Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
The outbreak of the COVID-19 pandemic has served as a catalyst for digitization in many companies and led to an increase in remote work and adoption of the bring your own device (BYOD) policy. Every device and digital service that employees use is a potential gateway into company networks and thus poses a security risk. The risks are magnified even more when privileged accounts enter the equation because they enable access to critical data. Given the immediacy and speed with which companies had to shift from office to remote work, security concerns were often neglected leading to an increase in successful cyberattacks.
Facing this situation of increased risks and attack vectors, companies need to have foolproof security in place to keep their data safe and secure. IT teams should start with the very basics such as giving the company staff cybersecurity awareness trainings and monitoring remote access. While it has become a well-known fact that Privileged Access Management (PAM) is an integral part of cybersecurity in modern companies, Secure Compliance Management (SCM) and User Behaviour Analytics (UBA) perhaps have not been given proper attention in the security world yet.
Language: English • Duration: 57:56 • Resolution: 1280x720
Cloud Access Security Brokers
Fudo PAM by Fudo Security
Working for the Business, not the Auditors
Atos DirX Directory
R&S®Trusted Gate - Secure Glocalization by Rohde & Schwarz Cybersecurity
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning