KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Join experts from KuppingerCole Analysts and Tuebora as they discuss how to make sense of the different approaches to access to control, the pros and cons of each, and how to make good decisions about managing access control throughout the access control landscape.
Nitish Deshpande, Research Analyst at KuppingerCole Analysts provides an overview of policy Based Access Control (PBAC), future of policies in identity management, security, and business advantages of adopting this approach to identity management.
Brian Iverson, Chief Product Officer at Tuebora explains why organizations need to take policies more seriously, with identity governance and administrative (IGA) technologies applicable to most of organizations’ application portfolios. He shows how to combine the best of PBAC and RBAC to reduce risk and maximize compliance.
Join security experts at KuppingerCole Analysts and CrowdStrike as they discuss why SOCs typically struggle to be more proactive, explore what is required to build a flexible, scalable and automated SOC, and explain the role of ML, LLMs and other forms of AI in extending the capabilities of the SOC.
Warwick Ashford, Senior Analyst at KuppingerCole Analysts, will outline the challenges facing cybersecurity teams, why traditional approaches to building SOCs need to change, and why automation and human-machine collaboration is the key to meet security and business needs.
Aris Koios, Technology Strategist, DACH, at CrowdStrike will explain how to measure success beyond activity driven metrics, why it is important to use open standards and API-driven approaches, and how to supercharge detection and response with a single, unified SOC tech stack.
Attend this webinar to:
As organizations increasingly rely on digital platforms and services to engage with customers, the management and security of consumer identities have become paramount. CIAM solutions play a crucial role in protecting user data, simplifying authentication processes, and personalizing customer experiences. Our webinar aims to equip you with the knowledge and strategies to carefully begin selecting the right CIAM solution for your organization.
Don't miss this opportunity to stay ahead of the curve and elevate your organization's CIAM capabilities. Join us for this informative webinar and unlock the secrets to mastering consumer identity management while delivering exceptional user experiences.
In today's digital landscape, businesses face an increasing threat of fraud that can lead to significant financial losses and damage to their reputation. To effectively combat fraud, businesses need Fraud Reduction Intelligence Platforms (FRIPs). These advanced technologies leverage multiple data sources, data analytics, and ML detection models to proactively detect and prevent fraudulent activities in real-time. FRIPs empower organizations to stay ahead of fraudsters by uncovering hidden patterns, identifying anomalies, and generating alerts. By implementing FRIPs, businesses can mitigate risks, reduce false positives, and safeguard their financial well-being and brand image. Stay one step ahead of fraud with FRIPs and ensure a secure future for your business.
John Tolbert, Director of Cybersecurity Research at KuppingerCole, will give an overview of fraud trends and the tools businesses and other organizations can use to detect and prevent fraud. This webinar will highlight our research methodology, evaluation criteria, and some findings from the recently released Leadership Compass on FRIP. We will also show how you can view and drill down into the results of our FRIP research in our new KC Open Select tool.
Join identity experts at KuppingerCole Analysts and Fastpath as they discuss the identity, access, and compliance challenges companies face, and examine how the convergence of Identity Governance and Administration (IGA) and Governance, Risk, and Compliance (GRC) can deliver a solution that enables businesses to anticipate and mitigate identity and access risks proactively.
Martin Kuppinger, Principal Analyst at KuppingerCole will talk about the fundamental functionalities of IGA solutions and the organizational activities they can support. He will also look what how the IGA market is likely to evolve and explain what needs to be taken into consideration when selecting an IGA solution.
Fastpath’s Mike Cassady, Chief Product Officer, and Matt Berdine, Sr. Director, Product and Solutions, will explore the synergy between IGA and GRC, and how implementing a best-of-breed IdentityGRC framework can streamline identity management and access control, while eliminating counterproductive silos and promoting collaborative focus on process and control ownership.
Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture for ensuring that all IT networks and information systems are protected from cyber-attacks.
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will talk about where, why, and how managed services can be utilized to speed up the Zero Trust journey. He will also highlight important requirements, including a high degree of standardization of services and the enforcement of Zero Trust principles such as "always verify".
Heiko Hütter, CEO of Service Layers, will share his perspectives on the benefits and challenges of Zero Trust and IAM Managed Services, give some real-world examples to show the benefits of a combined strategy, discuss how best to implement this strategy to reduce the risk of data breaches, and give an overview of iC Consult’s related expertise and services.
Join this webinar to learn more about
Paul Fisher, Lead Analyst at KuppingerCole Analysts, will look at the requirements and market for ITDR and the role it plays in the Zero Trust context, but also its relationship to other DR technologies.
Andre Priebe, Chief Technology Officer at iC Consult, will share his knowledge and experiences to help you enhance your cybersecurity strategy, tackle global challenges, and stay ahead in the ever-evolving world of cybersecurity.
Join security experts from KuppingerCole Analysts and Pathlock as they discuss why modern applications need more granular and context-based access controls, why it is important that these controls can adapt to changing business needs and user behaviors, and how that can be achieved.
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide a head-to-head comparison of key features of common, traditional IGA, and the established access control tools for SAP and other Line of Business (LoB) applications.
Carrie Curry, VP of Customer Advisory at Pathlock will explain the benefits of a holistic application access management approach that can provide real-time access decisions based on contextual data, that can support compliance, that provides fine-grained controls, and that can reduce the cost and effort of access reviews. She will also discuss why organisations need to have a cross-system and application view when it comes to Access Governance.
Join experts from KuppingerCole Analysts and AI-assisted behavioral analysis firm Sharelock as they discuss why Identity Threat Detection & Response (ITDR) is a crucial component of an overall Identity & Access Management (IAM) strategy, why Cloud Workload Protection (CWP) is a growing security concern, and how these issues can be addressed.
Martin Kuppinger, Principal Analyst at KuppingerCole will explain why we need to get better at protecting the digital identities of human and non-human actors in an age where the majority of cyber-attacks is identity-based, and why we need AI to be successful.
Andrea Rossi, Senior Identity & Cybersecurity expert at Sharelock will introduce the Sharelock behavioral anomaly detection platform and describe how ITDR platforms can augment IAM controls to identify potential security breaches and take preventive actions. He will also explain how a combination of ITDR and CWP can address run-time DevOps security requirements.
SOCs müssen heute viel stärker automatisiert werden als in der Vergangenheit. Nur so kann auf die stetig wachsende Bedrohung auch in Zeiten einer Ressourcenknappheit bei Cybersicherheitsexperten reagiert werden. Zudem müssen sich technische Lösungen eng mit den Prozessen von der Analyse von Schwachstellen bis hin zum Umgang mit kritischen Sicherheitsereignissen integrieren. Das setzt moderne Technologie, aber auch das richtige Zusammenspiel zwischen Technologien, Prozessen sowie internen und externen Experten voraus.
Martin Kuppinger, Principal Analyst bei KuppingerCole Analysts, wird auf die Anforderungen an moderne SOCs (Security Operations Centers) eingehen und dabei insbesondere die Bedeutung von Automatisierung und Integration betrachten. Dabei steht SOAR als Technologie im Fokus. Die organisatorischen und technischen Voraussetzungen und die wichtigsten Anwendungsfälle, aber auch die Überlappung und Schnittstellen von SOAR zu anderen Sicherheitstechnologien für ein modernes SOC werden im Vortrag beleuchtet.
Thomas Maxeiner, Sr. Manager Presales bei Palo Alto Networks, wird Einblicke in den Lösungsansatz XSOAR (eXtended SOAR) von Palo Alto Networks geben. Er wird beschreiben, wie man solche Lösungen effizient als Erweiterung bestehender SOCs oder als Basis von neuen SOCs umsetzt. Er wird darüber hinaus die wichtigsten Fähigkeiten von XSOAR und ihre Relevanz für moderne, hoch automatisierte SOCs betrachten und auf das Zusammenspiel mit weiteren Lösungsbereichen der Cybersecurity wie ASM (Attack Surface Management), XDR (eXtended Detection and Response) und den Palo Alto XSIAM-Ansatz (eXtended Security Intelligence and Automation Management) eingehen.
Join experts from KuppingerCole Analysts and trusted identity firm Entrust as they discuss why not all MFA solutions offer the same level of protection. They will also explore the current state of Passwordless Authentication solutions and how best to implement them.
Alejandro Leal, Research Analyst at KuppingerCole will discuss how business IT is changing, and the implications for passwords. He will also explain why and how passwords need to be eliminated to increase security, regulatory compliance, and user satisfaction.
Rohan Ramesh, Director of Product Marketing: Identity and Access Management at Entrust will describe the various MFA-based attacks being seen in the wild and how to combine MFA and Passwordless Authentication to enable secure access for users and improve overall security.
Join security experts from KuppingerCole Analysts and Beyond Identity as they discuss the challenges of first-generation MFA and how to reduce friction while increasing security and improving the user experience by implementing passwordless authentication within a Zero Trust security framework.
Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will present a matrix that helps organizations to prioritize their Zero Trust efforts, mapped to the key building blocks of a comprehensive Zero Trust strategy.
Patrick McBride, Chief Marketing Officer at Beyond Identity will explain how organizations can eliminate passwords and friction within a Zero Trust framework. He will also provide an overview of Beyond Identity’s Zero Trust Authentication solution.