Analyst/Advisor details

John Tolbert Lead Analyst

Seattle / USA

Email    Blog    @john_tolbert_kc    Profile   

Background:

As Lead Analyst, John covers a number of different research areas, outlined below. John also advises cybersecurity and IAM vendors, from startups to Fortune 500 companies, regarding their product and service roadmaps.

Areas of expertise

  • Cybersecurity
    • Fraud Reduction Technologies
    • Bot/DDoS Management
    • User Behavioral Analysis (UBA)
    • Network Detection & Response (NDR)
    • Security Orchestration Automation & Response (SOAR)
    • Threat Deception Technologies
    • Endpoint Protection (EPP)
    • Endpoint Detection and Response (EDR)
    • Data Leakage Prevention (DLP)
    • Managed security services
    • Application of AI/ML technologies for security
  • IAM
    • Strong, multi-factor, risk-adaptive authentication
    • Authorization and Federation
    • Identity analytics/intelligence
    • Consumer IAM

John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US).

Recent blog posts

Blog

Why Enterprises Are Choosing SOAR for SOCs

Security Orchestration, Automation, and Response (SOAR) platforms are attracting a lot of attention from many organizations, from enterprises to government agencies and even those on the upper end of Small-to-Mid-Sized Businesses (SMBs). The reason for this is clear: the cybersecurity…

Blog

Symphony Technology Group (STG) Acquires McAfee Enterprise Business

STG announced that they intend to acquire McAfee’s enterprise business for around $4B. The McAfee brand will continue to operate and focus on consumer cybersecurity. STG will pick up MVISION, Global Threat Intelligence, database security, unified endpoint security, CASB, CSPM, CWPP,…

Blog

Okta & Auth0

Okta will purchase Auth0 for $6.5B. Okta is a leading IDaaS vendor , originally focused on workforce but now addressing B2E, B2B, and B2C use cases. Okta’s solutions are designed for organizations that want to quickly enable cloud-delivered identity and seamlessly interoperate with…

Blog

The Non-Zero Elements of Zero Trust

The ongoing SolarWinds incident illustrates that the much-lauded Zero Trust security paradigm is, in fact, based on trust. Zero Trust is about authenticating and authorizing every action within a computing environment. It is putting the principle of least privilege into action. In an ideal…

Blog

Attack Surface Reduction and XDR

Many if not most organizations have moved to a risk management model for cybersecurity and identity management. Priorities have shifted in two major ways over the last decade: decreasing attack surface sizes focusing on detection and response technologies instead of prevention only…

Blog

Ivanti’s Zero Trust Journey

Ivanti has completed its acquisition of MobileIron and Pulse Secure. Ivanti, headquartered in Salt Lake City, had its roots in desktop management (LANDESK), evolved into endpoint and patch management, and had added full IT asset, service, and workspace management, as well as IAM…


Recent research documents

Executive View

Palo Alto Networks XSOAR

Security Orchestration, Automation and Response (SOAR) platforms are becoming essential components of security architectures in many organizations around the world. SOAR platforms are designed to provide a centralized analyst and management interface for security teams. They consolidate…

Buyer's Compass

Buyer’s Compass: SOAR

Security Orchestration Automation & Response (SOAR) refers to comprehensive solutions with capabilities that support a range of security tools and data sources. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and…

Executive View

HID Global Authentication Platform

HID Global offers robust and highly secure solutions for identity and access management, including physical access controls, smart identity card manufacturing and credential issuance, biometric authentication, and mobile/remote identity proofing. HID Global’s Authentication Platform…

Leadership Compass

Enterprise Authentication Solutions

This report provides an overview of the Enterprise Authentication Solutions market and provides you with a compass to help you to find the solution that best meets your needs. We examine the Enterprise Authentication market segment, product/service functionality, relative market share, and…

Whitepaper

Technical Approaches to Consent Management and Dynamic Access Management: Ping Identity

Privacy regulations are changing the way organizations handle personal information. GDPR was not the first and will not be the last to require data handlers to collect consent from users. Many Consumer Identity platforms have added in consent management features, and specialty Privacy and…


Recent videos