Purchase your subscription online now and get access to the whole body of KC Plus research including Leadership Compasses.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
A Compass for Choosing the Right Fraud Reduction Intelligence PlatformApr 16, 20204:00pm CEST, 10:00am EDT, 7:00am PDT
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
IAM Projects Stalling – Too Tools-Centric
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
“Antivirus is dead!” - we’ve heard talks like this for years. Some experts would point out that traditional signature-based products cannot detect zero-day attacks or sophisticated advanced threats. Others would even recommend getting rid of any 3rd party antimalware products because the one built into Windows is good enough. But can we really take these claims at face value? If the last few years have taught us anything, it would be that the cyberthreat landscape is constantly evolving, changing quickly and unpredictably. Even the largest companies that have invested heavily in various security tools were completely unprepared for the ransomware outbreak last year. Cryptojacking, CEO fraud, fileless malware – cybercriminals never cease to “innovate”…
It seems therefore that for most companies the focus has already shifted from preventing a malware attack towards detecting malicious activities and trying to contain them as quickly as possible – after the introduction of GDPR and similar compliance regulations, an undetected breach can not just hinder your operations but ruin your business financially. But does it mean that you need to augment your existing antivirus with a brand new EDR solution? And how do you plan to keep up with the latest cyberthreat developments if not with a threat intelligence solution? Finally, who’s going to operate all these tools and how much do they expect to be paid?
Language: English • Duration: 01:00:38 • Resolution: 1280x720
Advisory Note: Emerging Technologies Fostering Digital Business Innovation: Utilities & Energy - 80265
Leadership Brief: The Information Protection Life Cycle and Framework: Control Access - 80372
Executive View: Vectra Cognito - 80230
Executive View: R&S®Trusted Gate von Rohde & Schwarz Cybersecurity - 80400de
Leadership Brief: The Information Protection Life Cycle and Framework: Acquire and Assess - 80371
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning