Media Coverage

Three Cybersecurity Lessons Learned in the 2010s

As we face the close of the decade in a couple of short months, it seems like a good time to take stock of the progress cybersecurity technology has made in the 2010s before we start looking ahead to what’s next in the ‘20s. A few weeks ago, I had the opportunity to attend KuppingerCole’s CyberNext Summit 2019 and Borderless Cyber 2019 conference in Washington DC. The conference centered on some of the latest developments in the field of cybersecurity and left me thinking about some of the lessons learned over the past decade. Here are three trends and technologies...

Read More

Das Ziel für CISOs lautet Business Continuity

Unternehmensentscheider fürchten am meisten Betriebsunterbrechungen, ob durch klassische Ursachen oder durch Cyberattacken verursacht. CISOs sollten deshalb der Business Continuity noch mehr Priorität einräumen und ihre Kennzahlen und Berichte darauf anpassen. Dies hilft nicht nur bei der Budgetfreigabe, sondern auch beim Datenschutz nach Datenschutz-Grundverordnung (DSGVO). CIOs werden zunehmend an ihrer Fähigkeit gemessen, für Geschwindigkeit und Agilität im Unternehmen zu sorgen, und CISOs an ihrer Fähigkeit, erfolgreiche Cybersicherheitsangriffe zu...

Read More

Payers turn to identity and access management to protect data

Identity and access management solutions are playing a growing role in protecting against cyberattacks in the healthcare sector, experts say. Martin Kuppinger, information and security expert with European-based KuppingerCole Analysts, says it’s time for healthcare organizations to take on Identity and access management (IAM) for security reasons. “Healthcare organizations deal with highly sensitive information,” he says in a recent white paper entitled, “IAM for Healthcare: It’s time to act.” Healthcare organizations “face challenges in...

Read More

Thales Named a Market Leader in KuppingerCole Analysts Leadership Compass for Identity-as-a-Service Access Management

The report recognized Thales, through its SafeNet Trusted Access offer, as a market leader in terms of the number of customers, partner ecosystem, and global reach in the IDaaS Access Management market. KuppingerCole’s Leadership Compass takes a thorough look at the overall IDaaS Access Management industry, provides in-depth analysis of the main players in the market, and rates vendors on innovation, product features, and market reach. “With a strong global presence, SafeNet Trusted Access presents a flexible solution based on standards and, in addition, agents as a...

Read More

Wenn die Personalisierung zum Balanceakt wird

Auf den deutschen Verbraucher prasseln heute nahezu stündlich immer neue Last-Minute Schnäppchen ein, die das perfekte Urlaubserlebnis für kleines Geld versprechen. Möchte der potentielle Kunde ein Angebot wahrnehmen, muss sich dieser meist in mühevoller Sisyphus-Arbeit durch viele Online-Angebot quälen, um die günstigste und zugleich passendste Reise für sich auszuwählen. Denn der internetaffine Kunde von heute ist zum Selbstbucher geworden. Bevor er eine Buchung tätigt, will er sicher sein, dass dies auch wirklich das beste...

Read More

ESET Named Top Performer in the KuppingerCole Analysts Executive Report

ESET, a global leader in cybersecurity, has been described as a top performer in the KuppingerCole ESET Executive View report . The report analysed ESET Endpoint Security and outlines the strengths and robust anti-malware capabilities of the software. KuppingerCole Analysts is an international and independent analyst organization that supports companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges. It offers vendor-neutral advice, and its reports are based on its analysts’ thought-leading knowledge and...

Read More

CISOs need to redefine their role and include business continuity management

KuppingerCole Principal Analyst, Martin Kuppinger, says that CISOs need to take a resilience approach to cyber protection and this requires understanding that their role should include business continuity management. “Cyber attack resilience requires way more than just protective and defensive security tools and training. Resilience is about being able to recover rapidly and thus must include business continuity management activities. It is time to redefine the role of CISOs,” Mr. Kuppinger declared in a recent webinar on cyber security budgeting. While prevention is key...

Read More

“WSO2 Identity Server Named a Leader in Kuppingercole’s Leadership Compass on Identity API Platforms” Why You Need to Care?

In the KuppingerCole Identity API Platforms Leadership Compass 2019 report published on August 30, 2019, named Forgerock , Ping Identity , WSO2 (WSO2 Identity Server) , Okta and Auth0 as overall leaders. The report’s findings were based on an evaluation of 13 software vendors that KuppingerCole has identified as the most significant Identity API Platform providers. Companies identified as overall leaders were recognized for demonstrating leadership in three areas: product, innovation, and market. Here it will summarize this comprehensive research and discuss why you should...

Read More

KuppingerCole Analysts Executive Report names ESET a top performer

ESET, a global leader in cybersecurity, has been described as a top performer in the KuppingerCole ESET Executive View report . The report analysed ESET Endpoint Security and outlines the strengths and robust anti-malware capabilities of the software. KuppingerCole Analysts is an international and independent analyst organization that supports companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges. It offers vendor-neutral advice, and its reports are based on its analysts’ thought-leading knowledge and expertise. The...

Read More

European Identity & Cloud Conference (EIC 2020)

The  European Identity & Cloud Conference (EIC 2020)  is dedicated to technology topics such as Governance, Identity Management, Cloud Computing, Risk Management and Compliance (GRC). The event`s tracks include: Consumer Identity: Delivering Value IAM: The Future is now! Data Protection - What`s New, What`s Next? Microservices – Curse or Blessing? Blockchains at Prediction Markets Enterprise Blockchain Best Practices The New World of Cybersecurity Data Management, Privacy & Security AI, Machine Learning & Cognitive Intelligence in...

Read More

KuppingerCole names Microsoft the top overall IDaaS leader

Microsoft was identified as the “leading IDaaS AM vendor” for functional strength and completeness of product, with a “focus on constant innovation”. KuppingerCole recognized Microsoft’s strength in our “support for popular SaaS app integrations,” which is possible through the open support of our many partners. KuppingerCole highlighted the security capabilities of Azure Active Directory including “strong adaptive authentication” and “strong threat analytics capabilities offering real-time threat detection and remediation.”...

Read More

Umfrage: Security-as-a-Service boomt

Bis zum Jahr 2021 werden mehr als 70 Prozent der Unternehmen Security-as-a-Service (SECaaS) nutzen und ihre Sicherheitslösungen damit größtenteils aus der Cloud beziehen. Dies ist das Ergebnis einer aktuellen Umfrage von Thycotic auf der diesjährigen European Identity Cloud Conference in München. Als Grund für den Umstieg auf Cloud-basierte Sicherheits-Tools nannten die befragten Cybersecurity-Entscheider und Technologie-Experten unter anderem geringere Kosten, größere Flexibilität und die Möglichkeit, fehlende Personalressourcen zu...

Read More

70 Percent of Organizations Will be Using Security-as-a-Service by 2021

Thycotic , a provider of privileged access management (PAM) solutions to 10,000 organizations worldwide, including 15 percent of the Fortune 1000,  released the findings from its 2019 Global Research Report: “Security-as-a-Service on the Rise,” which is based on interviews with IT managers and technology decision makers at the KuppingerCole European Identity & Cloud conference in Munich in May. Stemming from the research, respondents surveyed indicated they are turning to cloud based security services to help keep up with rapidly escalating threats, costs and a...

Read More

LoginRadius Achieved SOC 2 Type II and ISAE 3000 Certification

LoginRadius Inc., a leader in customer identity and access management, announced their successful completion of SOC 2 ® Type II and ISAE 3000 audits. As the cost of data breaches rises, these certifications demonstrate the company’s commitment to rigorous protection of customer data as part of the LoginRadius Identity Platform. “Security is not a feature but a foundation of the LoginRadius platform and business as we continue providing the world-class security to our clients,” said Deepak Gupta, Cofounder and CTO of LoginRadius. “Clients rely on LoginRadius...

Read More

Blockchain & Business Innovation

Blockchain ist immer noch in aller Munde und 2019 kann das Jahr sein, in dem große Unternehmen endlich die Distributed-Ledger-Technologie einsetzen. Die erste Blockchain-Veranstaltung von KuppingerCole geht über den Hype hinaus und präsentiert Ihnen echte Anwendungsfälle und Anwendungen für Ihr Unternehmen. Die Blockchain Enterprise Days finden vom 18. bis 19. September 2019 in Frankfurt statt. Die BeDays 2019 konzentrieren sich nicht nur auf die Anwendungen im Finanzsektor, sondern präsentieren weitere Anwendungsfälle in den Bereichen Identity Access...

Read More

KuppingerCole zeichnet AdNovum für NEVIS als Product Leader aus

Zürich – KuppingerCole hat im Leadership Compass «Access Management and Federation» das Schweizer Software-Unternehmen AdNovum für seine bewährte Security Suite NEVIS als Product Leader ausgezeichnet. Die Security Suite NEVIS von AdNovum, 2013 erstmals für den KuppingerCole Leadership Compass analysiert, bringt dem Schweizer Softwareunternehmen dieses Jahr einmal mehr die Auszeichnung als Product Leader im Bereich Access Management and Federation. KuppingerCole ist ein global tätiges, in Europa führendes Haus für...

Read More

EIC: European Identity & Cloud Conference 2019 in Munich

For us as a PR agency specialized on technology and cybersecurity, the EIC has long been a must-attend every year, and so it is for all our clients dealing with IAM, cloud technology, artificial intelligence or digital transformation. The EIC offers a unique mix of best practices, visionary presentations and networking opportunities for a future-oriented community. This May, around 850 international thought leaders, leading vendors, analysts, visionaries, executives and end-users got together in Munich to be inspired by a list of world-class speakers. Our client Thycotic, a provider...

Read More

Unstructured data compliance: Obstacles and solutions

Data scientists estimate that 80% of the world’s electronic information is “unstructured”, or held as email, documents, video and photographs, or even free text. “ Unstructured data is data held outside data structures like tables and rows without predictable content patterns, such as documents, emails, photos or free text,” says Jacob Isaksen, a digital forensics expert and founder and CEO of Avian, a consulting firm based in Copenhagen. Or, as Mathieu Gorge, CEO of compliance specialists Vigitrust puts it, unstructured data looks rather...

Read More

Datensicherheit ist Teamwork

Die Zeiten sind vorbei, in denen die IT-Abteilung alleine die Systeme eines Unternehmens schützen konnte. Angesichts des enormen Risikos muss die Verteidigung gegen Cyberkriminalität ein zentrales Anliegen für alle Mitarbeiter sein, von der Rezeption bis hin zum CEO. Das birgt allerdings eigene Risiken, die jedoch durch den Einsatz neuer Technologien eingedämmt werden können. Das Umfeld dieses Bereichs wird heute von einer ständig wachsenden Anzahl von „Angriffsvektoren“ bestimmt, von denen der neueste das Mining von Crypto-Währungen ist...

Read More

Cybersecurity Leadership Summit und Cyber Access Summit 2019

Cybercrime is the greatest threat to every company in the world, making cybersecurity the hottest issue of mankind. This notion is corroborated by the fact that VCs are almost doubling their investments in cybersecurity firms. As the threats, starting from the reputational harm and destruction of data to identity theft, rise, cost of defending yourself in cyberspace grows vastly and preventive solutions towards this issue become imminent. Major data breach incidents are becoming more frequent making us feel insecure and doubtful (hesitant).  The way we navigate ourselves in this...

Read More

Data Security is a team effort

Gone are the days when an IT department alone was able to protect a company’s systems. Given the enormous risk, fending off cyber criminals must be of central concern to all employees, from the receptionist to the CEO. But that brings its own risks, which can be curtailed by emerging technologies. Today’s landscape is teeming with an ever-growing number of “attack vectors”,  with the newest being crypto-currency mining – a kind of cyber-attack that grew by an astonishing 4,000 per cent in 2018, according to McAfee . “A successful...

Read More

CipherCloud Extends Zero Trust Cloud Security to Email for Office 365 and G Suite

CipherCloud, a leader in cloud security, today announced new email security capabilities in its CipherCloud Zero Trust CASB+ platform, combining zero trust threat prevention with industry leading data protection technologies In addition to the new email security, the CipherCloud platform provides innovative adaptive control enforcing zero trust cloud security with continuous risk assessment; zero-day threat protection and real-time blocking; and machine learning that detects compromised credentials and anomalous behaviors across cloud applications. The platform seamlessly extends...

Read More

API Security Weekly: Issue #33

First American Financial Corp.  was leaking 885 million mortgage deals records until it was notified by KrebsOnSecurity last week. The leaked records included highly sensitive information such as social security numbers (SSN), bank accounts, tax records, and wire details. Presumably, the company did not want to secure the documents to simplify the access to them for all parties in a mortgage deal. As a result, the records could be obtained just by putting a sequential document ID parameter in the URL. These parameters were 9-digit integers starting with 000000075 (this one...

Read More

Advanced Authentication Market 2019: Company Profiles, Emerging Audience, Industry Segments, Size, Landscape and Demand by Forecast to 2023

Global Advanced Authentication Market is estimated to grow at a CAGR of 12% during the forecast period 2017-2023 Advanced Authentication Market Highlights: A number of credentials systems are used in the market to gain access such as username or password, which can access multiple systems by saving them in database. However, in the recent years many high profiles breaches were reported, which triggered awareness among public about importance of security measures. Thus, security firms and IT developers are more focused on developing advanced authentication techniques, which can...

Read More

One Identity named Leader in PAM and IAM by KuppingerCole

One Identity has announced it was named a Leader in KuppingerCole’s 2019 Leadership Compass for Privileged Access Management (PAM) report.   This recognition follows One Identity’s placement as Leader in KuppingerCole’s recent Leadership Compass for Identity Governance and Administration (IGA) report.  To compose the 2019 Leadership Compass PAM report, KuppingerCole lead analyst Anmol Singh evaluated the strengths and weaknesses of the 20 solution providers considered most significant in the PAM market. The report states, “One Identity...

Read More

Time to start thinking about AI regulation, says KuppingerCole

It is too early to start regulating artificial intelligence (AI) because there is not even a common definition or sufficient understanding of it, but it is not too early to start thinking about it and working towards a global consensus, says Karsten Kinast , legal expert and fellow analyst at KuppingerCole. “If we are to ensure that AI is able to bring the maximum benefit to society, we need to ensure that regulation is introduced as soon as practically possible and before it is too late, otherwise we run the risk of ending up with a mixture of ineffective, disjointed...

Read More

Cloud und Identity Security: DIE Trends der kommenden Monate

Identity Management und Cloud Computing sind untrennbar miteinander verbunden, wenn es darum geht, Governance-Konzepte für den Betrieb von Systemen in öffentlichen Cloudumgebung zu entwickeln und umzusetzen. Die Nutzung von Plattformdiensten in Providerrechenzentren erfordert ein Umdenken bei Architekten, Administratoren und Sicherheits-Verantwortlichen sowie die Entwicklung neuer Werkzeuge, um einen sicheren und effizienten Betrieb gewährleisten zu können. Big Data zum Sammeln und Machine Learning/AI zum automatisierten Auswerten von System-Protokollen gehören...

Read More

Microservices introduce hidden security complexity, analyst warns

Companies are rushing to climb aboard the microservices bandwagon, but they are not doing it for security reasons, warns Alexei Balaganski , lead analyst at KuppingerCole. “They are doing it for agility, reducing time to market, simplifying deployment and scalability in the cloud, which are all important, but they are not thinking about security at all,” he told Computer Weekly. When it comes to developing applications for new business functionality or revenue, said Balaganski, security is either not a priority or security teams are still working in isolation...

Read More

KuppingerCole weighs in on Privileged Access Management vendors in new report

Analyst firm KuppingerCole just released a new report—  Leadership Compass March 2019 vendor evaluation for Privileged Access Management (PAM) .  Over more than 60 pages, KuppingerCole analyst Anmol Singh provides a thorough review of 20 PAM vendors in a rapidly growing PAM market. He emphasizes, “PAM has emerged as one of the most crucial IAM technologies that has a direct relevance and impact on an organization’s cybersecurity program.” Singh rightly recognizes that PAM was “Once considered a technology option for optimizing administrative...

Read More

Zero trust is about more than products

Identity, and not the network, is at the centre of the zero-trust security model , according to John Tolbert , lead analyst at KuppingerCole . “Many people associate this approach with the network, but zero trust is really an architectural design principle,” he told Computer Weekly. “While a zero-trust security model is definitely applicable at the network level, it is about applying a notion of identity – specifically authentication and authorisation .” This ensures that all traffic within an enterprise is properly authenticated and...

Read More

Hitachi ID Recognized for Strength and Functionality of Privileged Access Management (PAM) Solution by Two Analyst Firms.

Two recently released analyst reports on Privileged Access have determined that companies investigating privileged access management solutions should consider Hitachi ID’s PAM product. Hitachi ID’s PAM secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability and an audit trail. In Ovum ’s white paper, “Hitachi ID Privileged Access Management” released March 15 th ,...

Read More

Best Practices for Adaptive Authentication

This is part four in a series of four posts on adaptive authentication and the KuppingerCole Leadership Compass Report. You can read the other posts as they are available here , here , and here . Today is our last blog post in our series on the KuppingerCole Leadership Compass for Adaptive Authentication 2018 report . So far we’ve talked about the benefits of adaptive authentication , evaluating solutions for your organization , and how adaptive authentication functions during an attack ....

Read More

European Identity & Cloud Conference 2019

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, visionaries, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.


Read More

Insurance companies in the US collaborate to offer cyber-security ratings

In a collaborative effort, some of the world’s largest insurers have set out to create a consumer ratings service for the cyber-security industry. The initiative was launched last week in the US, led by Marsh & McLennan, and will attempt to score best products to reduce hacking risks and will create an assessment of the best cyber-security offerings available to businesses, according to the Wall Street Journal. The firm will collect and combine scores from participating insurers and will ultimately identify and rate products, offerings and services they believe will be...

Read More

BeyondTrust als ein PAM-Leader im KuppingerCole Leadership Compass für Privilege Management 2019 eingestuft

BeyondTrust, globaler Marktführer für Privileged Access Management, wird im KuppingerCole-Bericht „ 2019 Leadership Compass for Privilege Management “ als ein Leader eingestuft. Die neueste Auszeichnung reiht sich in mehrere Positivbewertungen unabhängiger Analysten ein, die in den vergangenen Wochen insbesondere BeyondTrusts Innovations- und Wachstumsstärke herausgestellt haben. In jeder Bewertungskategorie der KuppingerCole-Analysten wird BeyondTrust als einer der Marktführer eingestuft — unter anderem als Leader in den Kategorien Gesamt,...

Read More

6 Leaders in the KuppingerCole PAM Leadership Compass 2019

In the PAM Leadership Compass 2019, KuppingerCole Lead Analyst Anmol Singh evaluates the strengths and weaknesses of the 19 solution providers considered most significant in the market. The PAM Leadership Compass 2019 bases its evaluations on each solution’s market position and product innovation. Additionally, analysts also incorporate advisory projects, customer feedback, technical forums, and a detailed questionnaire in their report ratings. The 19 solution providers listed in the KuppingerCole PAM Leadership Compass 2019 include ARCON, BeyondTrust, CA Technologies,...

Read More

Thycotic Earns Leadership Designation in New KuppingerCole Leadership Compass for Privileged Access Management (PAM)

Thycotic, a provider of privileged access management (PAM) solutions to 10,000 organizations worldwide, today announced it has been designated a PAM leader in analyst firm KuppingerCole’s Leadership Compass.  The KuppingerCole Leadership Compass, which provides an overview of vendors and their products in the PAM market, considered Thycotic “one of the most crucial IAM (Identity Access Management) technologies that have a direct relevance and impact on an organization’s cybersecurity program.” Noting Thycotic’ s tremendous growth over the last several...

Read More

Evaluating adaptive authentication for your organization

This is part two in a series of four posts on adaptive authentication and the KuppingerCole Leadership Compass Report. You can read part one available here . Today we’re going to continue our four-part series on the KuppingerCole Leadership Compass for Adaptive Authentication report and talk about evaluating solutions. Previously we covered why adaptive authentication is so effective at providing strong security and a seamless user experience. If you haven’t read the report yet, you can still download it for...

Read More

Avoid Getting Rained On: Keep Your Data Secure in Your Cloud

As we finally move on from the cold grips of winter to the (hopefully) warmer weather of spring, I’ve been out visiting with CISOs, IT Directors, and CSOs in an effort to find out what their key initiatives are going to be in 2019. Some things (like block chain) seem to have started to drop off the radar, as something does every year. Not surprisingly, data security and privacy are a hot item again – one only needs to quickly scan their daily newsfeed to find evidence of why. The realization and use of data analytics for customer insights was of course still en vogue. One that...

Read More

3 Ways How Data Security Enables Big Data Innovation

You might not realize it, but if you are involved in an innovation project that is aiming to generate additional business value by leveraging data and analytics, your success very much depends on your organization’s CISO and the team around that function. Don’t believe me? Well, read on. We know that BIG DATA is EVERYWHERE. In fact, it has gotten so pervasive that Gartner is starting to change their use of the term Big Data to simply “data and analytics." Because, well, that is what Big Data is all about, isn’t it? Today’s analytics have become more...

Read More

6 Leaders in the KuppingerCole Leadership Compass: Cloud-Based MFA

Late last month, international analyst firm KuppingerCole released the latest iteration of its Leadership Compass report for Cloud-Based MFA Solutions . In its 2018 Leadership Compass for Cloud-Based MFA Solutions, Leader Analyst and Managing Director John Tolbert evaluate the strengths and weaknesses of the 12 products they consider the most significant in the market. The KuppingerCole Leadership Compass for Cloud-Based MFA Solutions bases its evaluations on their products’ innovativeness, market position, and financial strength. The analysts also incorporate their...

Read More

Auth0 Announces Growth in DACH (Germany, Austria, Switzerland)

Auth0 , a global leader in Identity-as-a-Service (IDaaS), today announced the company’s growth in the DACH region (Germany, Austria, and Switzerland). Nearly 30 enterprise companies in DACH are already using Auth0’s Universal Identity Platform to modernize their identity management and achieve compliance with data protection laws. DACH companies are trending toward the cloud, according to Martin Kuppinger, founder and principal analyst at KuppingerCole: “We are seeing a strong increase in demand for Identity API platforms that partners, customers, and consumers can...

Read More

European Identity & Cloud Conference 2019

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, visionaries, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. With five parallel tracks, more than 200 international speakers and experts, many Best Practice presentations and 120 hours of relevant content,...

Read More

Cloud Database Security—What Is There to Know?

Here are some interesting facts that we’ve recently uncovered about cloud database security in the Oracle and KPMG Cloud Threat Report 2019 : 73 percent of respondents feel the public cloud is more secure than what they can deliver in their own data center and are moving to the cloud 71 percent of organizations indicated that a majority of this cloud data is sensitive—up from 50% last year 30% cited the inability of existing network security controls to provide visibility into cloud-resident server workloads as a cloud security challenge 92% of organizations...

Read More

KuppingerCole Names ForgeRock Most Innovative in Access Management and Federation Leadership Compass

ForgeRock®, the leading platform provider of digital identity management solutions, announced today it achieved an Overall Leadership position in the KuppingerCole Leadership Compass for Access Management and Federation. This follows ForgeRock’s impressive showing in KuppingerCole’s Leadership Compass for Customer Identity and Access Management (CIAM) platforms. As the only IAM provider to support multi-cloud deployments of millions of identities by leveraging Kubernetes, ForgeRock demonstrates visionary leadership in the Identity and Access Management market. The...

Read More

RSA 2019 Sessions You Should Have on Your Calendar

It’s not exactly “crunch time” yet, but we’re getting there. Three weeks from today tens of thousands of cybersecurity professionals will swarm into San Francisco and the Moscone Center for the 2019 RSA Conference. I already told you that if you are attending RSA 2019 , you should plan ahead to make sure you get the most out of the event. Now I am going to give you guidance on specific sessions I think you should attend if you want to get the most out of the conference. Vendor parties and collecting swag are both perfectly valid things to do, but the parties...

Read More

Identity Leader LoginRadius Accelerates Growth with New Toronto Office

LoginRadius Inc., the leading provider of cloud-based customer identity and access management (CIAM) solutions, just opened the doors to their new Toronto office. The move is aimed at better serving clients in eastern North America and globally, as well as supporting the company’s plans for expansion in these territories. “With increasing cybersecurity threats and the need to deliver a modern customer experience, the demand for a cloud-based customer identity platform is growing,” said Rakesh Soni, CEO and Cofounder of LoginRadius. “To keep up with that...

Read More

KuppingerCole Names Ping a Leader in Customer IAM--Three Years Running

Customer experience is a top differentiator for today’s digital businesses, so it’s no surprise that customer identity and access management (CIAM) is one of the fastest-growing areas in the identity space. CIAM is rapidly evolving to meet the challenges of creating secure user experiences that are consistent across all channels, as well as providing business benefits such as enhanced compliance with regulations like GDPR and PSD2 .   For that past three years, KuppingerCole has been tracking the growth and advancement in this space with its annual Leadership...

Read More

Ping Identity Named Market Leader in Latest KuppingerCole Report

Ping Identity, the leader in Identity Defined Security, today announced it has been named an overall leader in the latest “KuppingerCole Leadership Compass for CIAM Platforms” report. According to the research, customer identity and access management (CIAM) “has emerged in the last few years to meet evolving business requirements. Many businesses and public sector organisations are finding that they must provide better digital experiences for and gather more information about the consumers who are using their services.” Effective CIAM may go beyond traditional...

Read More

Ping Identity Named Market Leader in Latest KuppingerCole Customer Identity and Access Management Report

Ping Identity , the leader in Identity Defined Security, announced it has been named an overall leader in the latest “KuppingerCole Leadership Compass for CIAM Platforms” report . According to the research, customer identity and access management (CIAM) “has emerged in the last few years to meet evolving business requirements. Many businesses and public sector organizations are finding that they must provide better digital experiences for and gather more information about the consumers who are using their services.” Effective CIAM may go beyond traditional...

Read More

PATECCO Takes Part in European Identity & Cloud Conference 2019 as a Gold Sponsor

The German IAM company PATECCO will be a Gold Sponsor, for a second time, at European Identity & Cloud Conference 2019 . The event is organised by the analyst comany – Kuppingercole – and will take place from May 13-17, 2019, at INFINITY Ballhaus Forum Munich, Germany. EIC 2019 is known as Europe’s leading event for Identity and Access Management (IAM), Customer Identity and Access Management, and Cloud Security. Its audience includes hundreds of end users, executives, worldwide leading vendors, thought leaders, principal analysts and international top-speakers....

Read More

Microsoft : gains strong customer, analyst momentum in cloud access security brokers market

After a strong year of product updates and innovations, we're excited to so see that Microsoft jumped into the Challenger position in Gartner's 2018 Magic Quadrant for Cloud Access Security Brokers (CASB) and solidified its leadership position in KuppingerCole's 2018 Leadership Compass in the same product category, backed by strong customer adoption rates. CASBs give organizations the ability to securely embrace the possibilities of their cloud apps and services and they can be crucial in driving a successful cloud security strategy. While the market for CASB is still relatively...

Read More

8 API Trends for 2019

Here are 8 API trends to watch in 2019. We identified the following ways for companies to grow and scale healthy API programs. How are companies leveraging APIs to deliver results? 1. End-to-end experience Consider the APIs your organization built to serve employees, customers, and partners. Are the APIs available in your organization to cover business and technical scenarios to deliver a seamless experience for each touch point? How compelling is the experience for your internal and external customers to keep returning? Senior .NET developer, James Hickey , explains...

Read More

LoginRadius Named Global CIAM Leader by Identity Research Firm KuppingerCole

LoginRadius, an identity company that empowers businesses to provide secure, delightful experiences for customers, announced today that it has been acknowledged as an Overall Leader in the KuppingerCole Leadership Compass for CIAM platforms. In addition, LoginRadius was recognized in the areas of Market, Product, and Innovation Leadership. KuppingerCole is a leading global research firm specializing in information security, identity and access management (IAM), and digital transformation. “KuppingerCole’s report further validates the leadership position of...

Read More

5 Countries with GDPR-like Data Privacy Laws

GDPR wasn't the beginning and it certainly won't be the end. Strict data privacy legislation is appearing in more and more economies across the globe, meaning the list of “GDPR-free” havens is growing shorter by the day. CISOs and other data security executives at globally operating organizations will have no choice but to adopt a cross-regulatory compliance strategy in order to keep up. That is why Martin Kuppinger, Principal Analyst at KuppingerCole, lists cross-regulatory compliance among his  top 5 topics for CISOs in 2019 . Cross-regulatory...

Read More

Microsoft gains strong customer and analyst momentum in the Cloud Access Security Brokers (CASB) market

After a strong year of product updates and innovations, we’re excited to so see that Microsoft jumped into the Challenger position in Gartner’s 2018 Magic Quadrant for Cloud Access Security Brokers (CASB) and solidified its leadership position in KuppingerCole’s 2018 Leadership Compass in the same product category, backed by strong customer adoption rates. CASBs give organizations the ability to securely embrace the possibilities of their cloud apps and services and they can be crucial in driving a successful cloud security strategy. While the market for CASB is...

Read More

KuppingerCole: iWelcome for 3rd time Global CIAM Technology Leader

iWelcome, the first and still most mature IAM as-a-Service provider with European roots, announces that for the 3rd year in a row, it has been recognised 'Product Leader', 'Innovation Leader' and 'Technology Leader' in the Global Consumer Identity & Access Management (CIAM) category by KuppingerCole analysts in their Leadership Compass for CIAM Platforms.  Lead Analyst at KuppingerCole, John Tolbert, emphasises iWelcome’s flexible customer registration processes, strong security features and excellent support for GDPR with granular consent management . Tolbert:...

Read More

The (Re-)Emergence of Zero Trust

As we enter 2019, we’re still facing massive cyber-attacks that expose the sensitive data of millions of people and impact businesses both from a reputational and material perspective. To address these challenges, the use of a Zero Trust model has returned to the spotlight after more and more analyst firms provided their stamp of approval. Contributing to the momentum, early adopters like Google have published Zero Trust success stories, detailing the benefits it has provided when it comes to minimizing their cyber risk exposure.  The Zero Trust model, first introduced...

Read More

European Identity & Cloud Conference 2019

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, visionaries, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. With five parallel tracks, more than 200 international speakers and experts, many Best Practice presentations and 120 hours of relevant...

Read More

Who Goes There? The Art of Digital Identity and Access Management

It may be the most fundamental of all existential questions: Who am I? In the physical world, the answer varies given the multiple roles we play in our family, professional and social lives. In the digital world, we often create our own digital identity and shape it with the choices we make online. And that’s a big cybersecurity problem. Identity and access management (IAM) isn’t just an element of security; it’s at the very core of it. The goal of any security solution is to empower defenders and keep attackers out — or at least to detect threats and limit...

Read More

The Best Cloud Security Conferences to Attend in 2019

Securing any cloud infrastructure is a big job. You need to be constantly up to date on skills, tools, and technology, as well as the vulnerabilities and threats that crop up continuously. When it comes to security, becoming stagnant is not an option. A good cloud security professional only remains on top by keeping up with the latest cloud security trends, emerging threats, and best practices. That’s where cloud security conferences come in, bringing together top experts, cloud security thought leaders, and industry professionals to share tips, tricks, and the latest tactics...

Read More

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

News