System and Network Security

Executive View

Executive View: CipherCloud Trust Platform - 72530

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services.…

Executive View

Executive View: Skyhigh Cloud Security Platform - 72532

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services.…

Blog

AWS re:Invent 2016 Blog

In the last week of November I attended the AWS re:Invent conference in Las Vegas – this was an impressive event with around 32,000 attendees. There were a significant number of announcements at this event; many were essentially more of the same but bigger, better based on what…

Blog

GlobalPlatform Conference Review

GlobalPlatform recently held their annual conference in Santa Clara, California. GlobalPlatform is an international standards organization that defines specifications for the Trusted Execution Environment (TEE), or the secure virtual operating system within the OSes of mobile devices. It…

Blog

Democratized Security

At the AWS Enterprise Security Summit in London on November 8th, Stephen Schmidt, CISO at AWS gave a keynote entitled “Democratized Security”.  What is Democratized Security and does it really exist?  Well, to quote Humpty Dumpty from the book Alice in Wonderland…

Executive View

Executive View: Vaultive Cloud Data Security Platform - 72533

The data held in office productivity suites like Office 365 spans the whole operation of an organization from the board to the shop floor.  This makes it imperative that it is protected against risks of leakage and unauthorized disclosure.  Vaultive cloud data security provides an…

Webcast

Sicherheit in den operativen Systemen der Industrie 4.0

Unter dem Begriff Operational Technology werden die Technologien zusammengefasst, die die Transformation von Waren und Dienstleistungen betreffen, etwa in produzierenden Unternehmen oder bei Energieversorgern (ICS: Industrial Control Systems & SCADA: Supervisory Control and Data…

Webcast

Enabling Cloud Access While Ensuring Security and Compliance

The cloud and mobile revolutions have changed the way we work and the very nature of IT. But these advances have also created immense new challenges and risks to security, data protection and compliance. In order to address these risks the Cloud Access Security Broker (CASB) market has…

Blog

It’s not about security vs. safety – it is about security and safety

When you’ve ever been involved in discussions between IT Security people and OT (Operational Technology, everything that runs in manufacturing environments) people – the latter not only security guys – you probably observed that such discussions have a tendency of not being…

Blog

Industrial Internet of Things: New Driver for the Digital Transformation

Last time we’ve devoted an issue of our monthly newsletter to the Internet of Things was almost a year ago. Looking back now, we can already spot a number of significant changes in this field that happened during the year 2016. Perhaps, the most profound one is that the industry has…

Webcast

Cloud-Risiken jederzeit rundum mit zentralen Dashboards kontrollieren

Ein neuer Service vereint Web, Email und Cloud Application Control auf einer Sicherheitsplattform. Dies ermöglicht Organisationen Sicherheitsmaßnahmen flexibel umzusetzen und die Nutzung von Web-, Email- und Cloudanwendungen von einem einzigen Management-Dashboard aus zu…

Webcast

Rising to the Security Challenge of Heavy Cloud Adoption

A good IT Cloud Strategy must not only specify a cloud direction but also the expected interactions between business units, customers, suppliers and competitors. It has to be well-aligned with the organization’s business drivers, principles and strategies. In a rapidly changing…

Webinar

Nov 17, 2016: Sicherheit in den operativen Systemen der Industrie 4.0

Unter dem Begriff Operational Technology werden die Technologien zusammengefasst, die die Transformation von Waren und Dienstleistungen betreffen, etwa in produzierenden Unternehmen oder bei Energieversorgern (ICS: Industrial Control Systems & SCADA: Supervisory Control and Data Acquisition).

Webcast

Cloud Access Security and Enterprise Mobility - Better Together

For years, Enterprise Mobility Management (EMM) solutions have been the primary choice for companies to enable secure mobile access to enterprise applications. However, many experts believe that EMMs are the thing of the past, not being able to deal with cloud services and causing too much…

Webinar

Nov 15, 2016: Enabling Cloud Access While Ensuring Security and Compliance

The cloud and mobile revolutions have changed the way we work and the very nature of IT. But these advances have also created immense new challenges and risks to security, data protection and compliance.

Webinar

Oct 11, 2016: Rising to the Security Challenge of Heavy Cloud Adoption

Many enterprises have decided on a “cloud first” strategy, or have seen heavy cloud adoption evolve spontaneously as their business units embrace cloud for cost savings, agility or other competitive imperatives. In the course of this development, security teams face difficult challenges…

Leadership Compass

Leadership Compass: Cloud Access Security Brokers - 71138

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

Webinar

Sep 29, 2016: Cloud Access Security and Enterprise Mobility – better together

Let’s face it: cloud services have already become an integral part of every company’s IT infrastructure. They provide immense benefits, helping adopt new business models and emerging technologies quickly, addressing constantly changing customer demands and reducing costs and administration…

Blog

Firewalls Are Not So Dead

Martin Kuppinger talks about firewalls and the fact that they are not really dead.

Webinar

Oct 21, 2016: Cloud-Risiken jederzeit rundum mit zentralen Dashboards kontrollieren

Organisationen weltweit stehen vor den gleichen Sicherheitsherausforderungen. Sie müssen Mitarbeitern ermöglichen, mit einer Vielzahl von Endgeräten über die Cloud auf Dienste zuzugreifen, um auch außerhalb der Unternehmensmauern überall und jederzeit produktiv ihren Aufgaben nachgehen zu…

Blog

Microsoft Azure Security Center

Last week, Microsoft has announced the general availability of the Azure Security Center – the company’s integrated solution for monitoring, threat detection and incident response for Azure cloud resources. Initially announced last year as a part of Microsoft’s new…

Executive View

Executive View: Sophos Protection for Amazon Web Services - 71680

Sophos UTM is a suite of integrated security applications that provides the same layered protection for applications and data hosted in the AWS cloud as for on premise deployments. This report provides a review of the functionality provided by this set of products and an assessment of its…

Advisory Note

Advisory Note: The Disruptive Potential of Blockchains in IoT Security - 71612

Blockchains have the ability offer many solutions regarding the security concerns currently limiting the growth of the Internet of Things (IoT). Blockchains, combined with other decentralised, peer-to-peer technologies can improve IoT security by enabling authenticity and integrity…

Congress

May 09 - 12, 2017: European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family…

Executive View

Executive View: ForgeRock Identity Gateway - 71318

ForgeRock Identity Gateway is a centralized proxy-based gateway enabling secure access and policy enforcement for web applications, APIs, devices and things. 

Webcast

Managing Risk through Cloud App Authentication and 360° Control

The easy availability of IT services delivered as cloud services together with the revolution in the range of devices that are used to access these services has created challenges for organizations in the areas of security and compliance. Employees and associates can use their personal cloud…

Blog

IoT (or IoEE): Product Security Is Becoming a Strategic Risk

For a long time, IT risks have been widely ignored by business people, including Corporate Risk Officers (CROs) and C-level management. This has changed recently with the increasing perception of cyber-security risks. With the move to the IoT (Internet of Things) or, better, the IoEE…

Blog

Complexity Kills Agility: Why the German Reference Architecture Model for Industry 4.0 Will Fail

The German ZVEI (Zentralverband Elektrotechnik- und Elektroindustrie), the association of the electrical and electronic industries, and the VDI (Verein Deutscher Ingenieure), the association of German engineers, has published a concept called RAMI (Referenzarchitekturmodell Industrie 4.0).…

Webcast

Dimitra Kamarinou - From Suppliers to Consumers: Issues of Liability in Industry 4.0

This session looks at the responsibilities and liabilities of organisations involved in the ‘smart manufacturing’ process both internally (e.g. towards employees) and externally (e.g. other organisations, suppliers, consumers, the environment) and at the difficulties of…

Webcast

Luigi de Bernardini - Industry 4.0 and IIoT: Different Approaches to a Smarter Industry?

In most cases, the terms Industry 4.0 and Industrial Internet of Things (IIoT) are used interchangeably. But these two terms, though referring to similar technologies and applications, have different origins and meanings. Industry 4.0 is focused specifically on the manufacturing industry…

Webcast

Transforming Governance, Security and Compliance

The number of companies investing in modern “Big Data”-type SAP products and cloud-based SAP deployment models is growing constantly. Having formerly been stored in standalone database silos, SAP information from CRM, ERP etc. for Big Data deployments is now being migrated to a central…

Webcast

Jackson Shaw - The Internet of Things One Year Later

Last year we had our first discussion of risk and value related to IoT. Over the last 12 months we have gone from “What is this IoT?” to IoT becoming a driver of digital transformation. All of the major platform (PaaS) players have made IoT a key part of their strategies. In…

Webcast

The Future of Mobile Authentication: Strong, Adaptive, Intelligent

The unstoppable march of cloud, mobile and social computing in the recent years has made a profound impact on our society. Exponential growth of corporate digital assets combined with the overwhelming proliferation of mobile devices put enormous pressure on modern businesses to become…

Webcast

Lessons learnt from the Ukraine's ‘Lights Out’ Attack

When cyber attackers can bring down something as impactful as the power grid, the way we think about security needs to change. Michael Kleist of CyberArk explains more.

Webinar

Jun 23, 2016: Managing Risk through Cloud App Authentication and 360° Control

The easy availability of IT services delivered as cloud services together with the revolution in the range of devices that are used to access these services has created challenges for organizations in the areas of security and compliance. Employees and associates can use their personal cloud…

Blog

Bridging the Gap Between IT, OT and Business in the Digital Transformation Age

The Digital Transformation age is focussed on integrating digital technologies such as social, mobile, manufacturing, cloud computing etc.  It will inherently lead to new types of innovation and creativity and is already having far reaching application across business, government,…

Executive View

Executive View: Signicat Connect, Assure, Sign & Preserve - 72504

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. With these services, Signicat supports organizations in transforming paper-based processes to cloud-based services, while…

Executive View

Executive View: PointSharp Mobile Gateway - 71508

PointSharp Mobile Gateway is an enterprise mobility solution that provides strong authentication and easy, yet secure, mobile access to Microsoft Exchange and Skype for Business, both on-premise and in the cloud.  

Executive View

Executive View: AirWatch Content Locker - 71505

For organizations trying to provide an attractive user experience while protecting corporate information, the continuing rise in popularity of mobile devices, connecting from both inside and outside the corporate network, is a trend that can be frustrating. For organizations with…

Webinar

May 17, 2016: The Future of Mobile Authentication: Strong, Adaptive, Intelligent

The unstoppable march of cloud, mobile and social computing in the recent years has made a profound impact on our society. Exponential growth of corporate digital assets combined with the overwhelming proliferation of mobile devices put enormous pressure on modern businesses to become…

Blog

Microsoft Security Announcements

With RSA kicking off this week, security experts from around the world are getting ready for a flurry of announcements from security vendors. Last Friday, it was Microsoft’s turn, and the company’s CISO Bret Arsenault has publicly announced some interesting news. The motto of the…

Webinar

May 24, 2016: Transforming Governance, Security and Compliance

The number of companies investing in modern “Big Data”-type SAP products and cloud-based SAP deployment models is growing constantly. Having formerly been stored in standalone database silos, SAP information from CRM, ERP etc. for Big Data deployments is now being migrated to a central…

Blog

Beyond Datacenter Micro-Segmentation – start thinking about Business Process Micro-Segmentation!

Sometime last autumn I started researching the field of Micro-Segmentation, particularly as a consequence of attending a Unisys analyst event and, subsequently, VMworld Europe. Unisys talked a lot about their Stealth product, while at VMworld there was much talk about the VMware NSX product…

Webinar

Mar 15, 2016: Whitelisting und darüber hinaus

Nicht Server und Cloud, sondern die Arbeitsplatzrechner von Unternehmensmitarbeitern stellen die große Masse der Unternehmens-IT dar. Damit steht jeder Arbeitsplatzrechner im Fokus potentieller Angreifer und muss nachhaltig vor einer Vielzahl von internen wie externen Angriffen und…

Blog

AWS IoT Suite

After an “extended holiday season” (which for me included spending a vacation in Siberia and then desperately trying to get back into shape) it’s finally time to resume blogging. And the topic for today is the cloud platform for IoT services from AWS, which went out of beta…

Executive View

Executive View: IBM Cloud Security Enforcer - 71523

IBM Cloud Security Enforcer is a cloud-delivered solution that provides cloud application visibility, identity and access management, and threat prevention.

Blog

Secured by Design: The smart streets of San Francisco

On April 18th 1906, an earthquake and fires destroyed nearly three quarters of San Francisco. Around 3000 people lost their lives. Right up to the present many other, less critical tremors followed. The danger of another catastrophe can’t be ignored. In a city like San Francisco,…

Leadership Brief

Leadership Brief: Join the Dots: Operational Technology and Informational Technology - 72012

One area of information technology that is typically ignored by IT departments and consultants is industrial control systems. This is unfortunate because these “operational technology” systems have much to benefit from interconnection with IT networks.  

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog (Deutsch)

Stell Dir vor, es ist KRITIS und keiner geht hin

„Kritische Infrastrukturen (KRITIS) sind Organisationen oder Einrichtungen mit wichtiger Bedeutung für das staatliche Gemeinwesen, bei deren Ausfall oder Beeinträchtigung nachhaltig wirkende Versorgungsengpässe, erhebliche Störungen der öffentlichen Sicherheit oder andere dramatische Folgen eintreten würden“. Neun Sektoren und 29 Branchen gelten derzeit als kritische Infrastrukturen, darunter die Gesundheitsversorgung, Energieversorgung, der Verkehr [...]