KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
How will privileged access management change over the next years? How does this change impact your existing PAM infrastructures? What to consider for your buying decisions?
In this webinar, Morey Haber, Chief Security Officer at BeyondTrust, and Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, discuss trends in the broader PAM space, covering aspects such as
They share concepts and insights and talk about their perspectives on where PAM is evolving and what organizations should keep in mind for their own PAM strategies and implementations.
Join security experts from KuppingerCole Analysts and Pathlock as they discuss why modern applications need more granular and context-based access controls, why it is important that these controls can adapt to changing business needs and user behaviors, and how that can be achieved.
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide a head-to-head comparison of key features of common, traditional IGA, and the established access control tools for SAP and other Line of Business (LoB) applications.
Carrie Curry, VP of Customer Advisory at Pathlock will explain the benefits of a holistic application access management approach that can provide real-time access decisions based on contextual data, that can support compliance, that provides fine-grained controls, and that can reduce the cost and effort of access reviews. She will also discuss why organisations need to have a cross-system and application view when it comes to Access Governance.
Hierzu ist es unerlässlich, Identitätstypen nicht als voneinander getrennt agierende Entitäten, sondern als ineinander verwobene Fasern zu begreifen – die Identity Fabric. Erst durch diese Meta-Sicht kann eine zuverlässige Risikoabwägung erfolgen, die für den korrekten Umgang mit IoT-Identitäten grundlegend ist. Zuletzt ist die Reduktion von aufwändigen internen Prozessen und Kosten ein weiterer Faktor für die erfolgreiche Modernisierung des Identitätsmanagement in Ihrem Unternehmen.
In diesem Webinar lernen Sie:
As organizations increasingly rely on digital platforms and services to engage with customers, the management and security of consumer identities have become paramount. CIAM solutions play a crucial role in protecting user data, simplifying authentication processes, and personalizing customer experiences. Our webinar aims to equip you with the knowledge and strategies to carefully begin selecting the right CIAM solution for your organization.
Don't miss this opportunity to stay ahead of the curve and elevate your organization's CIAM capabilities. Join us for this informative webinar and unlock the secrets to mastering consumer identity management while delivering exceptional user experiences.
Join security experts at KuppingerCole Analysts and CrowdStrike as they discuss why SOCs typically struggle to be more proactive, explore what is required to build a flexible, scalable and automated SOC, and explain the role of ML, LLMs and other forms of AI in extending the capabilities of the SOC.
Warwick Ashford, Senior Analyst at KuppingerCole Analysts, will outline the challenges facing cybersecurity teams, why traditional approaches to building SOCs need to change, and why automation and human-machine collaboration is the key to meet security and business needs.
Aris Koios, Technology Strategist, DACH, at CrowdStrike will explain how to measure success beyond activity driven metrics, why it is important to use open standards and API-driven approaches, and how to supercharge detection and response with a single, unified SOC tech stack.
Attend this webinar to:
Join security experts from KuppingerCole Analysts and SentinelOne to help you get an understanding of what eXtended Detection & Response (XDR) really is, and why you should consider this emerging technology in your enterprise security stack.
John Tolbert, Director Cybersecurity Research at KuppingerCole and Marko Kirschner, Director of Sales Engineering Central Europe at SentinelOne will define XDR, including which technical components are necessary for distinguishing XDR from Endpoint Detection & Response (EDR), and how XDR differs from Security Orchestration Automation & Response (SOAR).
They will also discuss why XDR is an important useful amalgamation and evolution of security tool sets, the use cases it solves, and where it should fit on organizational security technology roadmaps.
In this webinar, we will look at
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the challenges many organizations are experiencing in DR situations and how to overcome these. He will put this into the broader context of BCM (Business Continuity Management) and Incident Response Planning, but also shed a light on why Microsoft Active Directory remains essential here for most organizations.
Guido Grillenmeier, Principal Technologist at Semperis, and Evgenij Smirnov, Senior Solutions Architect at Semperis, then will drill down in the details of how to make Microsoft Active Directory Disaster Recover work, from plan to execution.
Join identity and access management experts from KuppingerCole Analysts and ForgeRock for a discussion on passwordless authentication solutions, the reasons organizations are slow to implement them, and how to go about making the switch successfully by understanding the technologies and process changes involved.
Alejandro Leal, Research Analyst at KuppingerCole will explain the main features, capabilities, and benefits of passwordless authentication. He will also look at how to assess passwordless authentication solutions, and how to identify the ones that are best suited to your organization.
Jeff Carpenter, Director of Product Marketing at ForgeRock will discuss the various use cases for passwordless authentication and the need for different approaches. He will also look at some common challenges and potential pitfalls, as well as the best practices to follow, as well as provide an overview of how the ForgeRock Identity Platform enables passwordless deployment.
This KuppingerCole webinar offers a comprehensive exploration of access control challenges, the limitations of traditional RBAC and PBAC, some innovative policy-driven solutions, a demonstration of policy-driven RBAC in MidPoint, and actionable insights for enhancing access control strategies.
Join experts from KuppingerCole Analysts AG and Evolveum to unravel the complexities of modern access control and explore the challenges faced by organizations striving to protect their digital assets.
Paul Fisher, Lead Analyst at KuppingerCole Analysts, will look at the concept of the “access control zoo” and talk about why numerous methods exist. He will also outline why some organizations stick with flawed models like RBAC, and how adopting improved access controls can enhance identity and access management within businesses.
Radovan Semancik, Co-Founder and Software Architect at Evolveum will present a bottom-up approach and explain how midPoint's dynamic policy-driven RBAC addresses these challenges effectively.
Join experts from KuppingerCole Analysts and Tuebora as they discuss how to make sense of the different approaches to access to control, the pros and cons of each, and how to make good decisions about managing access control throughout the access control landscape.
Nitish Deshpande, Research Analyst at KuppingerCole Analysts provides an overview of policy Based Access Control (PBAC), future of policies in identity management, security, and business advantages of adopting this approach to identity management.
Brian Iverson, Chief Product Officer at Tuebora explains why organizations need to take policies more seriously, with identity governance and administrative (IGA) technologies applicable to most of organizations’ application portfolios. He shows how to combine the best of PBAC and RBAC to reduce risk and maximize compliance.
The market for Identity Governance and Administration (IGA) is undergoing further development with the incorporation of more integrated solutions for Identity Lifecycle Management and Access Governance, which are now being enhanced by intelligent features. However, organizations still face the challenge of understanding the key functions to consider when choosing an IGA solution. Join KuppingerCole Analysts in this webinar to gain insights into the fundamental functionalities of an IGA (Identity Governance and Administration) solution. Additionally, learn about the prevailing market trends in the IGA landscape and discover how KuppingerCole Analysts can provide guidance in selecting the most suitable IGA solution for your specific needs.
Join experts from Kuppinger Cole Analysts and Palo Alto Networks as they discuss why automating as much as possible and providing information to enable analysts to make timely decisions should be a priority for SOC management. They will also explore the benefits of Security Orchestration, Automation & Response (SOAR) technologies.
Paul Simmonds, Fellow Analyst at KuppingerCole, will address the requirements of modern SOCs, highlighting the importance of automation and integration. He will focus on SOAR, discuss the top use cases and requirements of SOAR, and explain how it relates to other security technologies for a modern SOC such SIEM and XDR.
Amitabh Singh, Field CTO EMEA at Palo Alto Networks, will provide insights into Palo Alto Networks' XSOAR (eXtended SOAR) approach, its key capabilities, and its relevance to modern, highly automated SOCs. He will describe how XSOAR solutions can be used to augment existing SOCs or be used as a foundation for new SOCs, and how XSOAR relates to ASM, XDR, and XSIAM.