Technology Security?
September 05, 2023
Operational Technology is comprised of the hardware, software, and networks that actuate, control, monitor, and analyze physical processes, machines, and infrastructure used in various industries such as manufacturing, transportation, health care, power generation and distribution,…
Webinar Recording
Fight Fraud With Fraud Reduction Intelligence Platforms (FRIP)
August 16, 2023
In today's digital landscape, businesses face an increasing threat of fraud that can lead to significant financial losses and damage to their reputation. To effectively combat fraud, businesses need Fraud Reduction Intelligence Platforms (FRIPs). These advanced technologies leverage…
Video
Protection Against Multi-Vector DDoS and Bot Attacks
August 11, 2023
Join John Tolbert, Director of Cybersecurity Research at KuppingerCole, in this insightful episode featuring George Tarasov, Product Manager at Qrator Labs. Explore the world of multi-vector DDoS attacks and bot detection as they shed light on the increasing complexities and challenges…
Whitepaper
Zero Trust Network Access for OT Environments
July 19, 2023
Operational Technology (OT) environments are often quite different from regular enterprise IT environments in terms of hardware and software deployed. However, both OT and IT need rigorous security measures such as strong and risk-adaptive authentication and policy-based access controls.…
Executive View
Thales OneWelcome Identity Platform
July 12, 2023
This KuppingerCole paper looks at the Consumer Identity and Access Market and the key capabilities of vendors in this space. A technical review of the Thales OneWelcome Identity Platform is included.
Webinar Recording
Ensuring a Proper Fit: Trends in CIAM and Strategies for Effective Solution Selection
June 30, 2023
As organizations increasingly rely on digital platforms and services to engage with customers, the management and security of consumer identities have become paramount. CIAM solutions play a crucial role in protecting user data, simplifying authentication processes, and personalizing…
Analyst Chat
Analyst Chat #175: Advancements in Fraud Prevention
June 05, 2023
Matthias invites John Tolbert to discuss Fraud Reduction Intelligence Platforms (FRIP) with him. Discover the evolving landscape of fraud prevention and detection, the key technologies used in FRIPs, and their broader applications beyond fraud reduction. Gain valuable insights from the…
Webinar Recording
Why Network Detection & Response (NDR) Is Central to Modern Cyber Architecture
May 26, 2023
Join security and business experts from KuppingerCole Analysts and cyber technology firm Exeon Analytics as they discuss how these challenges can be met using machine learning supported and log data based Network Detection & Response solutions to improve the overall cyber security and…
Event Recording
Market Overview CIAM: Customer Identity & Access Management
May 12, 2023
This session provides an overview of the CIAM solution market and provides you with a compass to help finding the solution that best meets your needs. In a recent Leadership Compass, KuppingerCole´s Senior Analyst John Tolbert examined the CIAM market segment, product/service…
Event Recording
Fraud Reduction Intelligence Platforms (FRIPs): Critical Capabilities & Market Overview
May 11, 2023
Fraud is a major cost to businesses worldwide. Cybersecurity Ventures estimates that cybercrime costs will reach $10.5 trillion by 2025. Banking, finance, payment services, and retail are some of the most frequent objectives of fraudsters, as expected. However, insurance, gaming,…
Webinar Recording
Maximizing Cyber Security Investments in Economically Turbulent Times
April 28, 2023
Join security and business experts from KuppingerCole Analysts and Cyfirma as they discuss the challenges of ensuring an effective cyber defense strategy on a limited budget. They will then look at how to meet those challenges by applying insights gained from combining threat intelligence…
Leadership Compass
Fraud Reduction Intelligence Platforms (FRIP)
April 25, 2023
This report provides an overview of the market for Fraud Reduction Intelligence Platforms and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches…
Executive View
ExeonTrace NDR
March 08, 2023
Network monitoring is a foundational element of security architecture. Sophisticated attackers may deliberately delete logs on servers and endpoints to cover up their tracks. This means that the network, including private and public clouds, may be the last place that investigators can look…