Analyst/Advisor details

John Tolbert Lead Analyst

Seattle / USA

Email    Blog    @john_tolbert_kc    Profile   

Background:

As Lead Analyst, John covers a number of different research areas, outlined below. John also advises cybersecurity and IAM vendors, from startups to Fortune 500 companies, regarding their product and service roadmaps.

Areas of expertise

  • Cybersecurity
    • Fraud Reduction Technologies
    • Bot/DDoS Management
    • User Behavioral Analysis (UBA)
    • Network Detection & Response (NDR)
    • Security Orchestration Automation & Response (SOAR)
    • Threat Deception Technologies
    • Endpoint Protection (EPP)
    • Endpoint Detection and Response (EDR)
    • Data Leakage Prevention (DLP)
    • Managed security services
    • Application of AI/ML technologies for security
  • IAM
    • Strong, multi-factor, risk-adaptive authentication
    • Authorization and Federation
    • Identity analytics/intelligence
    • Consumer IAM

John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US).

Recent blog posts

Blog

PCI-DSS 4.0 launched

The Payment Card Industry (PCI) Standards Council has published a major update to the Data Security Standard (DSS), version 4.0. This version is an improvement over the current version, 3.2.1, which came out in 2018.   The new publication directs organizations that need to be…

Blog

SentinelOne acquires Attivo Networks: A big leap forward to Security with Identity

SentinelOne has announced that they will acquire Attivo Networks, a leading Distributed Deception Platform (DDP) and Identity Threat Detection & Response (ITDR) solution provider. This appears to be a good move for SentinelOne, which is a leading Endpoint Protection Detection &…

Blog

Has Your Organization Rolled Out MFA Yet?

Have you entered a password somewhere today? Do you wonder why you’re still having to do that? Did entering that password give you a feeling of digital safety? Did it make your consumer experience more enjoyable? Cybersecurity and identity management experts have been proclaiming…

Blog

What is XDR?

Almost all enterprises have many security tools in place already, some of which are still focused on perimeters/DMZs and on hosts, such as servers and endpoints. Endpoint Detection & Response (EDR) tools are becoming more commonplace in enterprises and SMBs. EDR tools depend on agents…

Blog

Dark Side Ransomware Attacks

Last week Colonial Pipeline, one of the largest pipelines in the US, was hit by a ransomware attack from the Dark Side cybercrime group. While many pertinent specifics about the attack are not known, FireEye and US Cybersecurity and Infrastructure Security Agency (CISA) have shed some…

Blog

Why Enterprises Are Choosing SOAR for SOCs

Security Orchestration, Automation, and Response (SOAR) platforms are attracting a lot of attention from many organizations, from enterprises to government agencies and even those on the upper end of Small-to-Mid-Sized Businesses (SMBs). The reason for this is clear: the cybersecurity…


Recent videos

Video

Analyst Chat #130: Leadership Compass Endpoint Protection, Detection and Response (EPDR)

The previously distinct but now converged fields and product lines of Endpoint Protection (EPP) and Endpoint Detection & Response (EDR) are covered in the brand new KuppingerCole Analysts Leadership Compass on EPDR (Endpoint Protection Detection & Response). Lead Analyst John…

Video

Trends, Innovations and Developments in the CIAM Market

Consumer Identity and Access Management (CIAM) is an emerging market with a strong demand for solutions. Especially with the increasing digitization of the workplace, the market is growing and there are more and more vendors entering this market. Our analyst John met with Sadrick Widmann…

Video

Analyst Chat #122: How to Deal with the Increase and Complexity in Consumer Fraud

John Tolbert and Matthias discuss the question of whether companies in retail, finance, healthcare, insurance, etc. are really able to keep up with the scale and sophistication of attacks aimed at committing fraud? Are they considering FRIP solutions for specific use cases?

Video

Passwordless Customer Authentication: Reduce Friction and Increase Security

Acquiring and retaining customers is key in the modern world of e-commerce, but this can be challenging if creating and accessing accounts is difficult. Online traders need to find ways of turning authentication into a competitive edge by reducing friction and improving security.

Video

Analyst Chat #121: Increasing the Adoption of MFA and Risk-based Authentication

A recently published study shows that the use of strong authentication in enterprise environments is at a very low level. John Tolbert explains this finding to Matthias and together they discuss how to find a way out of this situation.