Webinar Recording

How to share your Corporate Information with whomever you want - securely?

Show description
Speakers
Tzach Kaufmann
CTO & Founder
Covertix
Tzach Kaufmann
Tzach is a technology expert with more than 15 years of experience in the cybersecurity, IT, networking, and telecom sectors. Prior to Covertix, Tzach worked in security companies managing complex international projects for industry giants like Cisco and Samsung.
View profile
Martin Kuppinger
Principal Analyst
KuppingerCole
Martin Kuppinger
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...
View profile
Lead Sponsor
Covertix
Playlist
KuppingerCole Webinars
Webinar Recording
Unify Identity and Security to Block Identity-Based Cyber Attacks
Dec 07, 2022

Join security and identity experts from KuppingerCole Analysts and ARCON as they discuss the importance of securing enterprise credentials, explain why a unified identity security approach in line with Zero Trust principles improve security and efficiency, and describe how to combine solutions to address key identity security issues.

John Tolbert, Director Cybersecurity Research at KuppingerCole will cover the background on identity involved data breaches and discuss the need for identity threat detection. He will also describe where identity fits in the MITRE ATT&CK matrix, and how Zero Trust architecture can reduce the threat of attacks involving identity aspects.Gautam Singh Deo, Director Strategic Business Engagements at ARCON will give examples of identity-based attacks, discuss the evolution of the identity landscape, explain the importance of identity-centric security in the context of a Zero Trust, and provide an overview of identity threat detection and response solutions and building a contextual data model.

Webinar Recording
Achieve Effective Risk and Vulnerability Management With a Platform Approach
Jun 16, 2023

Join security experts from KuppingerCole Analysts and Tanium as they discuss the common challenges faced in identifying, prioritizing, and remediating security vulnerabilities, and how to overcome them by adopting a proactive approach that will increase efficiency and reduce risk.

Richard Hill, Director of IAM Research and Lead Analyst at KuppingerCole, will discuss the value of Software Bill of Materials (SBOM), asset, and endpoint management. Also, how understanding the context of what you have can help surface software and endpoint vulnerabilities and compliance risks within an organization through visibility.

Bryant Bell, Director Product Marketing – Risk & Compliance at Tanium will outline a platform approach to identify, prioritize, and remediate vulnerabilities to achieve greater speed, scalability, and visibility to improve efficiency and reduce risk.

Webinar Recording
Identity Assurance Using Biometrics
Jul 21, 2023

Join identity experts at KuppingerCole Analysts and iProov to as they discuss the vulnerabilities of access control systems that rely on something that is known or possessed, and the value of adding biometrics. They will also discuss the role of biometrics in identity verification and proofing, and how to ensure biometrics are used safely to address privacy concerns.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the drivers of the growing demand for identity verification and identity proofing across a range of use cases from B2E to B2B and B2C, including the Work from Anywhere trend and Supply Chain Security/3rd Party Risk Management. He will also look at which signals can be used for identity proofing.

Joe Palmer Chief Product & Innovation Officer of iProov will explain how biometrics can improve security for digital and physical access. He will also provide guidance on aligning biometrics with high-risk changes in the identity lifecycle, inclusivity considerations, and mitigating the risk of generative AI in cyber-attack methodologies.

Webinar Recording
Pioneering Zero Trust Network Access With Intelligent Microsegmentation
Mar 29, 2023

Adopting a Zero Trust security model of strict identity verification and access control for every user or device is widely accepted as a solution, but many organizations struggle to find the best route to implementing it. Join security experts from KuppingerCole Analysts and Zero Networks as they discuss network segmentation as a departure point and how microsegmentation is evolving to make it easier to use.

Alexei Balaganski, Lead Analyst at KuppingerCole Analysts will explain the problems with network security, how microsegmentation addresses those problems, what it is, how it works, and why previously it has not been more widely recognized and adopted as a means of achieving ZTNA.

Nicholas DiCola, VP of Customers at Zero Networks will outline and demonstrate the concept of intelligent microsegmentation. He will explain how this approach makes it easy for organizations to use microsegmentation to achieve least privilege networking automatically and in a scalable way for every user and device without having to deploy agents or configure policies.

Webinar Recording
Fight Fraud With Fraud Reduction Intelligence Platforms (FRIP)
Aug 16, 2023

In today's digital landscape, businesses face an increasing threat of fraud that can lead to significant financial losses and damage to their reputation. To effectively combat fraud, businesses need Fraud Reduction Intelligence Platforms (FRIPs). These advanced technologies leverage multiple data sources, data analytics, and ML detection models to proactively detect and prevent fraudulent activities in real-time. FRIPs empower organizations to stay ahead of fraudsters by uncovering hidden patterns, identifying anomalies, and generating alerts. By implementing FRIPs, businesses can mitigate risks, reduce false positives, and safeguard their financial well-being and brand image. Stay one step ahead of fraud with FRIPs and ensure a secure future for your business.

John Tolbert, Director of Cybersecurity Research at KuppingerCole, will give an overview of fraud trends and the tools businesses and other organizations can use to detect and prevent fraud. This webinar will highlight our research methodology, evaluation criteria, and some findings from the recently released Leadership Compass on FRIP. We will also show how you can view and drill down into the results of our FRIP research in our new KC Open Select tool

Webinar Recording
The Evolution of Secure Access in Critical Infrastructure
Oct 13, 2023

Join security experts from KuppingerCole Analysts and Cyolo as they discuss how access is evolving and the challenges that brings for OT/ICS/CIS environments. They will look at the potential benefits of technologies such as SIEM, SOAR, ITSM, PAM, IAM and XDR, and concepts such as MFA, ZTA, and ZTNA, as well as ways of reducing risk and meeting insurance requirements.

John Tolbert, Lead Analyst at KuppingerCole will give examples of threats to OT/ICS/CIS environments and the associated risks. He will describe how critical infrastructure differs from general IT, and how IT security tools can help protect it. He will also look at Zero Trust Network Access principles and how they apply.

Kevin Kumpf, Chief OT Strategist at Cyolo will explain the concept of application access, discuss a unified approach to using IT security tools, look at how these tools and process change can help address OT staff shortages, examine the impact of devices such as software PLCs on organizations, and explain how to achieve future-proof secure remote access.

Webinar Recording
Beyond Just SAP: The Need for Cross-LoB Access Controls
Sep 07, 2023

In this webinar, you’ll learn about

  • The changing landscape of LoB applications and how to tackle the access-related challenges
  • Requirements on modern solutions for access control for SAP and for hybrid multi-vendor environments
  • A market leadership view: The KuppingerCole Leadership Compasses for access control tools
  • Implementing a multi-vendor, hybrid approach for access control for LoB applications

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the state of the market, the requirements on solutions, and will present selected results from the recent KuppingerCole Leadership Compasses covering this market segment for both SAP-specific and multi-vendor LoB environments.

Keri Bowman, Sr. Director Product Marketing, at Pathlock, then will explain how the Pathlock solutions support customers in managing access controls, access risk, and SoD rules across multiple LoB applications from different vendors from a unified interface.

Webinar Recording
Speeding Up Zero Trust Delivery Using Managed Services
May 24, 2023

Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture for ensuring that all IT networks and information systems are protected from cyber-attacks.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will talk about where, why, and how managed services can be utilized to speed up the Zero Trust journey. He will also highlight important requirements, including a high degree of standardization of services and the enforcement of Zero Trust principles such as "always verify".

Heiko Hütter, CEO of Service Layers, will share his perspectives on the benefits and challenges of Zero Trust and IAM Managed Services, give some real-world examples to show the benefits of a combined strategy, discuss how best to implement this strategy to reduce the risk of data breaches, and give an overview of iC Consult’s related expertise and services.

Webinar Recording
Cloud Security Early Warning Systems: From CSPM to CNAPP
Oct 20, 2023

Cloud computing delivers the benefits of accelerated development without the hardware costs. But the dynamic nature of cloud services and the proprietary security features offered by different cloud service providers make it challenging for customers to manage the risks and to be sure they are meeting security and compliance obligations. Most organizations need some form of guardrails and ways to respond to suspicious behavior.

Join cloud security experts from KuppingerCole Analysts and Uptycs as they discuss the challenges of the shared responsibility model for cloud security and compliance, examine the range of ways available for dealing with the problem, and consider the benefits of cloud security posture management (CSPM) and cloud-native application protection platform.

Mike Small, Senior Analyst at KuppingerCole will describe the major risks in the way organizations use cloud services. He will also explain why cloud services need dynamic rather than static controls, list the tools that aim to manage these risks, and outline what to expect from a CSPM solution.

Andre Rall, Director of Cloud Security at Uptycs will describe the benefits of integrating security insights, of standardizing controls and policies, of taking charge of third-party code and resources, and of removing silos by using a single platform, data model, and user interface.

Webinar Recording
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
Sep 29, 2023

Join security experts at KuppingerCole Analysts and CrowdStrike as they discuss why SOCs typically struggle to be more proactive, explore what is required to build a flexible, scalable and automated SOC, and explain the role of ML, LLMs and other forms of AI in extending the capabilities of the SOC.

Warwick Ashford, Senior Analyst at KuppingerCole Analysts, will outline the challenges facing cybersecurity teams, why traditional approaches to building SOCs need to change, and why automation and human-machine collaboration is the key to meet security and business needs.

Aris Koios, Technology Strategist, DACH, at CrowdStrike will explain how to measure success beyond activity driven metrics, why it is important to use open standards and API-driven approaches, and how to supercharge detection and response with a single, unified SOC tech stack.


Attend this webinar to:

  • Understand the challenges being faced by modern SOCs.
  • Learn why traditional SOCs are no longer fit for purpose.
  • Discover the benefits of a flexible, scalable and automated SOC
  • Find out how SOCs can benefit from the use of AI technology.
  • See how a unified SOC tech stack can boost enterprise detection and response.
Webinar Recording
Understanding the Privacy Evolution to Get Ahead of the Curve
Mar 01, 2023

Join privacy experts from KuppingerCole Analysts and OneTrust as they discuss the evolving privacy landscape and how businesses can navigate it successfully, as well as share guidance on how to evolve privacy programs to become embedded in corporate culture and technology.

Paul Fisher, Lead Analyst at KuppingerCole will explain why security awareness alone, is not enough, and how organizations can improve privacy in the cloud by using technologies such as PAM and CIEM. He will also discuss the importance of being aware all privacy and compliance laws, and the benefits of adopting a Zero Trust approach to security.

Sam Gillespie, Senior Solutions Engineer at OneTrust will explain how to build proactive privacy programs based on global best practices. He will also talk about integrating privacy and data governance initiatives, demonstrating transparency, and enabling trusted data use.

Webinar Recording
Access Governance für SAP-Systeme – Direkt aus dem IGA-System
Feb 10, 2023

In diesem Webinar lernen Sie:

  • Warum Zugriffskontrollen auch über Systemgrenzen hinweg funktionieren müssen und nicht auf SAP-Systeme beschränkt sein können
  • Wie IGA-Lösungen effektive Risikoanalysen und Zugriffskontrollen für SAP und andere kritische Anwendungen in einer Gesamtsicht ermöglichen
  • Welche Informationen im Fokus der Risikoanalyse sein müssen
  • Wie man die Sicherheit von Systemen und Daten durch Risikoanalyse und Zugriffskontrollen erhöhen und automatisiert steuern kann

Kai Boschert, Senior Advisor bei KuppingerCole Analysts, gibt einen Überblick über das sich verändernde SAP-Ökosystem und für Geschäftsanwendungen (LoB, Line of Business Applications), aber auch weitere Systeme, die mit Blick auf Funktionstrennung, Zugriffskontrolle und Risikoanalyse mit einbezogen werden. Er nennt wesentliche Anforderungen an moderne Lösungen und vergleicht Lösungsansätze von auf SAP-Umgebungen spezialisierten Lösungen bis hin zu offenen IGA-Systemen bezüglich ihrer Eignung, heutige und zukünftige IT-Infrastrukturen zu bedienen.

Klaus Hild, Principal Identity Strategist bei SailPoint und Sven Pieper, Operations Director bei Turnkey Consulting, gehen dann im Detail darauf ein, wie man risikobehaftete Zugriffsberechtigungen und deren Nutzung in SAP-Umgebungen analysieren kann, wie sich regulatorische Vorgaben einhalten lassen und Notfallzugriffe umgesetzt werden können, ohne dass dafür spezialisierte Lösungen nur für die SAP-Welt zum Einsatz kommen. Der Fokus liegt dabei auf IGA-integrierten Lösungsansätzen, die die gesamte Bandbreite von LoB-Applikationen unterstützen.