Analyst details

Paul Fisher Senior Analyst

London / United Kingdom

Email   

Paul Fisher is a Senior Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at KuppingerCole.

He has been an IT journalist and analyst since 1991. In that time, he served as editor in chief of several major IT and business titles in the UK.

Paul has worked as a communications consultant with IBM, HP Enterprise Security Services, Sky UK and other leading companies on data security and IT projects.

Recent blog posts

Blog

AI and Healthcare

AI's role in reducing the impact of future pandemics As the coronavirus spreads fear and panic across the world, it’s perhaps timely to take a step back and consider the future of healthcare and how AI will help. But first let’s consider that the coverage and spread of the…

Blog

Moving Towards AI and IoT Solutions Beyond Machine Learning

Microsoft is currently running ads extoling the virtue of AI and IoT sensors in helping farmers produce more and better crops, with less waste and higher yields. Elsewhere in manufacturing, supply chain management is being transformed with digital maps of goods and services that reduce…

Blog

PAM Can Reduce Risk of Compliance Failure but Is Part of a Bigger Picture

The importance of privilege accounts to digital organizations and their appeal to cyber attackers has made Privilege Access Management (PAM) an essential component of an identity and access management portfolio. Quite often, customers will see this as purely as a security investment,…

Blog

VMware’s New Idea for Fixing Cybersecurity: Intrinsic Security

At VMworld Europe 2019, Pat Gelsinger, CEO of VMware said security is fundamentally broken and that the overabundance of vendors is making the problem worse. I’m not sure this is true. Gelsinger had some good lines: applications that are updated and patched on a regular basis should…

Blog

OVHCloud Bets on Shift Back to Private Cloud

There is more to the cloud than AWS, Azure, IBM and Google according to OVHCloud - the new name for OVH as it celebrates its 20 th anniversary. While the big four have carved up the public cloud between them, the French cloud specialist believes that business needs are changing, which…

Blog

Privileged Access Management Can Take on AI-Powered Malware to Protect Identity-Based Computing

Much is written about the growth of AI in the enterprise and how, as part of digital transformation, it will enable companies to create value and innovate faster. At the same time, cybersecurity researchers are increasingly looking to AI to enhance security solutions to better protect…


Recent research documents

Market Compass

Digital Workplace Delivery Platforms

The KuppingerCole Market Compass Workplace Delivery covers solutions that assist organizations in managing applications and data that end users access from a “single pane of glass” interface. These can run on existing PC workstations and remote devices including smartphones and…

Executive View

Archer Integrated Risk Management

Today’s GRC solutions offer better alignment with corporate objectives, increased transparency, superior information risk management and more cost-effective compliance. This paper looks at the mature Archer Suite which offers a comprehensive range of solutions and features to assist…

Executive View

ARCON PAM SaaS

Privileged Access Management (PAM) must evolve if it is to meet the demands of different types of organizations and IT architecture. A one size fits all approach does not work in a world where access to privileged accounts is changing. Organizations need PAM solutions that fulfill security…

Advisory Note

The Role of APIs for Business

An Application Programming Interface (API) is an intermediary that allows two applications to talk to each other. Without APIs, the digital experiences consumers have grown accustomed to, such as booking a hotel room or in car navigation, would not be possible. In recent years, API…

Whitepaper

Privileged Access Management solutions for Agile, multi-cloud and DevOps environments

Privileged Access Management (PAM) is an important area of risk management and security for any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But changing business practices and upgrades to IT including cloud and…


Recent videos

Webcast

KuppingerCole Analyst Chat: Privileged Access in an Agile World - PAM for DevOps

The PAM market continues to evolve and many organizations are adopting the DevOps paradigm where critical access and sensitive accounts are required in fast moving and agile environments. Paul Fisher meets Matthias for this episode and shares his research on PAM for DevOps. They talk about…

Webcast

Operationalizing Least Privilege

Striking the balance between enabling users and administrators to be productive whilst protecting your sensitive systems and data is becoming ever more challenging. Attackers are often one step ahead of organizations, and even those with the most comprehensive security systems and controls…

Webcast

Decoding Advanced Privileged Access Management for Digital Environments - A conversation with Paul Fisher and Anil Bhandari

Did you know that privileged accounts are a major source of data leaks? These powerful administrative accounts provide access to business-critical information stored in applications and servers. A single instance of privileged password abuse can bring down the entire IT infrastructure.…

Webcast

In an Age of Digital Transformation Managing Vendor and Partner Identity Is Critical

Organizations have been managing the identity and access of employees for many years to protect data and the overall security of the enterprise. However, the onset of digital transformation has driven a need for faster, cost-effective innovation and with it the increased utilization of…

Webcast

Remote Workforce: How to Protect Yourself From Emerging Threats?

The outbreak of the COVID-19 pandemic has served as a catalyst for digitization in many companies and led to an increase in remote work and adoption of the bring your own device (BYOD) policy. Every device and digital service that employees use is a potential gateway into company networks…


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Stay Connected

Subscribe to our Podcasts

KuppingerCole Podcasts - listen anywhere

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

News