KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Join security and business experts from KuppingerCole Analysts and cyber technology firm Exeon Analytics as they discuss how these challenges can be met using machine learning supported and log data based Network Detection & Response solutions to improve the overall cyber security and resilience of organizations.
John Tolbert, Lead Analyst at KuppingerCole Analysts will look at reasons for deploying NDR, the various deployment models, and use cases for enterprise IT and OT environments. He will also explain how ML-enhanced detection algorithms increase confidence and reduce false positives, and discuss key requirements for choosing NDR solutions and how NDR fits into the XDR landscape.
Michael Tullius, Sales Director Germany at Exeon Analytics will discuss why NDR is necessary and how it can benefit security leaders, admins, and incident responders. He will also give examples of detectable use cases, provide an overview of Exeon’s NDR solution, and share recommendations for improving cyber resilience.
Join security experts from KuppingerCole Analysts and SentinelOne to help you get an understanding of what eXtended Detection & Response (XDR) really is, and why you should consider this emerging technology in your enterprise security stack.
John Tolbert, Director Cybersecurity Research at KuppingerCole and Marko Kirschner, Director of Sales Engineering Central Europe at SentinelOne will define XDR, including which technical components are necessary for distinguishing XDR from Endpoint Detection & Response (EDR), and how XDR differs from Security Orchestration Automation & Response (SOAR).
They will also discuss why XDR is an important useful amalgamation and evolution of security tool sets, the use cases it solves, and where it should fit on organizational security technology roadmaps.
Join Identity Management experts from KuppingerCole Analysts and Thales as they discuss how best to tackle the complexities of an increasingly interconnected B2B digital ecosystem, and overcome the operational inefficiencies, security risks, high admin costs, and poor user experiences associated with homegrown legacy IAM systems and solutions tailored to B2E IAM requirements.
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the drivers and challenges of B2B Identity Management in an age of Work from Anywhere (WfA), and give his perspective on the special requirements for B2B Identity Management compared with B2E/workforce IAM and CIAM (Customer & Consumer IAM).
Marco Venuti, IAM Business Acceleration Director at Thales will detail a cost-effective and efficient approach to dealing with the complex demands of modern B2B and B2B2C Identity Management. He will describe how to meet the demands of digital-first businesses with the right level of automation.
Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture for ensuring that all IT networks and information systems are protected from cyber-attacks.
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will talk about where, why, and how managed services can be utilized to speed up the Zero Trust journey. He will also highlight important requirements, including a high degree of standardization of services and the enforcement of Zero Trust principles such as "always verify".
Heiko Hütter, CEO of Service Layers, will share his perspectives on the benefits and challenges of Zero Trust and IAM Managed Services, give some real-world examples to show the benefits of a combined strategy, discuss how best to implement this strategy to reduce the risk of data breaches, and give an overview of iC Consult’s related expertise and services.
Join identity and security experts from KuppingerCole Analysts and ARCON for a lively discussion about what exactly are the biggest identity challenges facing modern businesses, how those challenges are likely to evolve, and what could be done to meet current and future needs.
Participate in the debate between Martin Kuppinger, Principal Analyst at KuppingerCole Analysts and Gautam Singh Deo, Director - Strategic Business Engagements at ARCON as they discuss how to move beyond siloed approaches to ensure a security outcomes approach that is focused on identity.
Put your questions forward as our experts consider how best to achieve an identity-centric strategy that combines the best of Zero Trust, IAM, IGA and PAM, and as they explore the benefits of a converged identity security approach using Contextual Data Models.
Join security experts from KuppingerCole Analysts and Pathlock as they discuss why modern applications need more granular and context-based access controls, why it is important that these controls can adapt to changing business needs and user behaviors, and how that can be achieved.
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide a head-to-head comparison of key features of common, traditional IGA, and the established access control tools for SAP and other Line of Business (LoB) applications.
Carrie Curry, VP of Customer Advisory at Pathlock will explain the benefits of a holistic application access management approach that can provide real-time access decisions based on contextual data, that can support compliance, that provides fine-grained controls, and that can reduce the cost and effort of access reviews. She will also discuss why organisations need to have a cross-system and application view when it comes to Access Governance.
Businesses and organizations are undergoing digital transformations and adopting new technologies to become as flexible and agile as possible to remain competitive. The continuing and increasing shift to remote and hybrid work will contribute to further adoption of Passwordless Authentication solutions and services by both workforce and customers. However, selecting the right passwordless solution must meet the unique requirements and needs of organizations regarding security, user experience, and technology stack.
Join experts from KuppingerCole Analysts as they discuss the current state of Passwordless Authentication solutions and how best to implement them. Understanding the key differentiators between the different vendors and selecting the right passwordless solution is essential to unlock the full potential of Passwordless Authentication. They will show how the new KuppingerCole service, KC Open Select, can enhance the process with a better time to value leveraging your individual requirements to fit your budget, team size, and skills.
Join security experts from KuppingerCole Analysts and IBM as they explain how Security Orchestration, Automation, and Response (SOAR) solutions address this and other security challenges. They will also examine different approaches to SOAR, and discuss how to identify SOAR solutions that are a good fit for your organization.
Alejandro Leal, Research Analyst at KuppingerCole and author of the latest Leadership Compass on SOAR will explain the background of the report, discuss the SOAR market, identify the main capabilities of SOAR solutions, and talk about what makes IBM’s QRadar SOAR a market leader.
Oren Shevach, Product leader for IBM Security QRadar SOAR will provide further details and insights into IBM’s SOAR offering, explain how organizations can benefit from its implementation, and give a demonstration to show the solution’s major capabilities in action.
Join experts from KuppingerCole Analysts and data security firm ShardSecure as they discuss data confidentiality in the context of modern infrastructures, quantum computing, and data protection regulations. They will also discuss data resilience, why it is important, and how best to achieve it.
Mike Small, Senior Analyst at KuppingerCole will Senior Analyst at KuppingerCole will introduce why data is the critical element of the modern IT infrastructure. He will also review current approaches and their effectiveness in the digital era, where the loss of data can have a devastating impact.
Pascal Cronauer, Head of EMEA, and Julian Weinberger, Field CTO, both at ShardSecure will describe a cost-effective approach to data security, provide an overview of the ShardSecure MSX solution, and explain how it has helped customers to gain control of the security of their data and reduce the cost of managing it.
Join this webinar to:
Join security experts from KuppingerCole Analysts and Keeper Security as they look at user-friendly ways of increasing visibility, security, and control over employee passwords, credentials, and secrets. They will also discuss Privileged Account and Session Management (PASM), Secrets Management for DevOps, and other related topics.
Paul Fisher, Lead Analyst at KuppingerCole Analysts, will explore the dangers of not having visibility and control over user credentials on multiple devices, especially where the users involved have privileged access to data and services. He will also explain how to choose the right PAM solution.
Zane Bond, Head of Product Management at Keeper Security will explain how next-gen PAM platforms can provide the most critical components of PAM without the complexity of traditional solutions. He will also discuss the key capabilities of the KeeperPAM Platform, such as SSO integration, privileged credential management, credential vaulting, and session management, monitoring, and recording.
Join security experts from KuppingerCole Analysts and Cyolo as they discuss how access is evolving and the challenges that brings for OT/ICS/CIS environments. They will look at the potential benefits of technologies such as SIEM, SOAR, ITSM, PAM, IAM and XDR, and concepts such as MFA, ZTA, and ZTNA, as well as ways of reducing risk and meeting insurance requirements.
John Tolbert, Lead Analyst at KuppingerCole will give examples of threats to OT/ICS/CIS environments and the associated risks. He will describe how critical infrastructure differs from general IT, and how IT security tools can help protect it. He will also look at Zero Trust Network Access principles and how they apply.
Kevin Kumpf, Chief OT Strategist at Cyolo will explain the concept of application access, discuss a unified approach to using IT security tools, look at how these tools and process change can help address OT staff shortages, examine the impact of devices such as software PLCs on organizations, and explain how to achieve future-proof secure remote access.
Join identity experts at KuppingerCole Analysts and IndyKite as they discuss how to get more value out of identity data and address more use cases by thinking about the foundational data layer. They will also look at how to solve challenges such as availability of identity data and compliance risk.
Mike Neuenschwander, VP US, and Lead Analyst at KuppingerCole, will provide his perspective on this important market, and will be joined by Johannes Kolberg, Head of Product at IndyKite to further explore this critical topic, including why thinking about identity data management is core to future proofing your organization and tapping into the AI innovations.