Endpoint Protection & Anti-Malware

Conference

Blockchain Enterprise Days 2019

Blockchain Enterprise Days (#BeDays19) will take place February 19-20, 2019 in Frankfurt, Germany. Blockchain is still on everyone's lips and is no longer reserved for the financial sector. For this reason, the Blockchain Enterprise Days will focus on further enterprise application areas of…

Webcast

Assuring and Implementing Cybersecurity and Data Protection for Public Clouds

Just a few years ago, IT infrastructures resembled medieval fortresses: Firewalls, intrusion prevention systems and anti-virus programs were supposed to ward off attacks even before the enemy could enter. But things have changed substantially: The traditional security perimeter is…

Webcast

Buying Into Zero Trust? What You Need to Consider to Be Successful

As organizations take on the digital transformation, trends such as mobility, proliferation of SaaS applications and cloud infrastructure are driving up the number of connected entities and devices increasing the attack surface. With the spate of recent acquisitions in the market looking to…

Blog

Artificial Intelligence and Cyber Security

As organizations go through digital transformation, the cyber challenges they face become more important. Their IT systems and applications become more critical and at the same time more open. The recent data breach suffered by British Airways illustrates the sophistication of the cyber…

Webcast

Making Sense of the Top 5 Latest Cybersecurity Trends

Let’s face it: with each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of their IT infrastructures mean that the attack surface for hackers and malicious insiders is…

Webinar

Oct 16, 2018: Assuring and Implementing Cybersecurity and Data Protection for Public Clouds

Just a few years ago, IT infrastructures resembled medieval fortresses: Firewalls, intrusion prevention systems and anti-virus programs were supposed to ward off attacks even before the enemy could enter.

Webinar

Sep 27, 2018: Making Sense of the Top 5 Latest Cybersecurity Trends

Let’s face it: with each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of their IT infrastructures mean that the attack surface for hackers and malicious insiders is increasing as well.…

Webinar

Oct 11, 2018: Buying Into Zero Trust? What You Need to Consider to Be Successful

As organizations take on the digital transformation, trends such as mobility, proliferation of SaaS applications and cloud infrastructure are driving up the number of connected entities and devices increasing the attack surface. With the spate of recent acquisitions in the market looking to…

Executive View

Executive View: StealthINTERCEPT® - 70367

Cyber criminals regularly exploit vulnerabilities and poor practices around Microsoft Active Directory to obtain credentials that allow them to infiltrate organizational systems, cause damage and exfiltrate data.  This report describes StealthINTERCEPT, the real-time policy…

Blog

Entrust Datacard Acquisition

Entrust Datacard, founded in 1969 and headquartered in Minnesota, announced today that it is making a strategic investment in CensorNet and acquiring the SMS Passcode business from CensorNet (originally a Danish…

Blog

BOMGAR acquires Avecto to expand its PAM portfolio

BOMGAR, owned by PE firm Francisco Partners has recently announced that it has acquired Avecto, a UK based Endpoint Privilege Management (EPM) company. The move coming within 6 months of Lieberman Software’s acquisition by BOMGAR clearly depicts the quest to strengthen its position in…

Blog

The Digital Transformation and the Role of the CISO

Cybersecurity needs to be at the heart of the digital transformation, but organisational models will have to evolve Cybersecurity is in the process of becoming an essential component of any organisation’s digital transformation journey. There is no way around this, especially as…

Webcast

Best Practices of Privileged Identity Management

Security and risk management leaders need to balance the significant security risks associated with unmanaged privileged access against the administrative and other operational efficiencies achieved by conventional privileged access management practices.

Webcast

Wie Sie mit der Kombination aus Technologie und Awareness eine zukunftsfähige Cybersecurity-Strategie entwerfen

Mehr Cyberangriffe, mehr Investitionen – aber zahlt sich das für Ihr Unternehmen aus? Die richtige Cybersecurity-Strategie und die richtigen Tools helfen, Ihre Budgets gezielt einzusetzen, den Erfolg zu messen und insbesondere die Risiken durch die stetig wachsende Zahl von…

Blog

Future-Proofing Your Cybersecurity Strategy

It’s May 25 today, and the world hasn’t ended. Looking back at the last several weeks before the GDPR deadline, I have an oddly familiar feeling. It seems that many companies have treated it as another “Year 2000 disaster” - a largely imaginary but highly publicized…

Blog

"Archive != Delete": Bring Back the Delete Button

Why does it seem to be getting harder to delete information online? GDPR will take effect in just a few days. GDPR empowers EU people to take control of their personal information. When in force, GDPR will mandate that companies and other organizations which control or process personal…

Blog

Will Your Security Solutions Violate GDPR?

As the May 25th, 2018 GDPR enforcement date approaches, more and more companies are actively taking steps to find, evaluate, and protect the personally identifiable information (Personal Data) of EU persons. Organizations that do business with EU persons are conducting data protection impact…

Webcast

[DE] Privilegierte Konten sichern. Angriffe stoppen.

An interview during the European Identity & Cloud Conference 2018 Privileged accounts, credentials and secrets are everywhere— on premises, in the cloud, on endpoints, and across DevOps environments. From personally identifiable customer information to critical intellectual…

Webinar

Jun 20, 2018: Best Practices of Privileged Identity Management

Security and risk management leaders need to balance the significant security risks associated with unmanaged privileged access against the administrative and other operational efficiencies achieved by conventional privileged access management practices.

Webcast

Zero Trust: Solving IT Security’s Identity Crisis

Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many…

Webinar

Jun 15, 2018: Wie Sie mit der Kombination aus Technologie und Awareness eine zukunftsfähige Cybersecurity-Strategie entwerfen

Mehr Cyberangriffe, mehr Investitionen – aber zahlt sich das für Ihr Unternehmen aus? Die richtige Cybersecurity-Strategie und die richtigen Tools helfen, Ihre Budgets gezielt einzusetzen, den Erfolg zu messen und insbesondere die Risiken durch die stetig wachsende Zahl von Angriffen und…

Webcast

An overview of the Leadership Compass: Endpoint Security Anti-Malware

Malware has been on the rise. Ransomware continues to grab the headlines. New malware variants proliferate by the millions. Old style manual malware analysis can't keep pace. But organizations are increasingly under attack. Fortunately, vendors have been enhancing and improving their…

Blog

RSA’s 2018 Conference Starts Bi-Polar and Ends with a Minor Breach

It is a world of great turmoil and considerable fear amidst incredible human progress. No wonder the RSA keynotes seemed bi-polar - mixing fear one moment, hope and inspiration the next.  RSA opened with a somber act from rapper poet Kevin Olusola to the conference theme: "Now…

Blog

Without Prosecution, There Is No Protection

The Equifax data breach saga continues to unfold. In late 2017, the company admitted it had suffered significant data loss starting in March of last year. There were likely multiple data theft events over a number of months. At some point in May, they notified a small group of customers but…

Blog

Insight, Control and Automation for Intelligent Security Technologies Within Virtualized Environments

Traditional endpoint and infrastructure security approaches are tackling changes to OS, application and communication by monitoring these through dedicated solutions installed as agents onto the actual system. Often these solutions search for specific violations and act upon predefined white…

Blog

FIAM – Fake Identity and Access Management

Just when you thought we had enough variations of IAM, along comes FIAM. Fake digital identities are not new, but they are getting a lot of attention in the press these days. Some fake accounts are very sophisticated and are difficult for automated methods to recognize. Some are built using…

Webinar

Apr 24, 2018: An overview of the Leadership Compass: Endpoint Security Anti-Malware

Malware has been on the rise. Ransomware continues to grab the headlines. New malware variants proliferate by the millions. Old style manual malware analysis can't keep pace. But organizations are increasingly under attack. Fortunately, vendors have been enhancing and improving their…

Leadership Brief

Leadership Brief: The Anti-Malware Requirement in PSD2 - 79027

The Revised Payment Service Directive (PSD2) mandates thatservice providersevaluatetransaction requests for signs of malware infection. In order for transactions to be considered low-risk, there must be no signs of malware infection in any sessions of authentication events.

Blog

Not a Surprise: German Government Under (Cyber) Attack

Yesterday, the reports of the German government having become a victim of a cyber-attack spread the news. According to them, the attack affected the Ministry of Defense and the Department of Foreign Affairs. There is an assumption that the attack had been carried out by APT28, a group of…

Webinar

May 03, 2018: Zero Trust: Solving IT Security’s Identity Crisis

Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many…

Leadership Compass

Leadership Compass: Enterprise Endpoint Security: Anti-Malware Solutions - 71172

This report provides an overview of the market for Enterprise Endpoint Security: Anti-Malware Solutions and provides you with a compass to help you to find the Anti-Malware product that best meets your needs.  We examine the market segment, vendor product and service functionality,…

Blog

Spectre and Meltdown: A Great Start Into the New Year!

Looks like we the IT people have gotten more New Year presents than expected for 2018! The year has barely started, but we already have two massive security problems on our hands, vulnerabilities that dwarf anything discovered previously, even the notorious Heartbleed bug or the KRACK…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Cross-Border Verification with LIGHTest

Cross-Border Verification with LIGHTest

LIGHTest leverages on existing infrastructures to verify electronic transactions. This ability is especially useful for transactions that are not created in the same trust scheme or country as the entity validating the transaction. This is mainly because creating new infrastructure takes time, money and possibly other unforeseen costs. This post shows an example of how to use LIGHTest in practice. Let us assume there are two businesses that are working together for the first time, one from [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00