Analyst/Advisor details

Alexei Balaganski Lead Analyst & Chief Technology Officer

Duisburg / Germany

Experience:
Over 20 years in IT industry
At KuppingerCole since 2007

Email    Blog    @balaganski    Profile   

Alexei is an analyst with specific focus on cybersecurity and Artificial Intelligence. At KuppingerCole, he covers a broad range of security-related topics: from database, application and API security to security analytics, information protection, and AI-based security automation. He holds a master’s degree in applied mathematics and computer science.

His deep technical understanding of modern technologies and solutions allows him to support customers even with the most complex architectural challenges. His experience includes application development, network administration and information security. After over 25 years in IT, his skills range from managing software projects to designing security architectures, including various aspects of application security. 

Alexei is an analyst with specific focus on cybersecurity and Artificial Intelligence. At KuppingerCole, he covers a broad range of security-related topics: from database, application and API security to security analytics, information protection, and AI-based security automation. He holds a master’s degree in applied mathematics and computer science.

His deep technical understanding of modern technologies and solutions allows him to support customers even with the most complex architectural challenges. His experience includes application development, network administration and information security. After over 25 years in IT, his skills range from managing software projects to designing security architectures, including various aspects of application security. 

Recent blog posts

Blog

Finding a Setting Worthy of Your “Crown Jewels”

Modern businesses depend on digital information. For quite a few years already, it’s been considered the world’s most valuable commodity, worth more than oil, gold, or even printer ink. Some of the world’s largest companies have turned data into their primary source of…

Blog

Low-Code Should Not Be Low-Effort for Vendors

The idea of low-code/no-code (LC/NC) application development seems to be extremely popular nowadays, to the point of it almost becoming a marketing buzzword similar, say, to “Zero Trust”. For decades, creating “proper” application software was a complex and tedious…

Blog

Brace Yourselves: A New HeatWave is Coming

I’ve always been a bit baffled by the enduring popularity of MySQL. I mean, it’s great and we have been using it in many internal projects for years, but what makes it so popular even nowadays, when the competition from other vendors, commercial or open-source, is so strong? And…

Blog

Fighting Data Friction, One Battle at a Time

Data friction is arguably the biggest obstacle for every organization on its journey to achieve optimal business productivity. Even if you have not heard the term before, you’ve definitely faced its consequences in one form or another (most probably, even in multiple different forms).…

Blog

Quantum Computing: Where to Start Today

Quantum computing is one of those topics that always seem to exist just out of our reach. Well over a decade ago we were promised that a real quantum computer will appear just in a few years, and for most people, this feeling remains the same even now. But is this assumption correct? Do we…

Blog

Oracle’s Crypto-Secure Data Management

Oracle has unveiled new interesting capabilities in the Oracle database today, which they refer to as Immutable and Blockchain tables . While I am not entirely convinced by the names they have chosen, I can absolutely get behind the overall Crypto-secure data management concept that has…


Recent research documents


Recent videos

Video

Analyst Chat #103: Data-Centric Security

Lead analyst Alexei Balaganski joins Matthias for an episode on Data-Centric Security. Starting with a definition behind that term, they look at relevant technologies and market segments and discuss adequate ways of adding Data-Centric Security to an organization's cybersecurity strategy.

Video

Why Continuous API Security Is Key to Protecting Your Digital Business

In the era when data has replaced oil as the most valuable commodity, APIs have become an important logistical foundation of modern digital business. As a result, APIs have also become a popular target for cyber attackers, and therefore effective API security is essential. However, focusing…

Video

Analyst Chat #97: Low-Code/No-Code and the Citizen Developer

The idea of low-code/no-code (LC/NC) application development is for end users to create their own custom applications, perhaps using a graphical design tool, selecting from a library of existing building blocks, or perhaps even with the assistance of artificial intelligence. Alexei…

Video

Analyst Chat #90: API Management and Security

The market segment of products and services that are designed to manage and secure APIs as essential resources in a multitude of different environments is constantly evolving. On the occasion of the publication of the latest edition of his Leadership Compass "API Management and Security",…

Video

Analyst Chat #88: What (and why) is XDR?

XDR (eXtended Detection & Response) solutions are an emerging category of security tools that are designed to consolidate and replace multiple point solutions. John Tolbert and Alexei Balaganski join Matthias and share their views on this market, the existing offerings, and how it might…