Software Security

Blog

Building APIs without programming? New tools from CA make it possible

Last week, CA Technologies has announced several new products in their API Management portfolio. The announcement was made during their annual CA World event, which took place November 16-20 in Las Vegas. This year, the key topic of the event has been Application Economy, so it is completely…

Webcast

Controlling Access through Centralized Authorization

Access to applications have been managed effectively for the most part, through authentication and identity management. This has driven the combination of ease of use and security behind explosive growth of consumer and enterprise applications. However, with the proliferation of connected…

Webinar

Nov 12, 2015: Controlling Access through Centralized Authorization

Access to applications have been managed effectively for the most part, through authentication and identity management. This has driven the combination of ease of use and security behind explosive growth of consumer and enterprise applications. However, with the proliferation of connected…

Executive View

Executive View: Amazon API Gateway - 71451

Amazon API Gateway is a fully managed solution for publishing, maintaining and monitoring APIs. By providing tight integration with existing AWS cloud infrastructure, security and identity services, it enables exposing existing backend services or creating new ones quickly, without the need…

Webcast

The CISO Imperative: Taking Control of SAP Cyber Attacks

It is impossible to overestimate the importance of SAP system security for modern enterprises. SAP solutions are widely used in all industries to store sensitive information and run critical business processes: from Enterprise Resource Planning and Human Resources systems to Business…

Executive View

Executive View: Axiomatics – Beyond Database Security - 71270

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes.

Webcast

Vulnerability Assessment 2.0: Improving Accuracy and Reducing Costs with Behavior Analysis

Vulnerability scanners and management tools have been an important part of every information security specialist’s arsenal for decades. Nowadays, with the continued erosion of corporate perimeters and overwhelming increase in advanced targeted attacks exploiting known and unknown…

Webinar

Sep 29, 2015: The CISO Imperative: Taking Control of SAP Cyber Attacks

It is impossible to overestimate the importance of SAP system security for modern enterprises. SAP solutions are widely used in all industries to store sensitive information and run critical business processes: from Enterprise Resource Planning and Human Resources systems to Business…

Executive View

Executive View: Onapsis Security Platform - 71290

Onapsis Security Platform es una solución de seguridad para aplicaciones críticas de negocio en SAP. Una plataforma con conocimiento del contexto, segura y lista para la nube, que integra controles de vulnerabilidad y cumplimiento normativo, detección y respuesta a…

Executive View

Executive View: Onapsis Security Platform - 71290

Onapsis Security Platform ist eine Sicherheitslösung für kritische Unternehmensanwendungen in SAP-Umgebungen. Diese Sicherheitslösung bietet eine kontextsensitive, sichere und cloud-fähige Plattform, die Schwachstellen- und Compliance-Steuerung, Echtzeiterkennung und…

Leadership Brief

Leadership Brief: SAP Security Priorities - 72017

Changing enterprise infrastructures and the overall growing threat level influence the security of all vital business-supporting systems and processes. Identifying the priorities for securing your SAP infrastructure and maintaining appropriate security is a continuous business and…

Blog

Amazon enters another market with their API Gateway

What a surprising coincidence: on the same day we were preparing our Leadership Compass on API Security Management for publication, Amazon has announced their own managed service for creating, publishing and securing APIs – Amazon API Gateway. Well, it’s already too late to make…

Leadership Compass

Leadership Compass: API Security Management - 70958

This report provides an analysis of the market for API Management solutions with a strong focus on security features. Rapidly growing demand for publishing and consuming APIs, which creates new business models and communication channels, has introduced new security challenges. This…

Webinar

Sep 01, 2015: Vulnerability Assessment 2.0: Improving Accuracy and Reducing Costs with Behavior Analysis

Vulnerability scanners and management tools have been an important part of every information security specialist’s arsenal for decades. Nowadays, with the continued erosion of corporate perimeters and overwhelming increase in advanced targeted attacks exploiting known and unknown…

Executive View

Executive View: Axiomatics Policy Management Suite - 70895

An enterprise-grade policy administration tool for managing access control policies in the Axiomatics product suite.

Advisory Note

Advisory Note: EIC 2015 Trends and Hot Topics - 71301

10 Information Security topics that were central at European Identity & Cloud Conference 2015

Executive View

Executive View: FSP Identity Governance & Administration Suite ORG - 71269

Die FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance. Ein besonderer Vorteil des Produkts ist die Kombination von…

Analysts' View

KuppingerCole Analysts' View on Analytics

There is now an enormous quantity of data which is being generated in a wide variety of forms. However this data, in itself, has little meaning or value; it needs interpretation to make it useful. Analytics are the tools, techniques and technologies that can be used to analyze this data…

Executive View

Executive View: Onapsis Security Platform - 71290

Onapsis Security Platform is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform to integrate vulnerability and compliance controls, real-time detection and response, as well as advanced threat protection…

Congress

May 10 - 13, 2016: European Identity & Cloud Conference 2016

European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

Executive View

Executive View: Forum Sentry API Gateway - 71204

Forum Sentry API Gateway is an integrated solution for API and service security, access management and threat protection with a strong focus on “security by design”, certified encryption, and comprehensive support for API formats and protocols.

Advisory Note

Advisory Note: Information Security Predictions and Recommendations 2015 and beyond - 71045

Recommendations for investing in Information Security in 2015 and beyond. Predictions of the trends and hypes in Information Security in 2015. Advice on which of these trends and hypes to follow.

Executive View

Executive View: FSP Identity Governance & Administration Suite ORG - 71269

FSP Identity Governance & Administration Suite is a solution for managing the identity and access lifecycle, thus serving the market segment for Identity Provisioning and Access Governance. A particular strength of the product is its combination of role-based and policy-based access…

Webcast

Make your Enterprise Applications Ready for Customers and Mobile Users

Rapidly growing demand for exposing and consuming APIs, which enables organizations to create new business models and connect with partners and customers, has tipped the industry towards adopting lightweight RESTful APIs to expose their existing enterprise services and corporate data to…

Executive View

Executive View: ERPScan Security Monitoring Suite for SAP - 71262

ERPScan Security Monitoring Suite for SAP is an enterprise level solution for SAP security. By addressing vulnerability management, source code security and the analysis of Segregation of Duties (SoD) violations, it provides comprehensive security analytics covering all relevant aspects of…

Webinar

Apr 16, 2015: Make your Enterprise Applications Ready for Customers and Mobile Users

Rapidly growing demand for exposing and consuming APIs, which enables organizations to create new business models and connect with partners and customers, has tipped the industry towards adopting lightweight RESTful APIs to expose their existing enterprise services and corporate data to…

Executive View

Executive View: Axway API Management for Dynamic Authorization Management (DAM) - 71184

There are three major trends driving the adoption of Gateway solutions: Proliferation of inter-connected devices, The need for “bring-your-own-device” (BYOD) support and Migration to Cloud services. The economic imperative to move our databases and applications to the Cloud is…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

As You Make Your KRITIS so You Must Audit It

Organizations of major importance to the German state whose failure or disruption would result in sustained supply shortages, significant public safety disruptions, or other dramatic consequences are categorized as critical infrastructure (KRITIS). Nine sectors and 29 industries currently fall under this umbrella, including healthcare, energy, transport and financial services. Hospitals as part of the health care system are also included if they meet defined criteria. For hospitals, the [...]