Videos

Latest videos

Watch the latest video blogs and webinar recordings. Stay up to date on new trends in the cybersecurity and identity industry to meet and exceed key business challenges.
Analyst Chat
Analyst Chat #158: The Crown Jewels Are a Lie
Jan 30, 2023

Is digital data really every organization's most precious possession, its "crown jewels"? Alexei Balaganski takes a different perspective towards a widely accepted opinion. He instead claims that data is not your most valuable asset. In fact, it can be a toxic liability without intrinsic value, since business value is only created when data is moving or transforming, producing insights, analytics, etc.

Webinar Recording
Debunking Common Myths about XDR
Jan 25, 2023
Cyber attacks are continually evolving and so are cyber defense technologies. In a few decades we have moved from anti-virus protection through an alphabet soup of acronyms, including EPP, EDR, EPDR, NDR, CWPP, SIEM, SOAR, and now XDR. It is therefore important for businesses to get a good understanding what combination of defense technologies to choose and why.
Analyst Chat
Analyst Chat #157: How to Refine Data like Oil - Data Quality and Integration Solutions
Jan 23, 2023

Who has not heard of the statement that "Data is the new Oil". But oil needs to be refined and so does data. The challenge of gathering, integrating, cleansing, improving, and enriching data across the complete range of data sources in an organization, for enabling use of that data as well as enabling data governance and supporting data security initiatives, that is the topic of this episode. Martin Kuppinger joins Matthias and explains this market segment and its relevance on the occasion of the publishing of a new Leadership compass covering "Data Quality and Integration Solutions".

Webinar Recording
Championing Privileged Access Management With Zero Trust Security
Jan 20, 2023
In the age of hybrid working, global organizations urgently need a unified approach towards securing their privileged identities, such as user accounts, devices, admins , and more, against abuse and insider threats. If one or more of these privileged identities were compromised, the consequences for organizations could be devastating, especially when looking at critical infrastructures.
Video
KC Open Select: Your #1 Shortlisting Tool
Jan 19, 2023

Discover and Compare Cybersecurity Solutions for Free

Optimize your decision-making process with the most comprehensive and up-to-date market data available.

Configure your individual requirements to find the right vendor for your business or follow the best practice recommendation of an unbiased research analyst.

Passwordless Authentication coming in Q1 2023!

Learn more: https://go.kuppingercole.com/open-select

Webinar Recording
Evolving Identity and Access Management for the Digital Era
Jan 18, 2023
Businesses are undergoing digital transformations and adopting new technologies to become as flexible and agile as possible to remain competitive. But ensuring that only authorized entities have access to critical business data and applications is essential. Modern IT demands modern IAM that supports cloud adoption and business process optimization.
Analyst Chat
Analyst Chat #156: CIEM Is Entering the Privileged Access Management Market
Jan 16, 2023

The PAM market is changing and expanding. Paul Fisher talks about the latest trends for Privileged Access Management, the role of CIEM, mergers and newcomers in this important market segment.

Analyst Chat
Analyst Chat #155: How to Create a Shortlist in 2023
Jan 09, 2023

A new year brings along a new service from KuppingerCole Analysts. Our host Matthias sits down with Christie Pugh, Digital Products Manager to discuss KC Open Select, our new interactive shortlisting service, the concept behind it, how it helps you prepare for the future, how it compares to our Leadership Compasses, and more.

The landscape of solutions in a market segment can be overwhelming. KC Open Select helps you to get a clearer overview of the market for free. Check it out now!

Interview
Continual Access Control, Policies and Zero Trust
Jan 04, 2023

Trust no one, always verify. We know that Zero Trust phrase already. But this principle is rather abstract - how and where exactly should we do that? Martin sits down with Jackson Shaw, Chief Strategy Officer at Clear Skye to discuss one very important part of Zero Trust: Identity and Access Management. Because you can only verify what or who you know - they need an identity to get access.

Previous
Page 1 of 12