Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
How to Make Your IAM Program a SuccessFeb 22, 20184:00pm CET, 10:00am EST, 7:00am PST
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
KuppingerCole in the press
EBA Rules out Secure Open Banking?
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
A plethora of mobile devices are invading the enterprise at incredible speed, raising issues in areas like access control, policy enforcement, security of confidential data on users’ devices, and many others. Practices of “bring your own device,” (BYOD) and “company owned, personally enabled,” (COPE) are trying to describe methods of mitigating the risks involved. In this training, KuppingerCole Principal Analyst Martin Kuppinger will help IT professionals to find their best way through the myriad of recommendations and solutions related to this issue, and implement the right corporate policies and security tactics.
Language: English • Duration: 43:37 • Resolution: 800x600
Advisory Note: How to Assure Cloud Services - 72563
Executive View: VMware AppDefense - 70840
Point of View Paper: One Identity - The Journey to IAM Success - 70226
Leadership Compass: Enterprise Endpoint Security: Anti-Malware Solutions - 71172
Executive View: Oracle Autonomous Database - 70964
Operational Technology, SCADA, & ICS Security
Blockchain & Distributed Ledgers
Life Management Platforms
Real Time Security Monitoring & Intelligence
Adaptive Authentication & Authorization
Entitlement & Access Governance