Videos

Latest videos

Watch the latest video blogs and webinar recordings. Stay up to date on new trends in the cybersecurity and identity industry to meet and exceed key business challenges.
Webinar Recording
Urgent: Find and Block Identity-Centric Security Threats Today
Mar 22, 2023
The inability to deal with identity-centric cyber threats is one of the most critical issues facing modern enterprises. Attackers are increasingly targeting digital identities to gain unauthorized access to systems and data. Action is essential, but detecting unauthorized access is challenging.
Analyst Chat
Analyst Chat #165: How GPTs Will Change the Way We Work and Live
Mar 20, 2023

Get ready to hear a new take on generative pre-trained transformers! This week, Matthias sat down with Jörg Resch, Co-founder of KuppingerCole Analysts, to discuss the exciting possibilities of ChatGPT. Unlike Alexei, Jörg is an avid user and firm believer in the positive impact that these technologies can have on our daily lives and work. While acknowledging the risks involved, Jörg advocates for a balanced and creative approach to the potential of generative AIs. Brace yourself for a thought-provoking conversation that may just change the way you view the future.

Webinar Recording
Bringing Data Back Under Control
Mar 15, 2023
Data is your organization’s most important asset, and yet it is increasingly held and processed outside of your control. Data security, resilience and storage is becoming increasingly challenging and costly. A new approach is needed to adapt quickly and bring these things under control amid increasing geopolitical uncertainty and risk.
Analyst Chat
Analyst Chat #164: Trends and Predictions for 2023 - Passwordless Authentication
Mar 13, 2023

Matthias and Martin continue their sub-series of the Analyst Chat about Trends and Predictions in 2023 and beyond. This time, it’s about Passwordless Authentication. Martin elaborates on the importance of Passwordless Authentication for the whole Access Management process. Companies should implement a passwordless authentication solution soon to get rid of poor user experience and security risks.

Webinar Recording
Re-Imagining Identity Management for the Digital Era
Mar 10, 2023
An explosion of digital identities, coupled with multi-cloud adoption and the trend of working from anywhere, is adding complexity to managing identities and access rights. An innovative strategy is needed to enable organizations to support business and security needs in the digital era.
Video
What is the Digital Double?
Mar 09, 2023

Everything we do in the digital world, is done by our digital representation of the physical world. Asanka Abeysinghe of WSO2 invented the idea of the "digital double" - a replication of people and things in a digital ecosystem.

He is a guest on our videocast and discusses with Martin Kuppinger how the digital double can become a reality, its benefits and how it relates to consumer identity management.

Webinar Recording
Cyber Resilience Through SOC Automation
Mar 08, 2023
Cyber resilience is now essential for the survival of every business, but identifying and responding to cyber threats quickly is challenging. Staff at many Security Operations Centers (SOCs) are struggling due to the high volume of security alerts, coupled with a shortage of cybersecurity talent. To address these issues, many companies are turning to automation.
Analyst Chat
Analyst Chat #163: Zero Trust in Artificial Intelligence
Mar 06, 2023

In this podcast episode, Alexei Balaganski and Matthias discuss the increasing use of ChatGPT and other machine learning-based technologies in research and the potential risks associated with their use. Alexei offers a strong opinion on the topic, describing the risks of plagiarism and lack of originality that can result from over-reliance on automated tools. He argues that human analysts provide invaluable opinions and genuine research that cannot be replicated by machines. He strongly discourages their use and reliance, and encourages the creativity and innovation of human researchers.

Webinar Recording
Mehr Widerstandsfähigkeit Gegen Cyberangriffe: Das Automatisierte SOC
Mar 03, 2023
Cybersicherheit ist zu einer zentralen Herausforderung für jedes Unternehmen geworden. Die Widerstandsfähigkeit, also die Cyber Resilience, ist inzwischen elementar für die Überlebensfähigkeit von Unternehmen. Die automatisierte Analyse und Reaktion von sicherheitsrelevanten Informationen und Ereignissen wird dabei von sogenannten SOAR-Lösungen (Security Operations and Automated Response) unterstützt, die nicht nur Informationen vergleichen und analysieren, sondern direkt „operational“ machen und automatisierte Reaktionen und nachgelagerte Prozesse wie die Incident Response anstoßen können.
Webinar Recording
Understanding the Privacy Evolution to Get Ahead of the Curve
Mar 01, 2023
In the age of big data, AI, multi-cloud and hybrid IT environments, and ever closer links between customers, third parties and organizations, businesses need to think more carefully about privacy. But this can be challenging, with rapidly evolving technology and increased regulatory complexity.
Analyst Chat
Analyst Chat #162: Trends and Predictions for 2023 - Integration of IGA and Data Governance
Feb 27, 2023

In this podcast episode, Martin Kuppinger and Matthias explore the upcoming trend of IGA (Identity Governance and Administration) solutions to have an increasing level of integration with Data Governance and Software Security products.

The integration of these solutions will provide a comprehensive coverage of ownership not only of systems and authorization objects, but also of data and code, ensuring a complete chain of custody. They delve into the importance of this integration, the benefits it offers, and how it will help organizations manage their identities and data more efficiently and securely. They also discuss the potential challenges and considerations that organizations need to be aware of while integration these solutions.

Analyst Chat
Analyst Chat #161: Managing Network Connectivity and Security with SASE Solutions
Feb 20, 2023

With the rapid expansion of IT environments, adoption of the cloud, and the ongoing Digital Transformation, the need to provide secure access to organizational resources has become paramount. Secure Access Service Edge (SASE) solutions are designed to consolidate network and security components, simplify management and licensing, and improve usability.

SASE is the union of a number of different networking and security technologies designed to improve security posture as well as connectivity for remote offices, cloud services, contractors, and remote employees, while driving down the cost of connectivity. John Tolbert is a guest in the Analyst Chat again and will give us some insight into this topic.

Webinar Recording
The Future of Privileged Access Management
Feb 15, 2023
PAM is an established and essential discipline within IAM. Traditional PAM is primarily focused on securing privileged access, for instance of administrators, to servers and systems. In today’s dynamic IT environments, the need for just-in-time access and for supporting agile workloads in IaaS environments is growing. PAM must support these emerging needs. There also is a growing need for integration with other areas of IAM such as Access Management solutions.
Analyst Chat
Analyst Chat #160: Upgrade Your Security Management Game
Feb 13, 2023

Cyberattacks have been intensifying over the past few years as cybercriminals continue to devise new strategies to launch sophisticated attacks and gain unauthorized access. The tactics, techniques, and procedures (TTPs) that were once only used by well-funded state actors are being commoditized by cybercriminals. As a result, some vendors realized that the traditional approaches and tools of cybersecurity have failed to keep up.

Parallel to SIEM solutions, a class of incident investigation and response platforms has emerged focusing on creating more streamlined and automated workflows for dealing with security incidents. Security Orchestration, Automation, and Response (SOAR) products are the latest iteration of this evolution. SOAR vendors provide solutions that offer centralized coordination, collaboration, and management for forensic analysis and incident response.

Webinar Recording
Access Governance für SAP-Systeme – Direkt aus dem IGA-System
Feb 10, 2023
SAP-Systeme sind zentrale Komponenten der Business-Anwendungen in vielen Unternehmen. Mit der vermehrten Nutzung von anderen Cloud-Lösungen für Teile der Geschäftsprozesse sind sie aber längst nicht mehr die einzigen Lösungen, in denen kritische Informationen gehalten werden. Damit stellt sich immer mehr die Frage, welche Systeme die Zugriffskontrolle und Risikoanalyse für SAP übernehmen. IGA-Lösungen können hier eine zentrale Funktion übernehmen, um Audit- und Sicherheitsanforderungen effizient und integriert umzusetzen.
Webinar Recording
Unlock the Potential of Passwordless Authentication
Feb 09, 2023
The idea of passwords becoming obsolete has been discussed by the IT industry for years, if not decades. In recent years, Passwordless Authentication has become a popular and catchy term. It is used to describe a set of identity verification solutions that remove the password from all aspects of the authentication flow, and from the recovery process as well. Some passwordless options have been around for a while but are starting to be implemented more by enterprises and even consumer-facing businesses.
Analyst Chat
Analyst Chat #159: The 5 Most Common Problems When Choosing a New Tool
Feb 06, 2023

Sometimes a company comes to a point where new software or a new tool is required. This is never an easy decision to make quickly.

Dr. Phillip Messerschmidt has worked with many different clients who have found themselves in this situation. He will explain five of the most common misconceptions and problems he has encountered in his experience - and offer some recommendations on how to avoid them.

Analyst Chat
Analyst Chat #158: The Crown Jewels Are a Lie
Jan 30, 2023

Is digital data really every organization's most precious possession, its "crown jewels"? Alexei Balaganski takes a different perspective towards a widely accepted opinion. He instead claims that data is not your most valuable asset. In fact, it can be a toxic liability without intrinsic value, since business value is only created when data is moving or transforming, producing insights, analytics, etc.

Webinar Recording
Debunking Common Myths about XDR
Jan 25, 2023
Cyber attacks are continually evolving and so are cyber defense technologies. In a few decades we have moved from anti-virus protection through an alphabet soup of acronyms, including EPP, EDR, EPDR, NDR, CWPP, SIEM, SOAR, and now XDR. It is therefore important for businesses to get a good understanding what combination of defense technologies to choose and why.
Analyst Chat
Analyst Chat #157: How to Refine Data like Oil - Data Quality and Integration Solutions
Jan 23, 2023

Who has not heard of the statement that "Data is the new Oil". But oil needs to be refined and so does data. The challenge of gathering, integrating, cleansing, improving, and enriching data across the complete range of data sources in an organization, for enabling use of that data as well as enabling data governance and supporting data security initiatives, that is the topic of this episode. Martin Kuppinger joins Matthias and explains this market segment and its relevance on the occasion of the publishing of a new Leadership compass covering "Data Quality and Integration Solutions".

Webinar Recording
Championing Privileged Access Management With Zero Trust Security
Jan 20, 2023
In the age of hybrid working, global organizations urgently need a unified approach towards securing their privileged identities, such as user accounts, devices, admins , and more, against abuse and insider threats. If one or more of these privileged identities were compromised, the consequences for organizations could be devastating, especially when looking at critical infrastructures.
Video
KC Open Select: Your #1 Shortlisting Tool
Jan 19, 2023

Discover and Compare Cybersecurity Solutions for Free

Optimize your decision-making process with the most comprehensive and up-to-date market data available.

Configure your individual requirements to find the right vendor for your business or follow the best practice recommendation of an unbiased research analyst.

Passwordless Authentication coming in Q1 2023!

Learn more: https://go.kuppingercole.com/open-select

Webinar Recording
Evolving Identity and Access Management for the Digital Era
Jan 18, 2023
Businesses are undergoing digital transformations and adopting new technologies to become as flexible and agile as possible to remain competitive. But ensuring that only authorized entities have access to critical business data and applications is essential. Modern IT demands modern IAM that supports cloud adoption and business process optimization.
Analyst Chat
Analyst Chat #156: CIEM Is Entering the Privileged Access Management Market
Jan 16, 2023

The PAM market is changing and expanding. Paul Fisher talks about the latest trends for Privileged Access Management, the role of CIEM, mergers and newcomers in this important market segment.

Analyst Chat
Analyst Chat #155: How to Create a Shortlist in 2023
Jan 09, 2023

A new year brings along a new service from KuppingerCole Analysts. Our host Matthias sits down with Christie Pugh, Digital Products Manager to discuss KC Open Select, our new interactive shortlisting service, the concept behind it, how it helps you prepare for the future, how it compares to our Leadership Compasses, and more.

The landscape of solutions in a market segment can be overwhelming. KC Open Select helps you to get a clearer overview of the market for free. Check it out now!

Interview
Continual Access Control, Policies and Zero Trust
Jan 04, 2023

Trust no one, always verify. We know that Zero Trust phrase already. But this principle is rather abstract - how and where exactly should we do that? Martin sits down with Jackson Shaw, Chief Strategy Officer at Clear Skye to discuss one very important part of Zero Trust: Identity and Access Management. Because you can only verify what or who you know - they need an identity to get access.