Analyst details

Alexei Balaganski Lead Analyst

Duisburg / Germany

Experience:
20 years in IT industry
At KuppingerCole since 2007

Email    Blog    @balaganski    Profile   

Roles & Responsibilities at KuppingerCole:

Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO.

Background & Education:

Master degree in Mathematics and Computer science from Novosibirsk State Technical University.

   

Areas of coverage:

  • Network Security
  • Mobile Security
  • Cloud Security

Professional experience:

After graduating with an MSc degree in Mathematics and Computer science he has worked in the IT industry for over 15 years. His experience includes software development, network administration and information security. Before joining KuppingerCole in 2007, he has taken part in multiple IT projects including e-commerce, high-load and cloud applications.

Recent blog posts

Blog

Building a Future-proof Intelligent Security Operations Center, Part 2

Security Intelligence Platforms (SIP) are universal and extensible security analytics solutions that offer a holistic approach towards maintaining complete visibility and management of the security posture across the whole organization. Only by correlating both real-time and historical…

Blog

Building a Future-proof Intelligent Security Operations Center

I have to admit that I find the very concept of a Security Operations Center extremely… cinematic. As soon as you mention it to somebody, they would probably imagine a large room reminiscent of the NASA Mission Control Center – with walls lined with large screens and dozens of…

Blog

Big Data and Information Security Study

Since the notion of a corporate security perimeter has all but disappeared in the recent years thanks to the growing adoption of cloud and mobile services, information security has experienced a profound paradigm shift from traditional perimeter protection tools towards monitoring and…

Blog

Industrial Internet of Things: New Driver for the Digital Transformation

Last time we’ve devoted an issue of our monthly newsletter to the Internet of Things was almost a year ago . Looking back now, we can already spot a number of significant changes in this field that happened during the year 2016. Perhaps, the most profound one is that the industry has…

Blog

Cognitive Security: The Future of Cybersecurity is Now

The proverbial Computing Troika that KuppingerCole has been writing about for years does not show any signs of slowing down. The technological trio of Cloud, Mobile and Social computing, as well as their younger cousin, the Internet of Things, have profoundly changed the way our society…

Blog

Microsoft Azure Security Center

Last week, Microsoft has announced the general availability of the Azure Security Center – the company’s integrated solution for monitoring, threat detection and incident response for Azure cloud resources. Initially announced last year as a part of Microsoft’s new…


Recent research documents

Executive View

Executive View: HexaTier Database Security and Compliance - 71255

HexaTier provides an all-in-one database security and compliance solution across  multiple platforms with a strong focus on  cloud environments and Database-as-a-Service products.

Executive View

Executive View: Cisco Advanced Malware Protection - 72518

Cisco Advanced Malware Protection (AMP) is an integrated enterprise security intelligence and malware protection solution. By combining global threat intelligence with dynamic malware analysis and continuous endpoint and network monitoring, AMP provides constant visibility and control…

Leadership Compass

Leadership Compass: Database Security - 70970

Database security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability. It covers various security controls for the information itself stored and processed in database systems,…

Executive View

Executive View: AWS Lambda - 72524

AWS Lambda is an event-driven serverless computing platform that completely abstracts the underlying cloud infrastructure to let developers focus on the core business functionality of their applications, providing transparent scalability and redundancy across multiple datacenters in the…

Survey

KuppingerCole und BARC gemeinsame Studie: Big Data und Informationssicherheit - 74001

Angesichts immer fortschrittlicherer und häufigerer Cyber-Angriffe sowie der Tatsache, dass die traditionelle Idee des Sicherheitsperimeters fast gänzlich ausgestorben ist, müssen Unternehmen ihre Strategien in Bezug auf Cyber-Sicherheit überdenken. Neue Lösungen…


Recent webcasts

Webcast

Improving Your SOC Efficiency with Advanced Security Analytics

Today, the Security Operations Center (SOC) is at the heart of enterprise security management. Security analysts in most SOCs are still relying on traditional SIEM systems as a core platform for their daily operations. These are the primary tools to monitor and analyze security alerts…

Webcast

Reinventing Smart Cards for the Modern Agile, Connected Enterprise

Thanks to the maturity and highly standardized nature of public key infrastructures (and a large number of legacy business applications tied into them), enterprise IT departments continue to rely on the proven technology, but they are feeling an increasing pressure from businesses to…

Webcast

Cloud Access Security and Enterprise Mobility - Better Together

For years, Enterprise Mobility Management (EMM) solutions have been the primary choice for companies to enable secure mobile access to enterprise applications. However, many experts believe that EMMs are the thing of the past, not being able to deal with cloud services and causing too much…

Webcast

You Thought Shadow IT Was Bad? Meet Your Company's Shadow Administrators

Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard…

Webcast

The Future of Authentication - Killing the Password

We all understand that the concept of username/password to control access is insecure and out of date in a world where anything is connected and a new approach is needed. But how can we make the password obsolete?


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Learn more

Security Operations Center

Today, the Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes for them to decide whether an [...]

News