System Security

Blog

The end of Mobile Device Management (as we know it)

Just recently, BlackBerry announced the acquisition of Good. This is just one more acquisition of Mobile Security Management vendors. Quite a while ago, VMware acquired AirWatch, which so far has been the most prominent M&A activity in the field of Mobile Security Management. However,…

Webcast

Vulnerability Assessment 2.0: Improving Accuracy and Reducing Costs with Behavior Analysis

Vulnerability scanners and management tools have been an important part of every information security specialist’s arsenal for decades. Nowadays, with the continued erosion of corporate perimeters and overwhelming increase in advanced targeted attacks exploiting known and unknown…

Webcast

Mit Active Directory zu sicherer Zugriffskontrolle für das Digitale Business

„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen.

Webinar

Sep 01, 2015: Vulnerability Assessment 2.0: Improving Accuracy and Reducing Costs with Behavior Analysis

Vulnerability scanners and management tools have been an important part of every information security specialist’s arsenal for decades. Nowadays, with the continued erosion of corporate perimeters and overwhelming increase in advanced targeted attacks exploiting known and unknown…

Webinar

Jun 16, 2015: Mit Active Directory zu sicherer Zugriffskontrolle für das Digitale Business

„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen.

Advisory Note

Advisory Note: Information Security Predictions and Recommendations 2015 and beyond - 71045

Recommendations for investing in Information Security in 2015 and beyond. Predictions of the trends and hypes in Information Security in 2015. Advice on which of these trends and hypes to follow.

Executive View

Executive View: AirWatch and Bring Your Own Device (BYOD) - 71259

AirWatch enterprise mobility management platform provides an integrated combination of technology, support and certification services to address every organization’s unique requirements for implementing a viable Bring Your Own Device strategy.

Webcast

Make your Enterprise Applications Ready for Customers and Mobile Users

Rapidly growing demand for exposing and consuming APIs, which enables organizations to create new business models and connect with partners and customers, has tipped the industry towards adopting lightweight RESTful APIs to expose their existing enterprise services and corporate data to…

Executive View

Executive View: ERPScan Security Monitoring Suite for SAP - 71262

ERPScan Security Monitoring Suite for SAP is an enterprise level solution for SAP security. By addressing vulnerability management, source code security and the analysis of Segregation of Duties (SoD) violations, it provides comprehensive security analytics covering all relevant aspects of…

Webinar

Apr 16, 2015: Make your Enterprise Applications Ready for Customers and Mobile Users

Rapidly growing demand for exposing and consuming APIs, which enables organizations to create new business models and connect with partners and customers, has tipped the industry towards adopting lightweight RESTful APIs to expose their existing enterprise services and corporate data to…

Analysts' View

KuppingerCole Analysts' View on Mobile Enterprise

It is estimated by the International Telecommunication Union that the total number of mobile devices in the world has already exceeded the number of people. Mobile devices are becoming increasingly advanced as well. In fact, modern smartphones are as powerful as desktop computers, but…

Blog

Privacy Issues in Mobile Security

It is estimated by the International Telecommunication Union that the total number of mobile devices in the world has already exceeded the number of people. Mobile devices are becoming increasingly advanced as well. In fact, modern smartphones are as powerful as desktop computers, but…


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

What's the Next Generation in PAM?

Before there were PAM solutions everyone was given access to privileged accounts with little regard or control as to who had access to them, when they had access and what they did with that access. As security breaches started to rise and compliance regulations were written it was obvious that manual processes and home-grown approaches to manage privileged access weren't enough to secure your organization. First PAM solutions solved issues but were too inflexible That's when privileged [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00