Security

Webcast

KuppingerCole Analyst Chat: Privacy and Consent Management

Anne Bailey and Matthias Reinwarth discuss the findings of the recently published Leadership Compass on Privacy and Consent Management.

Executive View

ManageEngine Log360

Log360 from ManageEngine is a tightly integrated suite of log management and network security analytics tools. Complementing SIEM capabilities with EDR, DLP, and even SOAR functionality, it offers a convenient and affordable one-stop solution for security analytics and threat remediation…

Executive View

Radware Kubernetes WAF

Containerized microservices are gaining momentum in IT organizations today, requiring tools such as Kubernetes for automating the orchestration and management of those containers. The Radware Kubernetes WAF meets the unique requirements of the Kubernetes environment to protect its…

Leadership Compass

Privacy and Consent Management

This report provides an overview of the market for Privacy and Consent Management platforms and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative…

Webcast

KuppingerCole Analyst Chat: NIST’s Zero Trust Architecture

John Tolbert and Matthias Reinwarth look at SP 800-207, the NIST special publication on Zero Trust architecture and discuss how it aligns with KuppingerCole's own vision of this topic (spoiler: it does align very well!)

Webinar

Oct 28, 2020: Using Deception for Early and Efficient Threat Detection

Most organizations are benefiting from the scalability, flexibility, and convenience of modern cloud services and new, highly distributed hybrid corporate networks. Unfortunately, many have also learned the hard way that defense of these systems and the assets they contain continue to remain…

Blog

AI-Powered Data for All – Informatica's Acquisition of GreenBay Technologies

Informatica has just announced that they have made another acquisition this summer: GreenBay Technologies, a startup focused on AI and machine learning. Read about their July 2020 acquisition here. GreenBay Technologies brings CloudMatcher to Informatica’s Intelligent Data Platform…

Executive View

One Identity Active Roles

One Identity Active Roles is a powerful tool for integrated management of both on-premises Microsoft Active Directory and Microsoft Azure Active Directory. It comes with strong support for managing Exchange Servers and Office 365, but also Identity Lifecycle Management that supports a range…

Blog

A Look at NIST’s Zero Trust Architecture

NIST, the US National Institute for Standards and Technology, recently released SP 800-207 Zero Trust Architecture. The NIST special publication examines the principles of and motivations for ZTA, as well as implementation considerations, security concerns, and suggestions for improvements…

Webcast

KuppingerCole Analyst Chat: Is Quantum Computing an Imminent Security Threat?

Alexei Balaganski and Matthias Reinwarth try to make sense of the current state of quantum computing and talk about the risks it poses for information security.

Webcast

KuppingerCole Analyst Chat: The Pros and Cons of Agentless Security

John Tolbert and Matthias Reinwarth discuss benefits and limitations of agentless security solutions.

Executive View

SailPoint Predictive Identity

SailPoint Predictive Identity est une plate-forme SaaS qui ajoute à l’IGA des capacités reposant sur l'IA . Cela concerne notamment l'analyse des risques d'accès, l'examen des droits d'accès avec des recommandations de validation ou de révocation et…

Webinar

Nov 04, 2020: Operationalizing Least Privilege

Striking the balance between enabling users and administrators to be productive whilst protecting your sensitive systems and data is becoming ever more challenging. Attackers are often one step ahead of organizations, and even those with the most comprehensive security systems and controls…

Executive View

SailPoint Predictive Identity

SailPoint Predictive Identity ist eine SaaS-Plattform, die IGA um KI-basierte Funktionen erweitert. Dazu gehören unter anderem die Analyse von Zugriffsrisiken, Empfehlungen für die Genehmigung oder den Widerruf von Berechtigungen während der Berechtigungsprüfung und die…

Webinar

Oct 07, 2020: Techniques for Securing Transactions With Identity Verification and Verifiable Claims

Consumer and Workforce identities are under assault. Cybercrime and fraud are pervasive problems that have only escalated during the pandemic. Even as the number of online and mobile transactions increases, businesses, government agencies, and other organizations are actively searching for…

Blog

GCP Trust, Security and Compliance

In their race towards digital transformation, organizations are using cloud services to accelerate the development of new apps and improve efficiency. They allow new applications to be rapidly developed, existing applications to be modernized and deployed without additional capital spend.…

Executive View

BioCatch

BioCatch is an innovative Fraud Reduction Intelligence Platform (FRIP). Their three-part solution in this space consists of Policy Manager, Case Manager, and Analyst Station, which are used by fraud analysts and operations teams to determine appropriate actions in response to indicators.…

Webcast

Four Key Components Critical to the Future of Privileged Access Management

Privileged Access Management (PAM) has assumed a critical role in protecting the most valuable data and services within organizations from theft, loss, and unauthorized access. But as companies and other organizations have become more complex and embrace digital transformation, PAM is also…

Webinar

Sep 28, 2020: The Role of Data-Centric Security in the Cloud

As modern businesses across all verticals continue their rapid digitalization, the need to store, process and exchange data securely is becoming an essential factor for any company. However, this is particularly challenging for high-tech companies dealing with highly-sensitive R&D data.

Blog

What Some Vendors Missed in MITRE ATT&CK Round Two and How to Fix the Gaps

MITRE recently published the detailed results of their second round of tests. This test pitted APT29 malware and methods against 21 cybersecurity vendors. The MITRE testing is an excellent benchmark for comprehensively exercising Endpoint Protection (EPP) and Endpoint Detection &…

Leadership Brief

Incident Response Management

The probability of becoming a victim of a data breach is now higher than ever. The hyperconnected world and the ever-increasing complexity of modern IT systems and processes pose new challenges for IT staff.  All organizations must invest in an Incident Response Management plan.…

Webcast

KuppingerCole Analyst Chat: Questions to Ask Your Cloud Provider About Security

Alexei Balaganski and Matthias Reinwarth discuss the security challenges for enterprises moving to the cloud and explain why security in the cloud is still your responsibility.

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

Does Microsoft Double Key Encryption Help with Schrems II?

Does Microsoft Double Key Encryption Help with Schrems II?

On July 16th, 2020 the European Court of Justice issued its decision on the adequacy of the protection provided by the EU-US Data Protection Shield for the transfer of personal data for commercial purposes by an economic operator established in an EU Member State to another economic operator established in a third country.  The use of cloud services is now commonplace and has been increased due to the need for working from home due to the coronavirus pandemic.  In addition, [...]