Media Coverage

KuppingerCole weighs in on Privileged Access Management vendors in new report

Analyst firm KuppingerCole just released a new report—  Leadership Compass March 2019 vendor evaluation for Privileged Access Management (PAM) .  Over more than 60 pages, KuppingerCole analyst Anmol Singh provides a thorough review of 20 PAM vendors in a rapidly growing PAM market. He emphasizes, “PAM has emerged as one of the most crucial IAM technologies that has a direct relevance and impact on an organization’s cybersecurity program.” Singh rightly recognizes that PAM was “Once considered a technology option for optimizing administrative...

Read More

Zero trust is about more than products

Identity, and not the network, is at the centre of the zero-trust security model , according to John Tolbert , lead analyst at KuppingerCole . “Many people associate this approach with the network, but zero trust is really an architectural design principle,” he told Computer Weekly. “While a zero-trust security model is definitely applicable at the network level, it is about applying a notion of identity – specifically authentication and authorisation .” This ensures that all traffic within an enterprise is properly authenticated and...

Read More

Best Practices for Adaptive Authentication

This is part four in a series of four posts on adaptive authentication and the KuppingerCole Leadership Compass Report. You can read the other posts as they are available here , here , and here . Today is our last blog post in our series on the KuppingerCole Leadership Compass for Adaptive Authentication 2018 report . So far we’ve talked about the benefits of adaptive authentication , evaluating solutions for your organization , and how adaptive authentication functions during an attack ....

Read More

Hitachi ID Recognized for Strength and Functionality of Privileged Access Management (PAM) Solution by Two Analyst Firms.

Two recently released analyst reports on Privileged Access have determined that companies investigating privileged access management solutions should consider Hitachi ID’s PAM product. Hitachi ID’s PAM secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability and an audit trail. In Ovum ’s white paper, “Hitachi ID Privileged Access Management” released March 15 th ,...

Read More

European Identity & Cloud Conference 2019

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, visionaries, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.


Read More

Insurance companies in the US collaborate to offer cyber-security ratings

In a collaborative effort, some of the world’s largest insurers have set out to create a consumer ratings service for the cyber-security industry. The initiative was launched last week in the US, led by Marsh & McLennan, and will attempt to score best products to reduce hacking risks and will create an assessment of the best cyber-security offerings available to businesses, according to the Wall Street Journal. The firm will collect and combine scores from participating insurers and will ultimately identify and rate products, offerings and services they believe will be...

Read More

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

News