KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Um die Herausforderungen zu meistern, werden oft verschiedene Initiativen gestartet, die zu einer kostspieligen und komplexen IT-Security-Infrastruktur führen. Mit dem SASE-Modell (Secure Access Service Edge) kann die Komplexität reduziert und die Kosten für die IT Security gesenkt werden. Durch konsistenten Schutz wird gleichzeitig die Security erhöht.
Martin Kuppinger, Principal Analyst bei KuppingerCole, erklärt, wie sich die IT als Enabler für die Digitale Transformation positionieren kann und gleichzeitig die Komplexität reduziert, Kosten senkt sowie die Sicherheit und die User-Experience erhöht.
SASE Sales Specialist Tobias Schneider und System Engineer Specialist Michael Weisgerber von Palo Alto Networks erklären das SASE-Modell, das eng mit dem in der IT-Sicherheit allgegenwärtigen Zero Trust-Konzept verwandt ist. Außerdem lernen Sie, welche Bedeutung sich daraus für die IT ergibt und wie Sie damit Veränderungen im Business ermöglichen.
Um die Herausforderungen zu meistern, werden oft verschiedene Initiativen gestartet, die zu einer kostspieligen und komplexen IT-Security-Infrastruktur führen. Mit dem SASE-Modell (Secure Access Service Edge) kann die Komplexität reduziert und die Kosten für die IT Security gesenkt werden. Durch konsistenten Schutz wird gleichzeitig die Security erhöht.
Martin Kuppinger, Principal Analyst bei KuppingerCole, erklärt, wie sich die IT als Enabler für die Digitale Transformation positionieren kann und gleichzeitig die Komplexität reduziert, Kosten senkt sowie die Sicherheit und die User-Experience erhöht.
SASE Sales Specialist Tobias Schneider und System Engineer Specialist Michael Weisgerber von Palo Alto Networks erklären das SASE-Modell, das eng mit dem in der IT-Sicherheit allgegenwärtigen Zero Trust-Konzept verwandt ist. Außerdem lernen Sie, welche Bedeutung sich daraus für die IT ergibt und wie Sie damit Veränderungen im Business ermöglichen.
Join security and business experts from KuppingerCole Analysts and Cyfirma as they discuss the challenges of ensuring an effective cyber defense strategy on a limited budget. They will then look at how to meet those challenges by applying insights gained from combining threat intelligence with attack surface discovery, digital risk protection, and analytics supported by machine learning.
John Tolbert, Lead Analyst at KuppingerCole Analysts will talk about the current cyber threat landscape and the need to shift the focus to preventing attacks using the MITRE ATT&CK approach. He will also provide an overview of some of the main components of modern security architectures, including attack surface management (ASM).
Dirk Wahlefeld, Head of Presales EMEA & US at Cyfirma will explain how external threat landscape visibility can help to validate your security controls, get the most out of existing cybersecurity assets, and shift from a reactive to a proactive cybersecurity strategy. He will also give an overview of Cyfirma’s external threat landscape management platform.
Join identity experts at KuppingerCole Analysts and Fastpath as they discuss the identity, access, and compliance challenges companies face, and examine how the convergence of Identity Governance and Administration (IGA) and Governance, Risk, and Compliance (GRC) can deliver a solution that enables businesses to anticipate and mitigate identity and access risks proactively.
Martin Kuppinger, Principal Analyst at KuppingerCole will talk about the fundamental functionalities of IGA solutions and the organizational activities they can support. He will also look what how the IGA market is likely to evolve and explain what needs to be taken into consideration when selecting an IGA solution.
Fastpath’s Mike Cassady, Chief Product Officer, and Matt Berdine, Sr. Director, Product and Solutions, will explore the synergy between IGA and GRC, and how implementing a best-of-breed IdentityGRC framework can streamline identity management and access control, while eliminating counterproductive silos and promoting collaborative focus on process and control ownership.
Join security experts from KuppingerCole Analysts and Keeper Security as they look at user-friendly ways of increasing visibility, security, and control over employee passwords, credentials, and secrets. They will also discuss Privileged Account and Session Management (PASM), Secrets Management for DevOps, and other related topics.
Paul Fisher, Lead Analyst at KuppingerCole Analysts, will explore the dangers of not having visibility and control over user credentials on multiple devices, especially where the users involved have privileged access to data and services. He will also explain how to choose the right PAM solution.
Zane Bond, Head of Product Management at Keeper Security will explain how next-gen PAM platforms can provide the most critical components of PAM without the complexity of traditional solutions. He will also discuss the key capabilities of the KeeperPAM Platform, such as SSO integration, privileged credential management, credential vaulting, and session management, monitoring, and recording.
Join Identity & Access Management experts from KuppingerCole Analysts and Broadcom as they discuss how business IT is changing, and the implications for IAM. They will define modern IAM and explain why and how IAM needs to change to support modern app development, regulatory compliance, and user satisfaction.
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the evolution of the concept of Identity Fabrics, its guiding principles, how to approach IAM investments, and how KuppingerCole expects Identity Fabrics to evolve over the next few years. Vadim Lander, Identity Security CTO & Distinguished Engineer in the Symantec Identity Security Group will explain how organizations can transition their IAM capabilities to support modern business IT environments without a radical rip and replace approach. He will also provide insights into how to make your IAM performant, scalable, extensible, manageable, and interoperable.
Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture for ensuring that all IT networks and information systems are protected from cyber-attacks.
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will talk about where, why, and how managed services can be utilized to speed up the Zero Trust journey. He will also highlight important requirements, including a high degree of standardization of services and the enforcement of Zero Trust principles such as "always verify".
Heiko Hütter, CEO of Service Layers, will share his perspectives on the benefits and challenges of Zero Trust and IAM Managed Services, give some real-world examples to show the benefits of a combined strategy, discuss how best to implement this strategy to reduce the risk of data breaches, and give an overview of iC Consult’s related expertise and services.
Join security and identity experts from KuppingerCole Analysts and ARCON as they discuss the importance of securing enterprise credentials, explain why a unified identity security approach in line with Zero Trust principles improve security and efficiency, and describe how to combine solutions to address key identity security issues.
John Tolbert, Director Cybersecurity Research at KuppingerCole will cover the background on identity involved data breaches and discuss the need for identity threat detection. He will also describe where identity fits in the MITRE ATT&CK matrix, and how Zero Trust architecture can reduce the threat of attacks involving identity aspects.Gautam Singh Deo, Director Strategic Business Engagements at ARCON will give examples of identity-based attacks, discuss the evolution of the identity landscape, explain the importance of identity-centric security in the context of a Zero Trust, and provide an overview of identity threat detection and response solutions and building a contextual data model.
Join security experts from KuppingerCole Analysts and Imperva as they discuss the challenges of protecting data distributed across hybrid IT environments, and look at what technologies and services can be combined to meet those challenges effectively and efficiently as a growing number of organizations migrate to the cloud.
Alexei Balaganski, Lead Analyst and CTO at KuppingerCole will explain the concept of a Data Security Platform (DSP), identify the required capabilities and future evolution of DSPs, and look at current data security market trends.
Terry Ray, SVP of Data Security GTM, Field CTO, and Imperva Fellow will share his security industry experience and expertise on data protection, on meeting security requirements of customers and regulators from every industry sector, and provide an overview of Imperva’s data security solutions, with reference to the concept of a data security fabric.
As organizations increasingly rely on digital platforms and services to engage with customers, the management and security of consumer identities have become paramount. CIAM solutions play a crucial role in protecting user data, simplifying authentication processes, and personalizing customer experiences. Our webinar aims to equip you with the knowledge and strategies to carefully begin selecting the right CIAM solution for your organization.
Don't miss this opportunity to stay ahead of the curve and elevate your organization's CIAM capabilities. Join us for this informative webinar and unlock the secrets to mastering consumer identity management while delivering exceptional user experiences.
Join identity experts at KuppingerCole Analysts and iProov to as they discuss the vulnerabilities of access control systems that rely on something that is known or possessed, and the value of adding biometrics. They will also discuss the role of biometrics in identity verification and proofing, and how to ensure biometrics are used safely to address privacy concerns.
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the drivers of the growing demand for identity verification and identity proofing across a range of use cases from B2E to B2B and B2C, including the Work from Anywhere trend and Supply Chain Security/3rd Party Risk Management. He will also look at which signals can be used for identity proofing.
Joe Palmer Chief Product & Innovation Officer of iProov will explain how biometrics can improve security for digital and physical access. He will also provide guidance on aligning biometrics with high-risk changes in the identity lifecycle, inclusivity considerations, and mitigating the risk of generative AI in cyber-attack methodologies.
Join security experts from KuppingerCole Analysts and PlainID as they discuss identity management in the digital era, the limitations of ABAC and RBAC, and the benefits of policy-based access control (PBAC)
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will talk about the latent potential for using PBAC for legacy use cases, modern authentication, and fraud prevention, and building modern digital services. He will also look at why organizations need to create a unified strategy and approach on PBAC across all areas.
Gal Helemski, PlainID co-founder and CPO, will explain how to navigate the path to modernized authorization and how to kickstart your PBAC program from initial assessment to implementation. She will be joined by Allan Foster, a long time expert and leader in Identity.
Businesses and organizations are undergoing digital transformations and adopting new technologies to become as flexible and agile as possible to remain competitive. The continuing and increasing shift to remote and hybrid work will contribute to further adoption of Passwordless Authentication solutions and services by both workforce and customers. However, selecting the right passwordless solution must meet the unique requirements and needs of organizations regarding security, user experience, and technology stack.
Join experts from KuppingerCole Analysts as they discuss the current state of Passwordless Authentication solutions and how best to implement them. Understanding the key differentiators between the different vendors and selecting the right passwordless solution is essential to unlock the full potential of Passwordless Authentication. They will show how the new KuppingerCole service, KC Open Select, can enhance the process with a better time to value leveraging your individual requirements to fit your budget, team size, and skills.
Hierzu ist es unerlässlich, Identitätstypen nicht als voneinander getrennt agierende Entitäten, sondern als ineinander verwobene Fasern zu begreifen – die Identity Fabric. Erst durch diese Meta-Sicht kann eine zuverlässige Risikoabwägung erfolgen, die für den korrekten Umgang mit IoT-Identitäten grundlegend ist. Zuletzt ist die Reduktion von aufwändigen internen Prozessen und Kosten ein weiterer Faktor für die erfolgreiche Modernisierung des Identitätsmanagement in Ihrem Unternehmen.
In diesem Webinar lernen Sie: