Analyst details

John Tolbert Lead Analyst & Managing Director of KuppingerCole, Inc (US)

Seattle / USA

Email    Blog    @john_tolbert_kc    Profile   

Background:

John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises cybersecurity and IAM vendors, from startups to Fortune 500 companies, regarding their product and service roadmaps.

 

Areas of expertiseCybersecurity

  • Cybersecurity
    • Endpoint anti-malware protection
    • Endpoint detection and response
    • Managed security services
    • Application of AI/ML technologies for security
  • IAM
    • Strong, multi-factor, risk-adaptive authentication
    • Authorization and Federation
    • Identity analytics/intelligence
    • CIAM

John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises cybersecurity and IAM vendors, from startups to Fortune 500 companies, regarding their product and service roadmaps.

Recent blog posts

Blog

Cybersecurity Leadership Summit Berlin 2018 - Review

This month we launched our Cybersecurity Leadership Summit in Berlin . A pre-conference workshop entitled “ Focusing Your Cybersecurity Investments: What Do You Really Need for Mitigating Your Cyber-risks ?” was held on Monday. The workshop was both business-oriented and…

Blog

Consumer Identity World (CIW) USA 2018 - Report

Fall is Consumer Identity Season at KuppingerCole, just in time for holiday shopping. Last week we kicked off our 2018 tour in Seattle. The number of attendees and sponsors was well up over last year, indicating the significant increase in interest in the Consumer Identity and Access…

Blog

Entrust Datacard Acquisition

Entrust  Datacard ,  founded in 1969 and  headquartered in Minnesota, announced today that it  is making a strategic investment in  CensorNet  and acquiring the SMS Passcode business from  CensorNet  (originally a Danish…

Blog

"Archive != Delete": Bring Back the Delete Button

Why does it seem to be getting harder to delete information online? GDPR will take effect in just a few days. GDPR empowers EU people to take control of their personal information. When in force, GDPR will mandate that companies and other organizations which control or process personal…

Blog

Will Your Security Solutions Violate GDPR?

As the May 25th, 2018 GDPR enforcement date approaches, more and more companies are actively taking steps to find, evaluate, and protect the personally identifiable information (Personal Data) of EU persons. Organizations that do business with EU persons are conducting data protection…

Blog

Without Prosecution, There Is No Protection

The Equifax data breach saga continues to unfold. In late 2017, the company admitted it had suffered significant data loss starting in March of last year. There were likely multiple data theft events over a number of months. At some point in May, they notified a small group of customers but…


Recent research documents

Executive View

Executive View: ThreatMetrix Digital Identity Network, powered by ThreatMetrix ID - 79049

ThreatMetrix is a global fraud, identity and authentication company, helping customers deliver a unified experience across their digital customer journey.  Built on a platform providing a unified, global customer digital identity, ThreatMetrix enables businesses to prevent fraud,…

Leadership Compass

Leadership Compass: Cloud-based MFA Solutions - 70967

This report provides an overview of the market for Cloud-based Multi-Factor Authentication (MFA) solutions and provides you with a compass to help you to find the service that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and…

Leadership Compass

Leadership Compass: Adaptive Authentication - 79011

This report provides an overview of the market for on-premise Adaptive Authentication solutions and provides you with a compass to help you to find the product that best meets your needs.  We examine the market segment, vendor product and service functionality, relative market share,…

Whitepaper

Whitepaper: Preparing for PSD2 technical requirements using RSA solutions - 79062

The Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe.  Banks and other financial service providers must quickly prepare for PSD2. RSA provides foundational technical capabilities in their SecurID,…

Executive View

Executive View: WidasConcepts cidaas - 79057

WidasConcepts offers a complete consumer identity and access management solution:  cidaas.  cidaas is developed and hosted in Germany. cidaas contains most standard and many innovative features, such IoT integration and consent management.  It is based on a micro-services…


Recent webcasts

Webcast

An Overview of the Leadership Compass: Adaptive Authentication and Cloud-Based Multi-Factor Authentication

KuppingerCole has published two related Leadership Compasses on Adaptive Authentication and Cloud-based Multi-Factor Authentication solutions. We define adaptive authentication (AA) as the on-premises deployments, whereas Cloud-based MFA is SaaS-delivered. For both AA and Cloud MFA, many…

Webcast

Fine-Grained Policy-Based Access Control: Why & How?

Mastering authorization is critical for modern organizations with multiple user constituencies, applications, and data types. Authorization has become a crucial part of security infrastructures and can no longer be considered just another feature of existing IAM solutions. Instead,…

Webcast

Customer Identity Access Management (CIAM): Creating the Foundations for User Focused Digital Business, GDPR Compliant

Digital Business Transformation is a continuous process that affects all areas of doing business, with technology finally getting the right focus: The customer and his/her experience with your business. It is now all about providing that ultimate Frictionless CX (customer experience) so…

Webcast

John Tolbert - The Journey to CIAM Success

Consumer Identity and Access Management (CIAM) is many things. For some it’s all about streamlining the user experience through technologies and practices that make it easier for them to securely logon. For others, IAM is all about identity lifecycle management –…

Webcast

John Tolbert - The CIAM Solutions Market