System Security

Webcast

Secure Mobile Information Sharing: Adressing Enterprise Mobility Challenges in an Open, Connected Business

KuppingerCole Webinar recording

Webinar

Dec 16, 2014: Secure Mobile Information Sharing: addressing enterprise mobility challenges in an open, connected business

Fuelled by the exponentially growing number of mobile devices, as well as by increasing adoption of cloud services, demand for various technologies that enable sharing information securely within organizations, as well as across their boundaries, has significantly surged. This demand is no…

Blog

Mobile, Cloud, and Active Directory

Cloud IAM is moving forward. Even though there is no common understanding of which features are required, we see more and more vendors – both start-ups and vendors from the traditional field of IAM (Identity and Access Management) – entering that market. Aside from providing an alternative…

Webcast

How to Enable Social and Mobile Login - and Beyond

Mike Small, KuppingerCole Ian Glazer, salesforce.com Dr. Michael B. Jones, Microsoft Christian Patrascu, Oracle Corp. Daniel Raskin, ForgeRock Don Schmidt, Microsoft

Webcast

Borja Rosales, Martin Edwards - Defending Your Data in the Wild: Eliminating the Risks of Mobile Data

Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany

Blog

Antivirus is dead, so what?

A few days ago, while announcing their new Advanced Threat Protection initiative, Piero DePaoli, Symantec’s director of product marketing has made a provocative statement, proclaiming that ‘AV is dead’. His colleague Brian Dye said that antivirus software only catches around 45% of malware…

Blog

Why Apple’s culture of secrecy is your biggest risk in BYOD

The news of the bug in Apple operating systems has spread this week. As Seth Rosenblatt wrote on cnet, Apple’s culture of secrecy again has delayed a security response. While there is a patch available for iOS, the users of OS X still have to wait. I have written before about the risks…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

How to Train Your AI to Mis-Identify Dragons

This week Skylight Cyber disclosed that they were able to fool a popular “AI”-based Endpoint Protection (EPP) solution into incorrectly marking malware as safe. While trying to reverse-engineer the details of the solution's Machine Learning (ML) engine, the researchers found that it contained a secondary ML model added specifically to whitelist certain types of software like popular games. Supposedly, it was added to reduce the number of false positives their "main engine" was [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00