KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Digitalization evolves with the increased use of microcomputers in everyday objects like cars and smart fridges, but also in industrial applications. Therefore, communication between devices is growing accordingly. While connecting devices is supposed to make our lives easier, it poses a great challenge from a security standpoint. Every connection opens a potential backdoor for attackers to slip inside your network.
Digitalization evolves with the increased use of microcomputers in everyday objects like cars and smart fridges, but also in industrial applications. Therefore, communication between devices is growing accordingly. While connecting devices is supposed to make our lives easier, it poses a great challenge from a security standpoint. Every connection opens a potential backdoor for attackers to slip inside your network.
This KuppingerCole webinar offers a comprehensive exploration of access control challenges, the limitations of traditional RBAC and PBAC, some innovative policy-driven solutions, a demonstration of policy-driven RBAC in MidPoint, and actionable insights for enhancing access control strategies.
Join experts from KuppingerCole Analysts AG and Evolveum to unravel the complexities of modern access control and explore the challenges faced by organizations striving to protect their digital assets.
Paul Fisher, Lead Analyst at KuppingerCole Analysts, will look at the concept of the “access control zoo” and talk about why numerous methods exist. He will also outline why some organizations stick with flawed models like RBAC, and how adopting improved access controls can enhance identity and access management within businesses.
Radovan Semancik, Co-Founder and Software Architect at Evolveum will present a bottom-up approach and explain how midPoint's dynamic policy-driven RBAC addresses these challenges effectively.
Join Identity Management experts from KuppingerCole Analysts and Thales as they discuss how best to tackle the complexities of an increasingly interconnected B2B digital ecosystem, and overcome the operational inefficiencies, security risks, high admin costs, and poor user experiences associated with homegrown legacy IAM systems and solutions tailored to B2E IAM requirements.
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the drivers and challenges of B2B Identity Management in an age of Work from Anywhere (WfA), and give his perspective on the special requirements for B2B Identity Management compared with B2E/workforce IAM and CIAM (Customer & Consumer IAM).
Marco Venuti, IAM Business Acceleration Director at Thales will detail a cost-effective and efficient approach to dealing with the complex demands of modern B2B and B2B2C Identity Management. He will describe how to meet the demands of digital-first businesses with the right level of automation.
Join identity experts at KuppingerCole Analysts and iProov to as they discuss the vulnerabilities of access control systems that rely on something that is known or possessed, and the value of adding biometrics. They will also discuss the role of biometrics in identity verification and proofing, and how to ensure biometrics are used safely to address privacy concerns.
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the drivers of the growing demand for identity verification and identity proofing across a range of use cases from B2E to B2B and B2C, including the Work from Anywhere trend and Supply Chain Security/3rd Party Risk Management. He will also look at which signals can be used for identity proofing.
Joe Palmer Chief Product & Innovation Officer of iProov will explain how biometrics can improve security for digital and physical access. He will also provide guidance on aligning biometrics with high-risk changes in the identity lifecycle, inclusivity considerations, and mitigating the risk of generative AI in cyber-attack methodologies.
Join experts from KuppingerCole Analysts and Tuebora as they discuss how to make sense of the different approaches to access to control, the pros and cons of each, and how to make good decisions about managing access control throughout the access control landscape.
Nitish Deshpande, Research Analyst at KuppingerCole Analysts provides an overview of policy Based Access Control (PBAC), future of policies in identity management, security, and business advantages of adopting this approach to identity management.
Brian Iverson, Chief Product Officer at Tuebora explains why organizations need to take policies more seriously, with identity governance and administrative (IGA) technologies applicable to most of organizations’ application portfolios. He shows how to combine the best of PBAC and RBAC to reduce risk and maximize compliance.
Join security experts from KuppingerCole Analysts and Imperva as they discuss the challenges of protecting data distributed across hybrid IT environments, and look at what technologies and services can be combined to meet those challenges effectively and efficiently as a growing number of organizations migrate to the cloud.
Alexei Balaganski, Lead Analyst and CTO at KuppingerCole will explain the concept of a Data Security Platform (DSP), identify the required capabilities and future evolution of DSPs, and look at current data security market trends.
Terry Ray, SVP of Data Security GTM, Field CTO, and Imperva Fellow will share his security industry experience and expertise on data protection, on meeting security requirements of customers and regulators from every industry sector, and provide an overview of Imperva’s data security solutions, with reference to the concept of a data security fabric.
Join experts from KuppingerCole Analysts and SecureAuth as they discuss why not all MFA solutions offer the same level of protection, and how organizations can improve their security posture and user experience by adopting a different approach that combines MFA with risk-based Passwordless Authentication.
Alejandro Leal, Research Analyst at KuppingerCole Analysts, will explore some of the problems with legacy MFA solutions and how a passwordless solution can improve usability and security. He will also explain some common passwordless features such as device trust and risk-based authentication.
Nawshad Hoossanbuksh, Senior Product Manager at SecureAuth will explain how adopting a passwordless continuous authentication approach can protect against phishing, brute-force, and MFA by-pass attacks such as MFA fatigue or MA bombing. He will also give an overview of SecureAuth’s Arculix passwordless continuous authentication solution.
A modern approach to securing privileged accounts is to apply the principle of Zero Trust: Never trust, always verify. While Zero Trust is not an off-the-shelf solution, it is modern vendors of PAM solutions that recommend using this security principle to cement the technical capabilities of their products. This webinar will provide actionable insights for organizations to employ Zero Trust security in their overall PAM strategy and operations.
Paul Fisher, Senior Analyst at KuppingerCole, will look at the origins of Zero Trust theory and its development as well as how Zero Trust fits into the KuppingerCole identity and cybersecurity fabric architecture concepts. He will address how Zero Trust can assist in managing cloud entitlements and discuss we 100% Zero Trust is possible. Srilekha Sankaran, product consultant for PAM solutions at ManageEngine, will address the risks of insider threats and privilege misuse in the era of hybrid work, and discuss the management and elimination of the risks posed by standing privileges.
In this webinar Lead Analyst and PAM specialist Paul Fisher will guide you through how this shift has happened, what it means for you organization, and how you can benefit from the Pamocracy. He will also explain how Privileged Access Management vendors and cloud providers have adapted to this new paradigm through innovation and addressing new market needs. It is a fascinating area of identity management that no business can afford to ignore.
As part of this webinar, Paul will introduce KC Open Select. The new online tool from KuppingerCole that helps buyers choose the right IT solutions, and how this will help you in choosing the best PAM solution.
Join security experts from KuppingerCole Analysts and SentinelOne to help you get an understanding of what eXtended Detection & Response (XDR) really is, and why you should consider this emerging technology in your enterprise security stack.
John Tolbert, Director Cybersecurity Research at KuppingerCole and Marko Kirschner, Director of Sales Engineering Central Europe at SentinelOne will define XDR, including which technical components are necessary for distinguishing XDR from Endpoint Detection & Response (EDR), and how XDR differs from Security Orchestration Automation & Response (SOAR).
They will also discuss why XDR is an important useful amalgamation and evolution of security tool sets, the use cases it solves, and where it should fit on organizational security technology roadmaps.
Join experts from Kuppinger Cole Analysts and Palo Alto Networks as they discuss why automating as much as possible and providing information to enable analysts to make timely decisions should be a priority for SOC management. They will also explore the benefits of Security Orchestration, Automation & Response (SOAR) technologies.
Paul Simmonds, Fellow Analyst at KuppingerCole, will address the requirements of modern SOCs, highlighting the importance of automation and integration. He will focus on SOAR, discuss the top use cases and requirements of SOAR, and explain how it relates to other security technologies for a modern SOC such SIEM and XDR.
Amitabh Singh, Field CTO EMEA at Palo Alto Networks, will provide insights into Palo Alto Networks' XSOAR (eXtended SOAR) approach, its key capabilities, and its relevance to modern, highly automated SOCs. He will describe how XSOAR solutions can be used to augment existing SOCs or be used as a foundation for new SOCs, and how XSOAR relates to ASM, XDR, and XSIAM.
Join cybersecurity experts at KuppingerCole Analysts and workforce authentication firm Secret Double Octopus as they discuss the ways cyber-attackers are getting around MFA systems. They will also look at how organizations can better deploy MFA and go one step beyond to deliver strong security outcomes, thereby reducing risk, cost, and user friction.
Paul Fisher, Lead Analyst at KuppingerCole will look at why passwords persist despite their weaknesses, discuss the evolution and shortcomings of MFA, look at why attacks and losses continue despite the increased adoption of MFA, and explain the benefits and challenges of passwordless authentication.
Horacio Zambrano, CMO and Cyber Strategist at Secret Double Octopus will discuss what next generation authentication solutions look like, the current drivers of strong authentication, and the key considerations when choosing a passwordless authentication solution. These considerations illuminate how to best achieve success with these projects in today’s world of Zero Trust and hybrid workplaces.
Join experts from KuppingerCole Analysts and data security firm ShardSecure as they discuss data confidentiality in the context of modern infrastructures, quantum computing, and data protection regulations. They will also discuss data resilience, why it is important, and how best to achieve it.
Mike Small, Senior Analyst at KuppingerCole will Senior Analyst at KuppingerCole will introduce why data is the critical element of the modern IT infrastructure. He will also review current approaches and their effectiveness in the digital era, where the loss of data can have a devastating impact.
Pascal Cronauer, Head of EMEA, and Julian Weinberger, Field CTO, both at ShardSecure will describe a cost-effective approach to data security, provide an overview of the ShardSecure MSX solution, and explain how it has helped customers to gain control of the security of their data and reduce the cost of managing it.
Join this webinar to: