KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Join identity and access management experts from KuppingerCole Analysts and ForgeRock for a discussion on passwordless authentication solutions, the reasons organizations are slow to implement them, and how to go about making the switch successfully by understanding the technologies and process changes involved.
Alejandro Leal, Research Analyst at KuppingerCole will explain the main features, capabilities, and benefits of passwordless authentication. He will also look at how to assess passwordless authentication solutions, and how to identify the ones that are best suited to your organization.
Jeff Carpenter, Director of Product Marketing at ForgeRock will discuss the various use cases for passwordless authentication and the need for different approaches. He will also look at some common challenges and potential pitfalls, as well as the best practices to follow, as well as provide an overview of how the ForgeRock Identity Platform enables passwordless deployment.
Join identity experts at KuppingerCole Analysts and Fastpath as they discuss the identity, access, and compliance challenges companies face, and examine how the convergence of Identity Governance and Administration (IGA) and Governance, Risk, and Compliance (GRC) can deliver a solution that enables businesses to anticipate and mitigate identity and access risks proactively.
Martin Kuppinger, Principal Analyst at KuppingerCole will talk about the fundamental functionalities of IGA solutions and the organizational activities they can support. He will also look what how the IGA market is likely to evolve and explain what needs to be taken into consideration when selecting an IGA solution.
Fastpath’s Mike Cassady, Chief Product Officer, and Matt Berdine, Sr. Director, Product and Solutions, will explore the synergy between IGA and GRC, and how implementing a best-of-breed IdentityGRC framework can streamline identity management and access control, while eliminating counterproductive silos and promoting collaborative focus on process and control ownership.
Adopting a Zero Trust security model of strict identity verification and access control for every user or device is widely accepted as a solution, but many organizations struggle to find the best route to implementing it. Join security experts from KuppingerCole Analysts and Zero Networks as they discuss network segmentation as a departure point and how microsegmentation is evolving to make it easier to use.
Alexei Balaganski, Lead Analyst at KuppingerCole Analysts will explain the problems with network security, how microsegmentation addresses those problems, what it is, how it works, and why previously it has not been more widely recognized and adopted as a means of achieving ZTNA.
Nicholas DiCola, VP of Customers at Zero Networks will outline and demonstrate the concept of intelligent microsegmentation. He will explain how this approach makes it easy for organizations to use microsegmentation to achieve least privilege networking automatically and in a scalable way for every user and device without having to deploy agents or configure policies.
Join identity experts at KuppingerCole Analysts and SailPoint as they discuss the challenges of on-prem identity security solutions, the benefits of moving to software-as-a-service solutions, how to determine if that’s the right option, key questions to ask, how to quantify the financial impact, and how to choose the right solution.
Nitish Deshpande, Research Analyst at KuppingerCole Analysts, will look at the how legacy IGA systems can be modernized as part of digital transformation strategies. He will also share some tips and explain what needs to be taken into consideration when moving to the cloud to achieve future-proof identity security.
Chris Gossett Senior Vice President of Technology Services at SailPoint will explain the core benefits of upgrading to cloud-based identity security, the financial and business implications, and how to get started. He will also provide an overview of SailPoint’s approach to cloud-based identity security and SailPoint’s Identity Security Cloud Upgrade Program and Assessment for existing customers.
Join experts from KuppingerCole Analysts and TrustBuilder as they discuss how to tackle these and other modern Identity Management challenges by using Policy-Based Access Controls and combining different personas into a single user profile to enable users to authenticate with a single set of credentials.
Nitish Deshpande, Research Analyst at KuppingerCole Analysts will examine the concept of Policy Based Access Control (PBAC), looking at what that entails, as well as the security and business advantages of adopting this approach to identity management.
Kurt Berghs, Product Manager at TrustBuilder will explain how using PBAC with personas consolidates multiple accounts across disparate systems into one user profile for each identity, enables the management of user lifecycles, secures complex environments, and allows organizations to delegate rights enabled with self-service.
Join experts from KuppingerCole Analysts and SecureAuth as they discuss why not all MFA solutions offer the same level of protection, and how organizations can improve their security posture and user experience by adopting a different approach that combines MFA with risk-based Passwordless Authentication.
Alejandro Leal, Research Analyst at KuppingerCole Analysts, will explore some of the problems with legacy MFA solutions and how a passwordless solution can improve usability and security. He will also explain some common passwordless features such as device trust and risk-based authentication.
Nawshad Hoossanbuksh, Senior Product Manager at SecureAuth will explain how adopting a passwordless continuous authentication approach can protect against phishing, brute-force, and MFA by-pass attacks such as MFA fatigue or MA bombing. He will also give an overview of SecureAuth’s Arculix passwordless continuous authentication solution.
Join security experts from KuppingerCole Analysts and Cyolo as they discuss how access is evolving and the challenges that brings for OT/ICS/CIS environments. They will look at the potential benefits of technologies such as SIEM, SOAR, ITSM, PAM, IAM and XDR, and concepts such as MFA, ZTA, and ZTNA, as well as ways of reducing risk and meeting insurance requirements.
John Tolbert, Lead Analyst at KuppingerCole will give examples of threats to OT/ICS/CIS environments and the associated risks. He will describe how critical infrastructure differs from general IT, and how IT security tools can help protect it. He will also look at Zero Trust Network Access principles and how they apply.
Kevin Kumpf, Chief OT Strategist at Cyolo will explain the concept of application access, discuss a unified approach to using IT security tools, look at how these tools and process change can help address OT staff shortages, examine the impact of devices such as software PLCs on organizations, and explain how to achieve future-proof secure remote access.
Join security and business experts from KuppingerCole Analysts and Cyfirma as they discuss the challenges of ensuring an effective cyber defense strategy on a limited budget. They will then look at how to meet those challenges by applying insights gained from combining threat intelligence with attack surface discovery, digital risk protection, and analytics supported by machine learning.
John Tolbert, Lead Analyst at KuppingerCole Analysts will talk about the current cyber threat landscape and the need to shift the focus to preventing attacks using the MITRE ATT&CK approach. He will also provide an overview of some of the main components of modern security architectures, including attack surface management (ASM).
Dirk Wahlefeld, Head of Presales EMEA & US at Cyfirma will explain how external threat landscape visibility can help to validate your security controls, get the most out of existing cybersecurity assets, and shift from a reactive to a proactive cybersecurity strategy. He will also give an overview of Cyfirma’s external threat landscape management platform.
Join security and business experts from KuppingerCole Analysts and cyber technology firm Exeon Analytics as they discuss how these challenges can be met using machine learning supported and log data based Network Detection & Response solutions to improve the overall cyber security and resilience of organizations.
John Tolbert, Lead Analyst at KuppingerCole Analysts will look at reasons for deploying NDR, the various deployment models, and use cases for enterprise IT and OT environments. He will also explain how ML-enhanced detection algorithms increase confidence and reduce false positives, and discuss key requirements for choosing NDR solutions and how NDR fits into the XDR landscape.
Michael Tullius, Sales Director Germany at Exeon Analytics will discuss why NDR is necessary and how it can benefit security leaders, admins, and incident responders. He will also give examples of detectable use cases, provide an overview of Exeon’s NDR solution, and share recommendations for improving cyber resilience.
Join Identity & Access Management experts from KuppingerCole Analysts and Broadcom as they discuss how business IT is changing, and the implications for IAM. They will define modern IAM and explain why and how IAM needs to change to support modern app development, regulatory compliance, and user satisfaction.
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the evolution of the concept of Identity Fabrics, its guiding principles, how to approach IAM investments, and how KuppingerCole expects Identity Fabrics to evolve over the next few years. Vadim Lander, Identity Security CTO & Distinguished Engineer in the Symantec Identity Security Group will explain how organizations can transition their IAM capabilities to support modern business IT environments without a radical rip and replace approach. He will also provide insights into how to make your IAM performant, scalable, extensible, manageable, and interoperable.
Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture for ensuring that all IT networks and information systems are protected from cyber-attacks.
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will talk about where, why, and how managed services can be utilized to speed up the Zero Trust journey. He will also highlight important requirements, including a high degree of standardization of services and the enforcement of Zero Trust principles such as "always verify".
Heiko Hütter, CEO of Service Layers, will share his perspectives on the benefits and challenges of Zero Trust and IAM Managed Services, give some real-world examples to show the benefits of a combined strategy, discuss how best to implement this strategy to reduce the risk of data breaches, and give an overview of iC Consult’s related expertise and services.
In this webinar, we will look at
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the challenges many organizations are experiencing in DR situations and how to overcome these. He will put this into the broader context of BCM (Business Continuity Management) and Incident Response Planning, but also shed a light on why Microsoft Active Directory remains essential here for most organizations.
Guido Grillenmeier, Principal Technologist at Semperis, and Evgenij Smirnov, Senior Solutions Architect at Semperis, then will drill down in the details of how to make Microsoft Active Directory Disaster Recover work, from plan to execution.