Research Analyst

Osman Celik

Osman joined KuppingerCole Analysts AG as Research Analyst in March 2022. Osman holds a Bachelor of Business Administration degree from Koc University, Turkey, and Master of Management (Track in IT Management) degree from EBS Universität, Germany.

Areas of Interest

Cyber Security, Cloud Security, AI Technologies

Professional Experience

Earlier, he had a chance to work as a Marketing Specialist for a global IT Distributor and obtained skills in Event Management. Later, he developed an interest for Cloud Security and worked as a Business Analyst for a Cloud Data Security company where he has gained the knowledge of Encryption-Tokenization, CASB Market and the experience in Product Management.

 

Latest publications

Advisory Note
Cyber Risk Frameworks in 2024
April 09, 2024
The landscape of cybersecurity is continually evolving, with new threats and technologies reshaping the way organizations protect their digital assets. In order to understand the significance of these changes, it is crucial to understand the evolving cyber threat landscape, which acts as the…
Leadership Compass
Web Application Firewalls
April 08, 2024
This report provides up-to-date insights into the Web Application Firewall (WAF) market. We examine the market segment, vendor service functionality, relative market share, and innovation to help you to find the solution that best meets your organization's needs.
Analyst Chat
Analyst Chat #209: Behind the Screens - A Day in the Life of a Tech Analyst
April 08, 2024
In this episode Matthias welcomes Osman Celik, a research analyst with KuppingerCole Analysts, to uncover the daily life and career dynamics within the tech analysis industry. They take a glimpse into Osman’s day-to-day activities, exploring the challenges and highlights of being a…
Analyst Chat
Analyst Chat #193: Dynamic Defenses - Evolving Strategies in Attack Surface Management
October 16, 2023
Matthias is joined by experts John Tolbert and Osman Celik to unpack the concept of Attack Surface Management (ASM) and its growing relevance in cybersecurity. They discuss the challenges posed by the ever-evolving nature of attack surfaces and the role of ASM solutions in managing these…
Advisory Note
Architecting Your SOC to Defend Against Today's Attack Vectors
September 22, 2023
Organizations must prioritize architecting a modern Security Operations Center (SOC) as it is becoming more critical for strengthening their cybersecurity defenses against sophisticated cyber threats. A modern SOC enables proactive threat detection, rapid incident response, and cyber…
Leadership Compass
Attack Surface Management
September 18, 2023
This report provides an overview of the Attack Surface Management market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing…
Whitepaper
Going Beyond Traditional Penetration Testing
February 08, 2023
Penetration testing is an essential methodology used to discover and remediate vulnerabilities and reduce risks from cyber-attacks and cybercrime. Regular penetration testing is recommended and, in some industries, is required for certification and regulatory compliance. Penetration testing…
Executive View
PingOne Authorize
October 18, 2022
Due to its value and sensitivity, customer identity and data must be protected with strong access management systems. Key use cases include managing usage of customer data and its availability both internally and externally; and managing availability of organizational data across employee…
Whitepaper
Modernizing Legacy IAM Systems
September 27, 2022
Legacy IAM systems can no longer meet the requirements of Digital Transformation. They often have a negative impact on business efficiency and customer experience. Such systems are too costly to maintain and are getting closer to reaching end-of-life. Today, organizations can be expected to…
Blog
Cyber Hygiene: Common Problems & Best Practices
September 26, 2022
To maintain their health and well-being, people are practicing personal hygiene routines on a regular basis. These routines are continuous and never completed. By taking proactive measures, people aim to protect their health against potential diseases and disorders. Analogically,…
Webinar Recording
Zero Trust Is Driving the Evolution of Authorization
September 16, 2022
Verifying what specific applications, files, and data that a human or non-human entity has access to, is at the heart of cybersecurity in the face of increasing theft of data for espionage or other criminal purposes. Authorization, therefore, is extremely important to security, but it is…
Executive View
CYFIRMA DeCYFIR
September 08, 2022
Reaktive Sicherheitsmaßnahmen wirken auf Cyberangriffe, die bereits stattgefunden haben. Während die Ausgaben für die Cybersicherheit steigen, werden auch Cyberangriffe immer zahlreicher. Um Risiken zu mindern und potenzielle Angriffe zu verhindern, müssen proaktive Maßnahmen mit reaktiven…
Executive View
CYFIRMA DeCYFIR
August 30, 2022
Reactive security measures respond to cyberattacks that have already happened. While cybersecurity spending is increasing, cyberattacks are also becoming more frequent. To mitigate risks and prevent potential attacks, proactive actions must be combined with reactive actions. CYFIRMA offers…
Interview
Dark Web Monitoring - CYFIRMA on an Undercover Mission
July 14, 2022
With CYFIRMA's products, you can take a look at your business through the eyes of a cybercriminal. But to know what they know, they need to take steps into the dark side of the World Wide Web. Osman interviews Kumar Ritesh from CYFIRMA about their work on the Dark Web.
Blog
Ever-Growing Attack Surface
May 09, 2022
The era we are living in has transformed the Internet and IT from being a convenience for people and organizations into a cyber liability. In an IT infrastructure, almost any system is now an integrated system that has internet connectivity. With assets, devices, resources, hardware, and…
Blog
Fully Homomorphic Encryption at a Glance
May 02, 2022
Widespread use of cloud services, the rising number of integrated solutions and the collaboration between organizations increase the concerns over data privacy and security. Today, we know that many data protection regulations (e.g., FIPS, GDPR, CCPA) require data to be encrypted while it…