Francesco Stasi: AI-Driven Insights From Historical Customer and Employee Conversations: The Next Frontier ... Dec 03, 2020
Martin Kuppinger: Where AI, Industrial IoT, Consumer IoT, Blockchain, Decentralized Identity, and Edge Comp... Dec 03, 2020
KuppingerCole Analyst Chat: The Project Road Towards Zero Trust - What to Do and Where to Start Nov 30, 2020
Markus Malewski, Joerg Hesske: No Chance for Hackers and Spies. Why Thyssenkrupp Takes a Completely Differe... Nov 20, 2020
Wallix Workshop - It`s all about Access! PAM-Lösungen – SetUp und Mehrwert durch Integration Nov 20, 2020
Palo Alto Networks Workshop - Cloud-Native Security is Different and Here is Why - Play Some Capture the Fl... Nov 20, 2020
Alexander Koerner: Holen Sie das Beste aus PAM heraus: Wie man die Verwaltung des privilegierten Accounts s... Nov 20, 2020
Gerald Beuchelt, Daniel Holzinger: Passwörter: gehasst und doch unverzichtbar. Ist passwortlose Authentifiz... Nov 20, 2020
Zoltan Bakos: Integration des Privileged Access Management in wichtige Geschäftsprozesse und -vorgänge, um ... Nov 20, 2020
Dominik Schönwetter: Rollenbasiertes IAM in einem Compliance-getriebenen Unternehmen. Erfahrungsbericht aus... Nov 20, 2020
Mohamed Ibbich: Welche Rolle spielt ein umfassender Privileged Access Management-Ansatz bei der sicheren An... Nov 20, 2020
Jochen Werne: Verfügungsmacht. Why Access Always Matters. Vergangenheit Verstehen, um Zukunft Sicher Zu Ges... Nov 20, 2020
Ioannis Chrysakis: The CAP-A Best Practice: Towards Enabling a Privacy-Friendly Apps Market by Applying a C... Nov 16, 2020
Christopher Schuetze: Safer With Security - How Fabrics Can Be Used to Manage the Complexity of Your Enterp... Nov 13, 2020
Martin Rohrer: Cyber Navigation in Turbulent Times – How Cyber Maturity Assessments Provide a Sense of Dire... Nov 13, 2020
Darran Rolls: The Confessions of an X-CISO: Identity Centric Security @ Enterprise Scale Nov 12, 2020
Jean-Christophe Gaillard: The Cyber Security Skills Gap: Real Problem or Self-inflicted Pain? Nov 12, 2020
KuppingerCole Analyst Chat: Emerging Technologies in Healthcare - Solutions and Use Cases Nov 09, 2020
Decoding Advanced Privileged Access Management for Digital Environments - A conversation with Paul Fisher a... Nov 04, 2020
Dr. André Kudra: Integrating Decentralized Identity Into Your Existing Infrastructure: Do's and Don'ts Oct 29, 2020
Richard Meeus: Don’t Treat Your Customers Like Criminals: CIAM Best Practices to Balance CX and Security Oct 29, 2020
Berthold Kerl, Dr. Karsten Kinast: After Privacy Shield's Death: What Is Still Possible? Oct 28, 2020
Katryna Dow: Human-centric Data & Identity Management – Implementing Real World Case Studies Oct 28, 2020
Dr. Torsten Lodderstedt: eKYC: Seamless Customer Identification Using Existing Verified Digital Identities. Oct 28, 2020
Martin Kuppinger: The First Steps to CIAM: Verify Your Customer, Authenticate Your Customer Oct 28, 2020
Panel: Best Ways to Balance User Experience & Security for your Consumer Identity Management Strategy Oct 28, 2020
KuppingerCole Analyst Chat: The European Cybersecurity Month - Ensuring Security Beyond Awareness Oct 19, 2020
Gillan Ward: The Use of Real World Evidence (and Identities) in Support of Identity and Access Management Oct 02, 2020
Pavel Volosen: An Implementer’s Perspective to Traditional Identity Access Governance (IAG) vs Identity Acc... Oct 02, 2020
Jessica Constantinidis: Who Are Your Customers, and Why Do They Need You or Your Product? Find the Real Bus... Oct 02, 2020
Alpha Barry: The Value of Identity Governance and Administration in Non-Regulated Companies Sep 18, 2020
Mans Hakansson: Modernizing IAM - Implementing Policy Based Access Management & Governance Sep 18, 2020
Darran Rolls: Standing on the Beach, Looking at the Sea: Identity Governance & Administration, Today, Tomor... Sep 18, 2020
David Black: The Use of Real World Identities in Support of Identity and Access Management Sep 18, 2020
Matthias Reinwarth: Beyond Static Access - Leveraging Access Policies To Deal With The Increasing Complexit... Sep 18, 2020
Mike Kiser: 13 Treasures in 81 Minutes: The Isabella Stewart Gardner Heist and Identity as the New Vermeer Sep 08, 2020
Loren Russon: Good Enough is Never Enough When Protecting Your Business Resources & Customer’s Data Sep 08, 2020
Designing and Establishing a Mature PAM Ecosystem for Reducing Risk in Your Organisation Sep 02, 2020
David Wishart: How to Solve the Top 5 Access Management Challenges in Hybrid Cloud Environments Aug 21, 2020
Adrian Doerk: Bringing Self-Sovereign Identity Into Practice: Lessons Learned from Lissi and the SSI for Ge... Aug 07, 2020
KuppingerCole Analyst Chat: COVID Response and Decentralized Identity Solutions/Verifiable Credentials Aug 07, 2020
Marco Cuomo, Daniel Fritz: Blockchain-anchored Identities and Credentials Enabling Digital Transformation i... Aug 07, 2020
Panel - Where Do We Stand on Self-Sovereign Identity? Business Value and Opportunities Under SSI Framework Aug 07, 2020
KuppingerCole Analyst Chat: ITSM and IGA - How to Integrate Two Key Infrastructures Right Jul 27, 2020
Interview: Implications of Recent Court Ruling on EU-US Data Protection Umbrella Agreement Jul 20, 2020
Panel: Customer Identities are Critical – How Can Businesses Build Trust and a Privacy-Centric CIAM Strategy? Jul 20, 2020
KuppingerCole Analyst Chat: Data Management and Data Lineage - The Foundation for Big Data Governance and S... Jul 20, 2020
KuppingerCole Analyst Chat: A Cybersecurity Reference Architecture for Your Security Fabric Jul 17, 2020
Didier Cohen: Forget About Complex PAM Projects: Now’s the Time for Quick, Easy and TCO-efficient Privilege... Jul 13, 2020
Panel - Digital Trends, Risks and Rewards - Achieving Control of Privilege Accounts in the Digital Enterprise Jul 13, 2020
Martin Kuppinger: PAM: You're not alone. The interplay of PAM with Cybersecurity, IAM, and ITSM Jul 10, 2020
KuppingerCole Analyst Chat: A Holistic View of Cybersecurity - Introducing the Security Fabric Jul 06, 2020
KuppingerCole Analyst Chat: Functionalities at the Core of a Privileged Account Management System Jun 29, 2020
Mike Small: Cloud Backup and Disaster Recovery Why This Is an Essential Component of Digital Transformation Jun 22, 2020
Oliver Cheal, Paul D'Cruz: How Has the IT Security Roadmap Changed in 2020 for Businesses? Jun 22, 2020
The Future of Privileged Access Management and Reducing Risk for Modern Digital Enterprises Jun 19, 2020
Christopher Schuetze: Necessary Components of an Effective Cyber Supply Chain Risk Management (C-SCRM) Jun 09, 2020
Matthias Reinwarth: Optimizing Your Cybersecurity Spending: Where to Put Your Money During and After the Cr... Jun 08, 2020
Christopher Schuetze: Prepare & Invest Now – And Survive an Incident or a Breach Tomorrow Jun 08, 2020
Matthias Canisius: Return to Base | The CISO's Guide to Preparing A COVID-19 Exit Strategy Jun 08, 2020
KuppingerCole Analyst Chat: Identity Vetting - Dealing With the Wave of Fraud During the Pandemic Jun 05, 2020
Digital Identities & Healthcare IAM: Balancing Efficiency in Clinical Workflows and the Need for Security &... May 08, 2020
KuppingerCole Analyst Chat: Making IAM Projects Succeed - The Importance of Project Management May 04, 2020
KuppingerCole Analyst Chat: Making IAM Projects Succeed - Why You Need a Solution Architecture Apr 27, 2020
Modernizing IAM solutions leveraging new operating models with the KuppingerCole Identity Fabric Mar 12, 2020
Holen Sie sich das SIEM, das Sie schon immer wollten: intelligent, automatisiert, mit unbegrenzter Kapazität Feb 18, 2020