Multispeed IT & Application Architecture

Webcast

The CISO Imperative: Taking Control of SAP Cyber Attacks

It is impossible to overestimate the importance of SAP system security for modern enterprises. SAP solutions are widely used in all industries to store sensitive information and run critical business processes: from Enterprise Resource Planning and Human Resources systems to Business…

Webcast

Vulnerability Assessment 2.0: Improving Accuracy and Reducing Costs with Behavior Analysis

Vulnerability scanners and management tools have been an important part of every information security specialist’s arsenal for decades. Nowadays, with the continued erosion of corporate perimeters and overwhelming increase in advanced targeted attacks exploiting known and unknown…

Webinar

Sep 29, 2015: The CISO Imperative: Taking Control of SAP Cyber Attacks

It is impossible to overestimate the importance of SAP system security for modern enterprises. SAP solutions are widely used in all industries to store sensitive information and run critical business processes: from Enterprise Resource Planning and Human Resources systems to Business…

Executive View

Executive View: Onapsis Security Platform - 71290

Onapsis Security Platform es una solución de seguridad para aplicaciones críticas de negocio en SAP. Una plataforma con conocimiento del contexto, segura y lista para la nube, que integra controles de vulnerabilidad y cumplimiento normativo, detección y respuesta a…

Executive View

Executive View: Onapsis Security Platform - 71290

Onapsis Security Platform ist eine Sicherheitslösung für kritische Unternehmensanwendungen in SAP-Umgebungen. Diese Sicherheitslösung bietet eine kontextsensitive, sichere und cloud-fähige Plattform, die Schwachstellen- und Compliance-Steuerung, Echtzeiterkennung und…

Leadership Brief

Leadership Brief: SAP Security Priorities - 72017

Changing enterprise infrastructures and the overall growing threat level influence the security of all vital business-supporting systems and processes. Identifying the priorities for securing your SAP infrastructure and maintaining appropriate security is a continuous business and…

Webinar

Sep 01, 2015: Vulnerability Assessment 2.0: Improving Accuracy and Reducing Costs with Behavior Analysis

Vulnerability scanners and management tools have been an important part of every information security specialist’s arsenal for decades. Nowadays, with the continued erosion of corporate perimeters and overwhelming increase in advanced targeted attacks exploiting known and unknown…

Advisory Note

Advisory Note: EIC 2015 Trends and Hot Topics - 71301

10 Information Security topics that were central at European Identity & Cloud Conference 2015

Executive View

Executive View: Onapsis Security Platform - 71290

Onapsis Security Platform is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform to integrate vulnerability and compliance controls, real-time detection and response, as well as advanced threat protection…

Congress

May 10 - 13, 2016: European Identity & Cloud Conference 2016

European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

Executive View

Executive View: ERPScan Security Monitoring Suite for SAP - 71262

ERPScan Security Monitoring Suite for SAP is an enterprise level solution for SAP security. By addressing vulnerability management, source code security and the analysis of Segregation of Duties (SoD) violations, it provides comprehensive security analytics covering all relevant aspects of…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

API Security in Microservices Architectures

API Security in Microservices Architectures

Microservice-based architectures allow businesses to develop and deploy their applications in a much more flexible, scalable and convenient way – across multiple programming languages, frameworks and IT environments. Like with any other new technology that DevOps and security teams started to explore in the recent years, there is still quite a lot of confusion about the capabilities of new platforms, misconceptions about new attack vectors and renewed discussions about balancing security [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00