Webinar Recording

Identität ist das neue Perimeter: Sichern Sie Zugriff und Nutzung von Cloud-Anwendungen

Show description
Speakers
Alexei Balaganski
Lead Analyst & CTO
KuppingerCole
Alexei Balaganski
Alexei Balaganski ist Analyst mit speziellem Fokus auf den Bereich Cybersecurity. Sein großes technisches Verständnis erlaub es ihm Kunden auch bei komplexen Sichereheitsproblemen zu unterstützen. Vorher war er bei KuppingerColes als CTO tätig. Nach seinem Masterabschluss in...
View profile
Marcus Jäger
Senior Sales Engineer
Netskope
Marcus Jäger
IT-Fachmann und Technologieexperte mit über 20 Jahren Erfahrung in den Bereichen Netzwerke, Netzwerksicherheit, Netzwerkautomatisierung und -orchestrierung, Web- und Cloud-Technologien und Threat Intelligence.
View profile
Timm Lotter
Alliances Solution Engineer
Okta
Timm Lotter
Timm Lotter is the Alliances Solution Engineer of Okta for Central and Eastern Europe. Timm is for over 10 years in the IT-Industry and a technical hands-on guy who loves to simplify complex topics. Timm works closely with partners to enable them with the common goal: Connect the right...
View profile
Lead Sponsors
Netskope Okta
Playlist
KuppingerCole Webinars
Webinar Recording
Urgent: Find and Block Identity-Centric Security Threats Today
Mar 22, 2023

Join experts from KuppingerCole Analysts and AI-assisted behavioral analysis firm Sharelock as they discuss why Identity Threat Detection & Response (ITDR) is a crucial component of an overall Identity & Access Management (IAM) strategy, why Cloud Workload Protection (CWP) is a growing security concern, and how these issues can be addressed.

Martin Kuppinger, Principal Analyst at KuppingerCole will explain why we need to get better at protecting the digital identities of human and non-human actors in an age where the majority of cyber-attacks is identity-based, and why we need AI to be successful.

Andrea Rossi, Senior Identity & Cybersecurity expert at Sharelock will introduce the Sharelock behavioral anomaly detection platform and describe how ITDR platforms can augment IAM controls to identify potential security breaches and take preventive actions. He will also explain how a combination of ITDR and CWP can address run-time DevOps security requirements.

Webinar Recording
Take Invisible MFA to the Next Level With Passwordless Continuous Authentication
Apr 21, 2023

Join experts from KuppingerCole Analysts and SecureAuth as they discuss why not all MFA solutions offer the same level of protection, and how organizations can improve their security posture and user experience by adopting a different approach that combines MFA with risk-based Passwordless Authentication.

Alejandro Leal, Research Analyst at KuppingerCole Analysts, will explore some of the problems with legacy MFA solutions and how a passwordless solution can improve usability and security. He will also explain some common passwordless features such as device trust and risk-based authentication.

Nawshad Hoossanbuksh, Senior Product Manager at SecureAuth will explain how adopting a passwordless continuous authentication approach can protect against phishing, brute-force, and MFA by-pass attacks such as MFA fatigue or MA bombing. He will also give an overview of SecureAuth’s Arculix passwordless continuous authentication solution.

Webinar Recording
Effective Application Access Controls in the Modern Business IT Landscape
Jul 19, 2023

Join security experts from KuppingerCole Analysts and Pathlock as they discuss why modern applications need more granular and context-based access controls, why it is important that these controls can adapt to changing business needs and user behaviors, and how that can be achieved.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide a head-to-head comparison of key features of common, traditional IGA, and the established access control tools for SAP and other Line of Business (LoB) applications.

Carrie Curry, VP of Customer Advisory at Pathlock will explain the benefits of a holistic application access management approach that can provide real-time access decisions based on contextual data, that can support compliance, that provides fine-grained controls, and that can reduce the cost and effort of access reviews. She will also discuss why organisations need to have a cross-system and application view when it comes to Access Governance.

Webinar Recording
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Sep 22, 2023

Join identity experts at KuppingerCole Analysts and Fastpath as they discuss the identity, access, and compliance challenges companies face, and examine how the convergence of Identity Governance and Administration (IGA) and Governance, Risk, and Compliance (GRC) can deliver a solution that enables businesses to anticipate and mitigate identity and access risks proactively.

Martin Kuppinger, Principal Analyst at KuppingerCole will talk about the fundamental functionalities of IGA solutions and the organizational activities they can support. He will also look what how the IGA market is likely to evolve and explain what needs to be taken into consideration when selecting an IGA solution.

Fastpath’s Mike Cassady, Chief Product Officer, and Matt Berdine, Sr. Director, Product and Solutions, will explore the synergy between IGA and GRC, and how implementing a best-of-breed IdentityGRC framework can streamline identity management and access control, while eliminating counterproductive silos and promoting collaborative focus on process and control ownership.

Webinar Recording
Implementing Zero Trust With Privileged Access Management Platforms
Dec 16, 2022

Among the many approaches to do that, Zero Trust is one where organizations apply the principle of “never trust – always verify”. Since Zero Trust is not a single product or solution, implementing processes that work accordingly can be a challenge to IT teams that want to keep their privileged accounts safe. Modern Privileged Access Management (PAM) platforms can help with these challenges.

Paul Fisher, Lead Analyst at KuppingerCole will look at why standing privileges are a risk to modern multi-cloud and hybrid architectures and how Zero Trust can help in reducing standing privileges. Moreover, he will explain why advanced PAM platforms can assist with establishing a Zero Trust posture and how to move PAM to decentralized operations.

Joe Burke, Chief Architect, PAM, in the Symantec Identity Security Group, proposes organizations should rethink how to implement Zero Trust security for secrets, privileges, and privileged accounts. He will elaborate on factors that IT decision-makers should look for in Zero Trust-enabling PAM solutions. Among these are the time to implement, low operational overhead, scalability and performance, ecosystem integrability, as well as coarse and fine-grained authorization enforcement.

Webinar Recording
The Evolution of Secure Access in Critical Infrastructure
Oct 13, 2023

Join security experts from KuppingerCole Analysts and Cyolo as they discuss how access is evolving and the challenges that brings for OT/ICS/CIS environments. They will look at the potential benefits of technologies such as SIEM, SOAR, ITSM, PAM, IAM and XDR, and concepts such as MFA, ZTA, and ZTNA, as well as ways of reducing risk and meeting insurance requirements.

John Tolbert, Lead Analyst at KuppingerCole will give examples of threats to OT/ICS/CIS environments and the associated risks. He will describe how critical infrastructure differs from general IT, and how IT security tools can help protect it. He will also look at Zero Trust Network Access principles and how they apply.

Kevin Kumpf, Chief OT Strategist at Cyolo will explain the concept of application access, discuss a unified approach to using IT security tools, look at how these tools and process change can help address OT staff shortages, examine the impact of devices such as software PLCs on organizations, and explain how to achieve future-proof secure remote access.

Webinar Recording
Achieve Effective Risk and Vulnerability Management With a Platform Approach
Jun 16, 2023

Join security experts from KuppingerCole Analysts and Tanium as they discuss the common challenges faced in identifying, prioritizing, and remediating security vulnerabilities, and how to overcome them by adopting a proactive approach that will increase efficiency and reduce risk.

Richard Hill, Director of IAM Research and Lead Analyst at KuppingerCole, will discuss the value of Software Bill of Materials (SBOM), asset, and endpoint management. Also, how understanding the context of what you have can help surface software and endpoint vulnerabilities and compliance risks within an organization through visibility.

Bryant Bell, Director Product Marketing – Risk & Compliance at Tanium will outline a platform approach to identify, prioritize, and remediate vulnerabilities to achieve greater speed, scalability, and visibility to improve efficiency and reduce risk.

Webinar Recording
Phishing-Resistant MFA: The Next Evolution for Strong Authentication
Apr 26, 2023

Join cybersecurity experts at KuppingerCole Analysts and workforce authentication firm Secret Double Octopus as they discuss the ways cyber-attackers are getting around MFA systems. They will also look at how organizations can better deploy MFA and go one step beyond to deliver strong security outcomes, thereby reducing risk, cost, and user friction.

Paul Fisher, Lead Analyst at KuppingerCole will look at why passwords persist despite their weaknesses, discuss the evolution and shortcomings of MFA, look at why attacks and losses continue despite the increased adoption of MFA, and explain the benefits and challenges of passwordless authentication.

Horacio Zambrano, CMO and Cyber Strategist at Secret Double Octopus will discuss what next generation authentication solutions look like, the current drivers of strong authentication, and the key considerations when choosing a passwordless authentication solution. These considerations illuminate how to best achieve success with these projects in today’s world of Zero Trust and hybrid workplaces.

Webinar Recording
3rd Party Identity Risk – Der Feind Im Eigenen Haus (?)
Jun 14, 2023

Hierzu ist es unerlässlich, Identitätstypen nicht als voneinander getrennt agierende Entitäten, sondern als ineinander verwobene Fasern zu begreifen – die Identity Fabric. Erst durch diese Meta-Sicht kann eine zuverlässige Risikoabwägung erfolgen, die für den korrekten Umgang mit IoT-Identitäten grundlegend ist. Zuletzt ist die Reduktion von aufwändigen internen Prozessen und Kosten ein weiterer Faktor für die erfolgreiche Modernisierung des Identitätsmanagement in Ihrem Unternehmen.

In diesem Webinar lernen Sie:

  • Die wichtigsten Unterschiede zwischen verschiedenen Arten von Identitäten und ihren Zugriffsrechten kennen
  • Die Rolle der Lieferkette als schwächstes Glied im Zugriffsmanagement näher kennen
  • Wie Sie eine Vielzahl von Identitäten auch in externen Unternehmenseinheiten managen
  •  Wie ein sicherer Remote-Access für Menschen und Maschinen gewährleistet werden kann
Webinar Recording
Cyber Resilience Through SOC Automation
Mar 08, 2023

Join experts from Kuppinger Cole Analysts and Palo Alto Networks as they discuss why automating as much as possible and providing information to enable analysts to make timely decisions should be a priority for SOC management. They will also explore the benefits of Security Orchestration, Automation & Response (SOAR) technologies.

Paul Simmonds, Fellow Analyst at KuppingerCole, will address the requirements of modern SOCs, highlighting the importance of automation and integration. He will focus on SOAR, discuss the top use cases and requirements of SOAR, and explain how it relates to other security technologies for a modern SOC such SIEM and XDR.

Amitabh Singh, Field CTO EMEA at Palo Alto Networks, will provide insights into Palo Alto Networks' XSOAR (eXtended SOAR) approach, its key capabilities, and its relevance to modern, highly automated SOCs. He will describe how XSOAR solutions can be used to augment existing SOCs or be used as a foundation for new SOCs, and how XSOAR relates to ASM, XDR, and XSIAM.

Webinar Recording
The Future of Identity Security: PAM+CIEM+ITDR
Nov 03, 2023

Join identity and experts at KuppingerCole Analysts and BeyondTrust as they discuss the impact of the evolution of business IT, the trends shaping the identity landscape, the importance of identity security, and the role of privileged access management (PAM), cloud infrastructure entitlement management (CIEM), and identity threat detection and response (ITDR).

Martin Kuppinger, Principal Analyst at KuppingerCole, will look at the convergence of PAM, CIEM, and ITDR, and their place within the Identity Fabric concept. He will analyze why new technologies are required to deal with ever-increasing cyberattacks and the reality of today’s hybrid and dynamic IT, and why a holistic approach is needed.

Marc Maiffret, Chief Technology Officer at BeyondTrust, will explain the value of an identity-first security strategy and the pivotal role of PAM, supported by CIEM and ITDR, in building a next-gen security capability. He will share insights on how to reap the rewards of digital transformation, while keeping the attack surface in check and minimizing risk.

Webinar Recording
Best of Both Worlds: Combining Multi-Factor and Passwordless Authentication
Mar 24, 2023

Join experts from KuppingerCole Analysts and trusted identity firm Entrust as they discuss why not all MFA solutions offer the same level of protection. They will also explore the current state of Passwordless Authentication solutions and how best to implement them.

Alejandro Leal, Research Analyst at KuppingerCole will discuss how business IT is changing, and the implications for passwords. He will also explain why and how passwords need to be eliminated to increase security, regulatory compliance, and user satisfaction.

Rohan Ramesh, Director of Product Marketing: Identity and Access Management at Entrust will describe the various MFA-based attacks being seen in the wild and how to combine MFA and Passwordless Authentication to enable secure access for users and improve overall security.