Advisory Note: EIC 2015 Trends and Hot Topics - 71301

Report Details

10 Information Security topics that were central at European Identity & Cloud Conference 2015


Date Title Price
May 26, 2015

Advisory Note: EIC 2015 Trends and Hot Topics - 71301

10 Information Security topics that were central at European Identity & Cloud Conference 2015

free Get Access

Latest Related Reports

Executive View

Executive View: Microsoft Security Suite - 72541

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

Leadership Compass

Leadership Compass: CIAM Platforms - 71171

Leaders in innovation, product features, and market reach for Consumer Identity and Access Management Platforms.  Your compass for finding the right path in the market.

Executive View

Executive View: Boldon James – Data Classification - 72508

Data classification is a requirement of every security framework. More importantly it should be key part of any organization’s control framework, by clearly informing the person (or system) handing the information, whether an employee of the company or an external entity, how that…

Advisory Note

Advisory Note: The Blockchain and Life Management Platforms - 71606

The core features of blockchains - decentralization and algorithmic consensus – can enable the creation of Life Management Platforms (LMPs) with better security and availability, as well as promote wider public adoption by providing independently-verifiable proof of personal data…

Advisory Note

Advisory Note: The Disruptive Potential of Blockchains in IoT Security - 71612

Blockchains have the ability offer many solutions regarding the security concerns currently limiting the growth of the Internet of Things (IoT). Blockchains, combined with other decentralised, peer-to-peer technologies can improve IoT security by enabling authenticity and integrity…

Executive View

Executive View: ForgeRock Identity Gateway - 71318

ForgeRock Identity Gateway is a centralized proxy-based gateway enabling secure access and policy enforcement for web applications, APIs, devices and things. 

Executive View

Executive View: Bomgar Privileged Access Management - 71307

Bomgar Privileged Access Management is a comprehensive solution for managing, controlling and monitoring secure privileged access to critical systems. It implements administrative session management and recording while providing collaboration within sessions and integrates with enterprise…

Executive View

Executive View: Balabit Contextual Security Intelligence Platform - 71306

Contextual Security Intelligence is a new IT security concept, which states that additional levels of security controls restricting business performance should be avoided and replaced with more efficient monitoring tools. Balabit’s CSI Platform combines Log Management, Privileged…

Executive View

Executive View: PointSharp Mobile Gateway - 71508

PointSharp Mobile Gateway is an enterprise mobility solution that provides strong authentication and easy, yet secure, mobile access to Microsoft Exchange and Skype for Business, both on-premise and in the cloud.  

Executive View

Executive View: AirWatch Content Locker - 71505

For organizations trying to provide an attractive user experience while protecting corporate information, the continuing rise in popularity of mobile devices, connecting from both inside and outside the corporate network, is a trend that can be frustrating. For organizations with…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

GDPR as opportunity to build trusted relationships with consumers

During the KuppingerCole webinar run March 16th, 2017, which has been supported by ForgeRock, several questions from attendees were left unanswered due to a huge number of questions and a lack of time to cover them all. Here are answers to questions that couldn’t be answered live during the [...]

Latest Insights

Hot Topics

Spotlight

Learn more

Security Operations Center

Today, the Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes for them to decide whether an [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00