Analyst/Advisor details

John Tolbert Lead Analyst

Seattle / USA

Email    Blog    @john_tolbert_kc    Profile   

Background:

As Lead Analyst, John covers a number of different research areas, outlined below. John also advises cybersecurity and IAM vendors, from startups to Fortune 500 companies, regarding their product and service roadmaps.

Areas of expertise

  • Cybersecurity
    • Fraud Reduction Technologies
    • Bot/DDoS Management
    • User Behavioral Analysis (UBA)
    • Network Detection & Response (NDR)
    • Security Orchestration Automation & Response (SOAR)
    • Threat Deception Technologies
    • Endpoint Protection (EPP)
    • Endpoint Detection and Response (EDR)
    • Data Leakage Prevention (DLP)
    • Managed security services
    • Application of AI/ML technologies for security
  • IAM
    • Strong, multi-factor, risk-adaptive authentication
    • Authorization and Federation
    • Identity analytics/intelligence
    • Consumer IAM

John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US).

Recent blog posts

Blog

What is XDR?

Almost all enterprises have many security tools in place already, some of which are still focused on perimeters/DMZs and on hosts, such as servers and endpoints. Endpoint Detection & Response (EDR) tools are becoming more commonplace in enterprises and SMBs. EDR tools depend on agents…

Blog

Dark Side Ransomware Attacks

Last week Colonial Pipeline, one of the largest pipelines in the US, was hit by a ransomware attack from the Dark Side cybercrime group. While many pertinent specifics about the attack are not known, FireEye and US Cybersecurity and Infrastructure Security Agency (CISA) have shed some…

Blog

Why Enterprises Are Choosing SOAR for SOCs

Security Orchestration, Automation, and Response (SOAR) platforms are attracting a lot of attention from many organizations, from enterprises to government agencies and even those on the upper end of Small-to-Mid-Sized Businesses (SMBs). The reason for this is clear: the cybersecurity…

Blog

Symphony Technology Group (STG) Acquires McAfee Enterprise Business

STG announced that they intend to acquire McAfee’s enterprise business for around $4B. The McAfee brand will continue to operate and focus on consumer cybersecurity. STG will pick up MVISION, Global Threat Intelligence, database security, unified endpoint security, CASB, CSPM, CWPP,…

Blog

Okta & Auth0

Okta will purchase Auth0 for $6.5B. Okta is a leading IDaaS vendor , originally focused on workforce but now addressing B2E, B2B, and B2C use cases. Okta’s solutions are designed for organizations that want to quickly enable cloud-delivered identity and seamlessly interoperate with…

Blog

The Non-Zero Elements of Zero Trust

The ongoing SolarWinds incident illustrates that the much-lauded Zero Trust security paradigm is, in fact, based on trust. Zero Trust is about authenticating and authorizing every action within a computing environment. It is putting the principle of least privilege into action. In an ideal…


Recent research documents

Executive View

HID Global Fraud Prevention Offering

HID Global offers robust and secure solutions for identity and access management, including a highly scalable authentication platform, physical access controls, smart identity card manufacturing and credential issuance, biometric authentication, and fraud prevention in the form of…

Leadership Compass

Distributed Deception Platforms (DDPs)

This report provides an overview of the market for Distributed Deception Platforms (DDPs) and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative…

Executive View

Widas ID GmbH cidaas

Widas ID GmbH offers a complete cloud identity and access management solution: cidaas. cidaas is developed and hosted in Germany. cidaas contains most standard and many innovative features, such IoT integration and consent management. It is based on a micro-services architecture which…

Executive View

PortSys Total Access Control

Zero Trust Architecture requires proper authentication and authorization for each access request in the digital domain. Access management tools must serve ever more complex environments ranging from contemporary cloud hosted applications as well as legacy on-premises applications that do…

Leadership Compass

Fraud Reduction Intelligence Platforms

This report provides an overview of the market for Fraud Reduction Intelligence Platforms and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative…


Recent videos

Video

Analyst Chat #99: Protecting OT and ICS

John Tolbert sits down with Matthias and shares his insights into current approaches for protecting and defending essential enterprise systems beyond traditional, often office-focused cybersecurity. Safeguarding Operational Technology (OT), Industrial Control Systems (ICS), and the…

Video

A Customer-First Approach to Identity-Based Authentication

Even though passwords can be compromised easily and are generally considered unsafe, they are still ubiquitous in a time when multi-factor authentication and biometrics are easily available. There’s little doubt that eliminating passwords improves security, but to effect fundamental…

Video

Adding Certainty to Your Cyber-Attack Detection Capabilities

There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and…

Video

Zero Trust Through Dynamic Authorization and Policy Driven Access

As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling…

Video

Analyst Chat #88: What (and why) is XDR?

XDR (eXtended Detection & Response) solutions are an emerging category of security tools that are designed to consolidate and replace multiple point solutions. John Tolbert and Alexei Balaganski join Matthias and share their views on this market, the existing offerings, and how it might…