Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
All the Roads Lead to the C, Paved with B2BMay 28, 20194:00pm CEST, 10:00am EDT, 7:00am PDT
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
Is Multilayered Cyber-Defense Out Already? Against Rising Breaches and Vulnerabilities, Data-Centric Security to the Rescue!
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Martin Kuppinger will discuss in this presentation risk-based approaches to manage cloud security. The issue, from his perspective, isn’t that the cloud is inherently insecure. The real issue is to deal in appropriate way with the specifics of the cloud – which includes not only security but as well related issues like availability. In this presentation, Martin Kuppinger will talk about aspects like authentication and authorization in cloud environments, cross-cloud governance approaches and the specific issues around changing providers. He will also highlight his view that risk and services are the two fundamental elements for IT management – even more in these cloudy times.
Language: English • Duration: 44:45 • Resolution: 800x600
Whitepaper: The Dark Side of the API Economy - 80019
Executive View: Ideiio IGA - 80077
Leadership Brief: Blockchain ID & Self Sovereign Identity - 80105
Buyer’s Guide: Endpoint Protection - 80110
Executive View: Wallix Bastion - 79053
OT, SCADA, & ICS Security
Blockchain & Distributed Ledgers
Life Management Platforms
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning