Analyst details

Mike Small Senior Analyst

Stockport / UK

Experience:
40 years in IT industry
At KuppingerCole since 2009

Email    Blog    @MikeSmall64    Profile   

Roles & Responsibilities at KuppingerCole:

Mike Small has been a Distinguished Analyst at KuppingerCole since more than 4 years. His current focus is security and risk management in the Cloud.

Background & Education:

Mike is a member of the London Chapter of ISACA Security Advisory Group, a Chartered Engineer, a Chartered Information Technology Professional, a Fellow of the British Computer Society, and a Member of the Institution of Engineering and Technology. He has a first class honours degree in engineering from Brunel University.

  

Areas of coverage:

  • Cloud Provider Selection and Assurance
  • Information Security Program Maturity Assessments
  • Information Stewardship
  • Big Data

Professional experience:

Until 2009, Mike worked for CA (now CA Technologies Inc) where he developed the identity and access management strategy for distributed systems. This strategy led to the developments and acquisitions that contributed to CA‘s IAM product line.

Recent blog posts

Blog

Cloud Security Posture Management Tools – What They Are and Why You Need One

Many security product vendors are now offering CSPM (Cloud Security Posture Management) as part of their portfolio - so what is CSPM and why might you need it?  In their race towards digital transformation, organizations are using cloud services to accelerate the development of new…

Blog

Will Azure Arc Help Hybrid IT Customers to Find the Pot of Gold?

At Ignite in November 2019 Microsoft announced Azure Arc which is now in public preview. Azure Arc extends Azure Resource Manager capabilities to cover Linux and Windows servers, as well as Kubernetes clusters on any infrastructure across on-premises, and multi-cloud. In French…

Blog

IBM Cloud Satellite Announcements

The idea behind cloud computing used to be simple – let the cloud service provider provide and manage the IT services and infrastructure while you get on with your business. However, reality got in the way and cloud computing has become yet another dimension in the complex web of IT…

Blog

COVID-19 Contact Tracing: Privacy Is not the only Challenge

In the UK there are plans to use a mobile ‘phone app to trace people who have been in contact with someone who has COVID-19 to warn them to go into quarantine in order to slow the spread of the virus. This approach is reported to have been successful in other countries, but it has…

Blog

5G and Identity

5G Identity and Authentication 5G is the next generation of cellular mobile communications intended to support the massive increase in capacity and connectivity that will be required for the future cloud of things and to provide the enhanced bandwidth needed for new mobile data…

Blog

5G - How Will This Affect Your Organization?

What is it that connects Covent Garden in London, The Roman Baths in Bath and Los Angeles? The answer is 5G mobile communications used by media organizations. On January 29th I attended the 5G Unleashed event at the IET in London. (The IET is the body that provides professional…


Recent research documents

Executive View

Executive View: Symantec Identity Governance and Administration - 80324

In the absence of a secure external perimeter Identity and Access Management has become fundamental to protecting corporate digital assets.  Identity Governance and Administration includes two core elements of IAM - Identity Provisioning and Access Governance - that are essential to…

Market Compass

Market Compass: Cloud Backup and Disaster Recovery - 71176

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment.  This Market Compass covers solutions that provide backup, restore and disaster recovery of IT service data into the cloud in the context of the hybrid IT service…

Executive View

Executive View: Symantec Privileged Access Manager - 80331

Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. This report describes how Symantec Privileged Access Management meets these challenges.

Advisory Note

Advisory Note: Cyber Risk – Choosing the Right Framework - 80237

As organizations undergo Digital Transformation the business impact of cyber risks increases.  It is essential that organizations manage these risks.  There are several frameworks that organizations could adopt to help them to manage these risks, but they need guidance to choose…

Leadership Brief

Leadership Brief: 5G Impact on Organizations and Security - 80238

5G is the next generation of cellular mobile communications. It will provide the capacity and connectivity required to industrialize IoT, Smart Cities and Smart Manufacturing. This report explains what it is and its likely impact on organizations and their security.


Recent webcasts

Webcast

Mike Small: Cloud Backup and Disaster Recovery Why This Is an Essential Component of Digital Transformation

All organizations need to consider the risks related to the availability of their business-critical data and take appropriate measures to mitigate these risks.  In most cases this will involve investing in backup and disaster recovery products and services.  In today’s…

Webcast

Zero Trust Reality Check: Secure Access for Hybrid IT

Workforce mobility and widespread adoption of distributed data center and cloud environments have introduced significant access control complexities and threats. Organizations are questioning the efficacy of conventional, perimeter-based defenses and are now evaluating a “trust but…

Webcast

Security and Governance in the Hybrid Multi-Cloud

Most organizations now use multiple cloud services as well as retaining some IT services on-premises, this multi-cloud hybrid environment creates many challenges for security and governance.

Webcast

Acing the Upcoming GDPR Exam

With only weeks to go until the EU GDPR (General Data Protection Regulation) takes effect on May 25th, global businesses are scrambling to figure out how to avoid the hefty fines that loom for companies failing to achieve compliance. Sanctions for non-compliance are very severe with…

Webcast

Best Practices and Essential Tools for GDPR Compliance

Join this KuppingerCole webinar to get practical, straightforward advice on how to prepare for GDPR, including: Devising and maintaining a plan to detect a data breach, Properly documenting evidence of compliance for auditors, Evaluating the effectiveness of your…


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Stay Connected

Subscribe to our Podcasts

KuppingerCole Podcasts - watch or listen anywhere

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

News