Webinar Recording

Reinventing Smart Cards for the Modern Agile, Connected Enterprise

Show description
Speakers
Alexei Balaganski
Lead Analyst & CTO
KuppingerCole
Alexei Balaganski
Alexei is an analyst with specific focus on cybersecurity and Artificial Intelligence. At KuppingerCole, he covers a broad range of security-related topics: from database, application and API security to security analytics, information protection, and AI-based security automation. He holds a...
View profile
Michael Elychev
Product Manager
Indeed ID
Michael Elychev
My experience includes software quality assurance, presale engineering and technical consulting and software product management. In overall more then 10 yeas experience in the IT industry. Education: Engineer's degree in Computer Software Engineering from Novgorod State University named after...
View profile
Lead Sponsor
Indeed Identity
Playlist
KuppingerCole Webinars
Webinar Recording
3rd Party Identity Risk – Der Feind Im Eigenen Haus (?)
Jun 14, 2023

Hierzu ist es unerlässlich, Identitätstypen nicht als voneinander getrennt agierende Entitäten, sondern als ineinander verwobene Fasern zu begreifen – die Identity Fabric. Erst durch diese Meta-Sicht kann eine zuverlässige Risikoabwägung erfolgen, die für den korrekten Umgang mit IoT-Identitäten grundlegend ist. Zuletzt ist die Reduktion von aufwändigen internen Prozessen und Kosten ein weiterer Faktor für die erfolgreiche Modernisierung des Identitätsmanagement in Ihrem Unternehmen.

In diesem Webinar lernen Sie:

  • Die wichtigsten Unterschiede zwischen verschiedenen Arten von Identitäten und ihren Zugriffsrechten kennen
  • Die Rolle der Lieferkette als schwächstes Glied im Zugriffsmanagement näher kennen
  • Wie Sie eine Vielzahl von Identitäten auch in externen Unternehmenseinheiten managen
  •  Wie ein sicherer Remote-Access für Menschen und Maschinen gewährleistet werden kann
Webinar Recording
Optimize Security With Security Orchestration, Automation, & Response
May 05, 2023

Join security experts from KuppingerCole Analysts and IBM as they explain how Security Orchestration, Automation, and Response (SOAR) solutions address this and other security challenges. They will also examine different approaches to SOAR, and discuss how to identify SOAR solutions that are a good fit for your organization.

Alejandro Leal, Research Analyst at KuppingerCole and author of the latest Leadership Compass on SOAR will explain the background of the report, discuss the SOAR market, identify the main capabilities of SOAR solutions, and talk about what makes IBM’s QRadar SOAR a market leader.

Oren Shevach, Product leader for IBM Security QRadar SOAR will provide further details and insights into IBM’s SOAR offering, explain how organizations can benefit from its implementation, and give a demonstration to show the solution’s major capabilities in action.

Webinar Recording
Understanding the Privacy Evolution to Get Ahead of the Curve
Mar 01, 2023

Join privacy experts from KuppingerCole Analysts and OneTrust as they discuss the evolving privacy landscape and how businesses can navigate it successfully, as well as share guidance on how to evolve privacy programs to become embedded in corporate culture and technology.

Paul Fisher, Lead Analyst at KuppingerCole will explain why security awareness alone, is not enough, and how organizations can improve privacy in the cloud by using technologies such as PAM and CIEM. He will also discuss the importance of being aware all privacy and compliance laws, and the benefits of adopting a Zero Trust approach to security.

Sam Gillespie, Senior Solutions Engineer at OneTrust will explain how to build proactive privacy programs based on global best practices. He will also talk about integrating privacy and data governance initiatives, demonstrating transparency, and enabling trusted data use.

Webinar Recording
The Evolution of Secure Access in Critical Infrastructure
Oct 13, 2023

Join security experts from KuppingerCole Analysts and Cyolo as they discuss how access is evolving and the challenges that brings for OT/ICS/CIS environments. They will look at the potential benefits of technologies such as SIEM, SOAR, ITSM, PAM, IAM and XDR, and concepts such as MFA, ZTA, and ZTNA, as well as ways of reducing risk and meeting insurance requirements.

John Tolbert, Lead Analyst at KuppingerCole will give examples of threats to OT/ICS/CIS environments and the associated risks. He will describe how critical infrastructure differs from general IT, and how IT security tools can help protect it. He will also look at Zero Trust Network Access principles and how they apply.

Kevin Kumpf, Chief OT Strategist at Cyolo will explain the concept of application access, discuss a unified approach to using IT security tools, look at how these tools and process change can help address OT staff shortages, examine the impact of devices such as software PLCs on organizations, and explain how to achieve future-proof secure remote access.

Webinar Recording
Effective Application Access Controls in the Modern Business IT Landscape
Jul 19, 2023

Join security experts from KuppingerCole Analysts and Pathlock as they discuss why modern applications need more granular and context-based access controls, why it is important that these controls can adapt to changing business needs and user behaviors, and how that can be achieved.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide a head-to-head comparison of key features of common, traditional IGA, and the established access control tools for SAP and other Line of Business (LoB) applications.

Carrie Curry, VP of Customer Advisory at Pathlock will explain the benefits of a holistic application access management approach that can provide real-time access decisions based on contextual data, that can support compliance, that provides fine-grained controls, and that can reduce the cost and effort of access reviews. She will also discuss why organisations need to have a cross-system and application view when it comes to Access Governance.

Webinar Recording
Simplify Identity Management With User Centric Personas and PBAC
Jun 23, 2023

Join experts from KuppingerCole Analysts and TrustBuilder as they discuss how to tackle these and other modern Identity Management challenges by using Policy-Based Access Controls and combining different personas into a single user profile to enable users to authenticate with a single set of credentials.

Nitish Deshpande, Research Analyst at KuppingerCole Analysts will examine the concept of Policy Based Access Control (PBAC), looking at what that entails, as well as the security and business advantages of adopting this approach to identity management.

Kurt Berghs, Product Manager at TrustBuilder will explain how using PBAC with personas consolidates multiple accounts across disparate systems into one user profile for each identity, enables the management of user lifecycles, secures complex environments, and allows organizations to delegate rights enabled with self-service.

Webinar Recording
Championing Privileged Access Management With Zero Trust Security
Jan 20, 2023

A modern approach to securing privileged accounts is to apply the principle of Zero Trust: Never trust, always verify. While Zero Trust is not an off-the-shelf solution, it is modern vendors of PAM solutions that recommend using this security principle to cement the technical capabilities of their products. This webinar will provide actionable insights for organizations to employ Zero Trust security in their overall PAM strategy and operations.

Paul Fisher, Senior Analyst at KuppingerCole, will look at the origins of Zero Trust theory and its development as well as how Zero Trust fits into the KuppingerCole identity and cybersecurity fabric architecture concepts. He will address how Zero Trust can assist in managing cloud entitlements and discuss we 100% Zero Trust is possible. Srilekha Sankaran, product consultant for PAM solutions at ManageEngine, will address the risks of insider threats and privilege misuse in the era of hybrid work, and discuss the management and elimination of the risks posed by standing privileges.

Webinar Recording
Beyond Just SAP: The Need for Cross-LoB Access Controls
Sep 07, 2023

In this webinar, you’ll learn about

  • The changing landscape of LoB applications and how to tackle the access-related challenges
  • Requirements on modern solutions for access control for SAP and for hybrid multi-vendor environments
  • A market leadership view: The KuppingerCole Leadership Compasses for access control tools
  • Implementing a multi-vendor, hybrid approach for access control for LoB applications

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the state of the market, the requirements on solutions, and will present selected results from the recent KuppingerCole Leadership Compasses covering this market segment for both SAP-specific and multi-vendor LoB environments.

Keri Bowman, Sr. Director Product Marketing, at Pathlock, then will explain how the Pathlock solutions support customers in managing access controls, access risk, and SoD rules across multiple LoB applications from different vendors from a unified interface.

Webinar Recording
The Business Value of Cloud-Based Identity Security
Mar 31, 2023

Join identity experts at KuppingerCole Analysts and SailPoint as they discuss the challenges of on-prem identity security solutions, the benefits of moving to software-as-a-service solutions, how to determine if that’s the right option, key questions to ask, how to quantify the financial impact, and how to choose the right solution.

Nitish Deshpande, Research Analyst at KuppingerCole Analysts, will look at the how legacy IGA systems can be modernized as part of digital transformation strategies. He will also share some tips and explain what needs to be taken into consideration when moving to the cloud to achieve future-proof identity security.

Chris Gossett Senior Vice President of Technology Services at SailPoint will explain the core benefits of upgrading to cloud-based identity security, the financial and business implications, and how to get started. He will also provide an overview of SailPoint’s approach to cloud-based identity security and SailPoint’s Identity Security Cloud Upgrade Program and Assessment for existing customers.

Webinar Recording
Cloud Security Early Warning Systems: From CSPM to CNAPP
Oct 20, 2023

Cloud computing delivers the benefits of accelerated development without the hardware costs. But the dynamic nature of cloud services and the proprietary security features offered by different cloud service providers make it challenging for customers to manage the risks and to be sure they are meeting security and compliance obligations. Most organizations need some form of guardrails and ways to respond to suspicious behavior.

Join cloud security experts from KuppingerCole Analysts and Uptycs as they discuss the challenges of the shared responsibility model for cloud security and compliance, examine the range of ways available for dealing with the problem, and consider the benefits of cloud security posture management (CSPM) and cloud-native application protection platform.

Mike Small, Senior Analyst at KuppingerCole will describe the major risks in the way organizations use cloud services. He will also explain why cloud services need dynamic rather than static controls, list the tools that aim to manage these risks, and outline what to expect from a CSPM solution.

Andre Rall, Director of Cloud Security at Uptycs will describe the benefits of integrating security insights, of standardizing controls and policies, of taking charge of third-party code and resources, and of removing silos by using a single platform, data model, and user interface.

Webinar Recording
Achieve Effective Risk and Vulnerability Management With a Platform Approach
Jun 16, 2023

Join security experts from KuppingerCole Analysts and Tanium as they discuss the common challenges faced in identifying, prioritizing, and remediating security vulnerabilities, and how to overcome them by adopting a proactive approach that will increase efficiency and reduce risk.

Richard Hill, Director of IAM Research and Lead Analyst at KuppingerCole, will discuss the value of Software Bill of Materials (SBOM), asset, and endpoint management. Also, how understanding the context of what you have can help surface software and endpoint vulnerabilities and compliance risks within an organization through visibility.

Bryant Bell, Director Product Marketing – Risk & Compliance at Tanium will outline a platform approach to identify, prioritize, and remediate vulnerabilities to achieve greater speed, scalability, and visibility to improve efficiency and reduce risk.

Webinar Recording
Access Governance für SAP-Systeme – Direkt aus dem IGA-System
Feb 10, 2023

In diesem Webinar lernen Sie:

  • Warum Zugriffskontrollen auch über Systemgrenzen hinweg funktionieren müssen und nicht auf SAP-Systeme beschränkt sein können
  • Wie IGA-Lösungen effektive Risikoanalysen und Zugriffskontrollen für SAP und andere kritische Anwendungen in einer Gesamtsicht ermöglichen
  • Welche Informationen im Fokus der Risikoanalyse sein müssen
  • Wie man die Sicherheit von Systemen und Daten durch Risikoanalyse und Zugriffskontrollen erhöhen und automatisiert steuern kann

Kai Boschert, Senior Advisor bei KuppingerCole Analysts, gibt einen Überblick über das sich verändernde SAP-Ökosystem und für Geschäftsanwendungen (LoB, Line of Business Applications), aber auch weitere Systeme, die mit Blick auf Funktionstrennung, Zugriffskontrolle und Risikoanalyse mit einbezogen werden. Er nennt wesentliche Anforderungen an moderne Lösungen und vergleicht Lösungsansätze von auf SAP-Umgebungen spezialisierten Lösungen bis hin zu offenen IGA-Systemen bezüglich ihrer Eignung, heutige und zukünftige IT-Infrastrukturen zu bedienen.

Klaus Hild, Principal Identity Strategist bei SailPoint und Sven Pieper, Operations Director bei Turnkey Consulting, gehen dann im Detail darauf ein, wie man risikobehaftete Zugriffsberechtigungen und deren Nutzung in SAP-Umgebungen analysieren kann, wie sich regulatorische Vorgaben einhalten lassen und Notfallzugriffe umgesetzt werden können, ohne dass dafür spezialisierte Lösungen nur für die SAP-Welt zum Einsatz kommen. Der Fokus liegt dabei auf IGA-integrierten Lösungsansätzen, die die gesamte Bandbreite von LoB-Applikationen unterstützen.