Security

Blog

The Cargo Cult of Cybersecurity

I’ve been working in IT my whole life and since I’ve joined KuppingerCole over ten years ago, cybersecurity has been my job. Needless to say, I like my job: even though we industry analysts are not directly involved in forensic investigations or cyberthreat mitigation, being…

Webinar

Sep 04, 2017: Security Benefits of Cloud Solutions

While organizations are becoming increasingly eager to embrace the cloud for multiple business benefits, for CISOs and CIOs these efforts bring new challenges to understand and evaluate security and privacy impacts by introducing cloud solutions to their enterprises. Adopting cloud services…

Executive View

Executive View: SAP Fraud Management - 71182

SAP Fraud Management leverages the power and speed of the SAP HANA platform to detect fraud earlier, improve the accuracy of detection and uses predictive analytics to adapt to changes in fraud patterns.

Leadership Compass

Leadership Compass: Cloud Access Security Brokers - 72534

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

Executive View

Executive View: eperi Encryption Gateway - 70619

eperi provides an encryption gateway for data stored in the cloud, based on a unique flexible approach based on templates that specify which data should be  encrypted and how. Combined with built-in indexing capabilities, the product enables fully transparent and infinitely extensible…

Advisory Note

Buyer’s Guide: Ransomware Protection - 72599

Ransomware is a global cybersecurity threat. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for…

Advisory Note

Advisory Note: Understanding and Countering Ransomware - 70282

Ransomware is a top security threat and continuously on the rise. Financial organizations, healthcare institutions, and manufacturing industries are the most vulnerable groups; however, individual users as well have been victims of ransomware. The purpose of this Advisory Note is to analyze…

Blog

A Short History of EIC - Europe's Leading Event on Digital ID & Transformation

More than 12 years ago, the first EIC attracted an already surprisingly large number of practitioners dealing with directory services, user provisioning and single sign-on, as well as vendors, domain experts, thought leaders and analysts. I remember Dick Hardt giving an incredibly visionary…

Executive View

Executive View: Deep Secure Content Threat Removal Platform - 71311

The Content Threat Removal  Platform by Deep Secure provides comprehensive on - the - fly analysis of incoming data, extracting only the useful business information while eliminating malicious content and then reconstructing new clean data for delivery. In this way, it defeats zero -…

Webinar

Sep 26, 2017: The Crucial Role of Identity in Securing Industrial IoT

As more and more consumers, businesses, public sector companies and even whole countries are embracing the Digital Transformation, smart devices of all types are proliferating in all areas of our daily lives. It is safe to say, however, that, after the initial rush of making every device in…

Leadership Brief

Leadership Brief: Schutz gegen Ransomware - 70336

Ransomware (Erpressungssoftware) ist eine Epidemie. Prävention ist die beste Strategie. Geben Sie nicht auf und bezahlen Sie kein Lösegeld.

Congress

May 15 - 18, 2018: European Identity & Cloud Conference 2018

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought…

Executive View

Executive View: Microsoft Azure Stack - 72592

Microsoft Azure Stack is an integrated hardware and software platform for delivering Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) services of Microsoft Azure public cloud on premises, providing a truly consistent hybrid cloud platform for a wide variety of business…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

Privileged Access Management Can Take on AI-Powered Malware to Protect Identity-Based Computing

Much is written about the growth of AI in the enterprise and how, as part of digital transformation, it will enable companies to create value and innovate faster. At the same time, cybersecurity researchers are increasingly looking to AI to enhance security solutions to better protect organizations against attackers and malware. What is overlooked is the same determination by criminals to use AI to assist them in their efforts to undermine organizations through persistent malware attacks. The [...]