Analyst Chat

Analyst Chat #195: Preventing Unwanted Remote Control - Safeguarding RDP Amidst Cyber Threats

Show description
Speakers
Senior Analyst
KuppingerCole Analysts AG
Warwick Ashford is a Senior Analyst who researches cybersecurity and identity-related topics, including emerging technologies and trends. He has been writing IT news and analysis as a journalist and editor since 2003, specialising in cybersecurity and privacy since 2012. Warwick has...
View profile
IAM Practice Director / Head of Advisory
KuppingerCole Analysts AG
Having worked for his whole professional life in Identity and Access Management, Matthias joined KuppingerCole in 2014. In his role of the Director of the Practice IAM he works on maintaining the leading role of KuppingerCole in all facets of the topic of digital identities and their access to...
View profile
Playlist
KuppingerCole Analyst Chat
Analyst Chat
Analyst Chat #45: Meet the Citizen Developer
Sep 14, 2020

Alexei Balaganski and Matthias Reinwarth look at the citizen development movement and discuss the potential risks of letting business users create their applications without proper governance and security.

Analyst Chat
Analyst Chat #134: How Self-Sovereign Identities Will Influence Public Services
Jul 25, 2022

Europe is on a "Path to a Digital Decade", which envisions 80% of EU citizens using a digital ID card by 2030. A part of that journey will be self-sovereign identities. Research Analyst Alejandro Leal joins Matthias to continue their discussion on the digital transformation in public services. Self-sovereign identities, the new eIDAS regulation, and the impact of both on how interactions between citizens and the state will change, are a controversial topic in the public discussion as well.

Analyst Chat
Analyst Chat #41: NIST’s Zero Trust Architecture
Aug 21, 2020

John Tolbert and Matthias Reinwarth look at SP 800-207, the NIST special publication on Zero Trust architecture and discuss how it aligns with KuppingerCole's own vision of this topic (spoiler: it does align very well!)

Analyst Chat
Analyst Chat #147: How To Manage Your Clients, From Customers and Citizens to B2B and B2B2C
Oct 31, 2022

CIAM solutions are designed to address specific technical requirements that consumer-facing organizations have that differ from traditional “workforce” or Business-to-Employee (B2E) use cases. John Tolbert has revisited this market segments for the updated Leadership Compass CIAM and provides an update to the analyst chat episode 58 from December 2020.

Cybersecurity Leadership Summit takes place on November 8 – 10 in Berlin and online. Join us there.

Analyst Chat
Analyst Chat #190: Cyberproof Your Business - Unpacking EU's DORA Framework for Digital Resilience
Sep 18, 2023

In this episode, host Matthias and guest Warwick Ashford dive into the EU's Digital Operational Resilience Act (DORA). They discuss its impact on the financial sector's cybersecurity and operational resilience, focusing on key objectives and challenges. The conversation also covers practical aspects like ICT Risk Management, third-party risks, operational resilience testing, and cyber threat intelligence sharing. A must-listen for IT professionals navigating DORA's complexities.

Analyst Chat
Analyst Chat #51: Emerging Technologies in Healthcare - The Underlying Trends
Oct 26, 2020

In this first of two episodes, Annie Bailey and Matthias Reinwarth lay the foundations for the topic "Emerging Technologies in Healthcare". Beyond hype and half-knowledge, they look at the use of AI, machine learning, block chain, and modern digital identities for the comprehensive improvement of processes and systems in healthcare.

Analyst Chat
Analyst Chat #9: The Dark Side of the API Economy
Apr 30, 2020

Matthias Reinwarth and Alexei Balaganski discuss the challenges of explosive API growth without proper security controls in place.

Analyst Chat
Analyst Chat #192: Exploring Cloud Security Posture Management (CSPM)
Oct 02, 2023

Join Matthias Reinwarth and Senior Analyst Mike Small in a quick chat on the evolution of Cloud Security Posture Management (CSPM). They discuss its proactive approach, the challenges in implementation, and the role of overarching platforms like Cloud Native Application Protection Platforms (CNAPP). Mike shares insights for smaller organizations and highlights the impact of geopolitics and AI on cybersecurity. Don't miss cyberevolution in Frankfurt this November for deeper insights.

Analyst Chat
Analyst Chat #121: Increasing the Adoption of MFA and Risk-based Authentication
Apr 18, 2022

A recently published study shows that the use of strong authentication in enterprise environments is at a very low level. John Tolbert explains this finding to Matthias and together they discuss how to find a way out of this situation.

Analyst Chat
Analyst Chat #49: There is More to IAM Processes than JML
Oct 12, 2020

When asked to describe IAM processes, managers tend to think first of traditional lifecycle management processes such as Joiner, Mover and Leaver (JML). While these are clearly essential for identity governance in interplay with authoritative sources, a comprehensive process framework for IAM and beyond encompasses many other areas. Martin Kuppinger and Matthias Reinwarth explore some of these additional areas between convenience and compliance.

Analyst Chat
Analyst Chat #137: What Is CDP and What Benefit Does It Add to Consumer-Centric Identity Ecosystems?
Aug 15, 2022

Customer Data Platforms (CDP) are a fairly new addition to the pool of consumer identity centric management solutions. KuppingerCole Fellow Analyst Roland Bühler joins Matthias for the first time and he explains the full picture of consumer identity and detail what differentiates CDPs from other solutions, such as DMP, CRM or Marketing Automation Solutions.

Here are the links to the documents that Matthias and Roland are talking about: Customer Data PlatformsMachine Customers - The Impact of Customer Bots on Customer Journeys

Analyst Chat
Analyst Chat #23: When is a Security Product not a Security Product?
Jun 19, 2020

Matthias Reinwarth and John Tolbert talk about profound implications of security products not having their administrative interfaces sufficiently secured with technologies like multi-factor authentication.