Analyst details

Alexei Balaganski Lead Analyst

Duisburg / Germany

Experience:
20 years in IT industry
At KuppingerCole since 2007

Email    Blog    @balaganski    Profile   

Roles & Responsibilities at KuppingerCole:

Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO.

Background & Education:

Master degree in Mathematics and Computer science from Novosibirsk State Technical University.

   

Areas of coverage:

  • Cybersecurity
  • Authentication
  • Privilege Management

Professional experience:

After graduating with an MSc degree in Mathematics and Computer science he has worked in the IT industry for over 15 years. His experience includes software development, network administration and information security. Before joining KuppingerCole in 2007, he has taken part in multiple IT projects including e-commerce, high-load and cloud applications.

Recent blog posts

Blog

Artificial Intelligence in Cybersecurity: Are We There Yet?

Artificial Intelligence (along with Machine Learning) seems to be the hottest buzzword in just about every segment of the IT industry nowadays, and not without reason. The very idea of teaching a machine to mimic the way humans think (but much, much quicker) without the need to develop…

Blog

Oslo, We Have a Problem!

As you have certainly already heard, Norsk Hydro , one of the world’s largest aluminum manufacturers and the second biggest hydropower producer in Norway, has suffered a massive cyber attack earlier today. According to a very short statement issued by the company, the attack has…

Blog

Building Trust by Design

Trust has somehow become a marketing buzzword recently. There is a lot of talks about “redefining trust”, “trust technologies” or even “trustless models” (the latter is usually applied to Blockchain, of course). To me, this has always sounded……

Blog

Who's the Best Security Vendor of Them All?

This week I had an opportunity to visit the city of Tel Aviv, Israel to attend one of the Microsoft Ignite | The Tour events the company is organizing to bring the latest information about their new products and technologies closer to IT professionals around the world. Granted, the…

Blog

AWS re:Invent Impressions

This year’s flagship conference for AWS – the re:Invent 2018 in Las Vegas – has just officially wrapped. Continuing the tradition, it has been bigger than ever – with more than 50 thousand attendees, over 2000 sessions, workshops, hackathons, certification courses, a…

Blog

Impressions from the Oracle OpenWorld

Recently I was in San Francisco again, attending the Oracle OpenWorld for the second time. Just like last year , I cannot but commend the organizers for making the event even bigger, more informative and more convenient to attend – by all means not a small feat when you consider…


Recent research documents

Executive View

Executive View: AWS Certificate and Key Management - 70365

A suite of fully managed encryption key and TLS certificate management services natively integrated with over 50 other AWS services to ensure data protection and regulatory compliance across the whole cloud footprints.

Executive View

Executive View: Amazon GuardDuty - 80005

Amazon GuardDuty is a fully managed, simple, and affordable security monitoring and threat detection service that combines machine learning and anomaly detection to enable quick and uncomplicated identification of suspicious activities and malicious behavior across AWS cloud accounts and…

Executive View

Executive View: Veracode Application Security Platform - 79060

Veracode Application Security Platform is a cloud-based application security testing platform providing unified insights into software security risks at every stage of the development lifecycle.

Executive View

Executive View: Checkmarx Software Exposure Platform - 71512

Checkmarx Software Exposure Platform combines application security testing tools, managed services, and training in a single solution that enables developers to detect, prioritize and mitigate software-related risks at every stage of the development life cycle.    

Whitepaper

Whitepaper: Cisco: Next-Generation Enterprise Security Delivered from the Cloud: Addressing Modern Cyber Threats with Cisco Umbrella - 80017

As businesses embrace the Digital Transformation and become increasingly cloud-native, mobile and interconnected, the corporate network perimeter is gradually disappearing, exposing users to malware, ransomware, and other cyber threats. Traditional perimeter security tools no longer provide…


Recent webcasts

Webcast

API Security: Separating Truth from Fiction

APIs (application programming interfaces) have undergone a truly amazing transformation in recent years. From an obscure technical term only software developers were familiar with, they have developed into one of the foundations of today’s digital business. Nowadays, APIs are…

Webcast

Alexei Balaganski - The Sorry State of Consumer IoT Security and How Can We Possibly Fix it

The Internet of Things has already become an integral part of our daily lives, whether we like it or not. In the office, at home, and even in the street, we are surrounded by a multitude of smart devices ranging from smart TVs and fridges to network routers, voice assistants and parking…

Webcast

Alexei Balaganski - Containers, Microservices, APIs: The Latest DevOps Security Trends

To stay competitive during the times of digital transformation, when business models and technology landscapes change daily, enterprises must reinvent many of their business processes to achieve new levels of agility and flexibility, and nowhere else this is more evident than in software…

Webcast

Five Steps to Building an Effective Insider Threat Program

The greatest cybersecurity threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders - the contractors, third-party vendors, and even your own privileged employees who already have full access to your company's systems and…

Webcast

Modern Endpoint Protection – Automating Prevention, Detection, and Response

“Antivirus is dead!” - we’ve heard talks like this for years. Some experts would point out that traditional signature-based products cannot detect zero-day attacks or sophisticated advanced threats. Others would even recommend getting rid of any 3rd party antimalware…


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

News