Webinar Recording

Delivering True B2B Identity Management in the Modern Era

Show description
Speakers
Martin Kuppinger
Principal Analyst
KuppingerCole
Martin Kuppinger
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...
View profile
Marco Venuti
IAM Business Acceleration Director
Thales
Marco Venuti
Marco Venuti is IAM Enablement and Acceleration Director at Thales Group. Marco has 20+ years of direct experience in Identity & Security, having worked for multiple solution vendors in Sales and Product Management roles. Prior to Thales, he served as VP of Product Management at OneWelcome...
View profile
Lead Sponsor
Thales
Playlist
KuppingerCole Webinars
Webinar Recording
IGA Essentials: Embracing Trends and Amplifying Core Capabilities
Aug 11, 2023

The market for Identity Governance and Administration (IGA) is undergoing further development with the incorporation of more integrated solutions for Identity Lifecycle Management and Access Governance, which are now being enhanced by intelligent features. However, organizations still face the challenge of understanding the key functions to consider when choosing an IGA solution. Join KuppingerCole Analysts in this webinar to gain insights into the fundamental functionalities of an IGA (Identity Governance and Administration) solution. Additionally, learn about the prevailing market trends in the IGA landscape and discover how KuppingerCole Analysts can provide guidance in selecting the most suitable IGA solution for your specific needs.

Webinar Recording
The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
Nov 30, 2023

In this webinar, you will: 

  • Gain an understanding of insider threats and their implications for financial institutions. 
  • Win best practices for creating a robust insider threat program.
  • Discover how to manage privileged access, monitor subcontractors and terminal servers, meet compliance requirements, and audit user activities effectively.
  • Stay ahead of the curve in protecting your institution from internal threats that can have devastating consequences. 

Join us as Eugene Lymar, Chief Product Officer at Ekran System, and John Tolbert, Lead Analyst at KuppingerCole, share their knowledge, experience and best practices for strengthening your institution's defenses.

Webinar Recording
The Future of Privileged Access Management
Feb 15, 2023

How will  privileged access management change over the next years? How does this change impact your existing PAM infrastructures? What to consider for your buying decisions?

In this webinar, Morey Haber, Chief Security Officer at BeyondTrust, and Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, discuss trends in the broader PAM space, covering aspects such as

  • Will traditional PAM and CIEM/DREAM converge? And who needs what when?
  • Just-in-time privileges and ephemeral certificates – is this the future of PAM?
  •  Passwordless authentication, access management, single sign-on, and PAM: Where is the intersection and how to resolve conflicts?
  • Software development and application security: When is someone a privileged user?
  • 3rd party risk management: The driver for PAM adoption within the supply chain?

They share concepts and insights and talk about their perspectives on where PAM is evolving and what organizations should keep in mind for their own PAM strategies and implementations.

Webinar Recording
Debunking Common Myths about XDR
Jan 25, 2023

Join security experts from KuppingerCole Analysts and SentinelOne to help you get an understanding of what eXtended Detection & Response (XDR) really is, and why you should consider this emerging technology in your enterprise security stack.

John Tolbert, Director Cybersecurity Research at KuppingerCole and Marko Kirschner, Director of Sales Engineering Central Europe at SentinelOne will define XDR, including which technical components are necessary for distinguishing XDR from Endpoint Detection & Response (EDR), and how XDR differs from Security Orchestration Automation & Response (SOAR).

They will also discuss why XDR is an important useful amalgamation and evolution of security tool sets, the use cases it solves, and where it should fit on organizational security technology roadmaps.

Webinar Recording
Ensuring a Proper Fit: Trends in CIAM and Strategies for Effective Solution Selection
Jun 30, 2023

As organizations increasingly rely on digital platforms and services to engage with customers, the management and security of consumer identities have become paramount. CIAM solutions play a crucial role in protecting user data, simplifying authentication processes, and personalizing customer experiences. Our webinar aims to equip you with the knowledge and strategies to carefully begin selecting the right CIAM solution for your organization.

Don't miss this opportunity to stay ahead of the curve and elevate your organization's CIAM capabilities. Join us for this informative webinar and unlock the secrets to mastering consumer identity management while delivering exceptional user experiences.

Webinar Recording
Schon perfekt vorbereitet für NIS2? Wenn nicht: warum Identity Governance so wichtig ist
Sep 06, 2023

Somit werden auch kleinere Unternehmen innerhalb von digitalisierten Lieferketten von NIS2 betroffen sein. Da eine Lieferkette immer nur so stark wie ihr schwächstes Glied ist, müssen sich alle Player innerhalb der Kette gegen die Risiken von Cyberangriffen schützen. Schlimmstenfalls kann sonst Industriespionage dazu führen, dass vertrauliche Informationen gestohlen, Produktionsanlagen gehackt oder der Informationsfluss und der Produktionsablauf gestört werden und so ganze Wirtschaftszweige lahmgelegt werden. Deshalb müssen Unternehmen jedweder Größe jetzt tätig werden und die Umsetzung der NIS2-Richtlinie einleiten.

KuppingerCole Principal Analyst Martin Kuppinger wird einleitend erklären, warum es NIS2 braucht und weshalb Organisationen sich frühzeitig damit auseinandersetzen und eine Identity-Roadmap erstellen sollten.

Klaus Hild, Principal Identity Strategist bei SailPoint, wird anhand von Beispielen darlegen, warum sich Unternehmen Gedanken über den „Lifecycle“ eines Mitarbeiters machen sollten, auch wenn dieser womöglich bereits das Unternehmen verlassen hat und wie Identity Governance and Administration (IGA) Lieferketten beeinflusst.

Abschließend wird Dr. Sven Hübner, Head of Consulting, Principal Consultant bei KOGIT GmbH, erläutern welche Relevanz NIS2 im Bereich der Lieferketten-Sicherheit hat und wie Projektkosten durch gezielte Planung kontrollierbar bleiben.

Webinar Recording
Re-Imagining Identity Management for the Digital Era
Mar 10, 2023

Join identity and security experts from KuppingerCole Analysts and ARCON for a lively discussion about what exactly are the biggest identity challenges facing modern businesses, how those challenges are likely to evolve, and what could be done to meet current and future needs.

Participate in the debate between Martin Kuppinger, Principal Analyst at KuppingerCole Analysts and Gautam Singh Deo, Director - Strategic Business Engagements at ARCON as they discuss how to move beyond siloed approaches to ensure a security outcomes approach that is focused on identity.

Put your questions forward as our experts consider how best to achieve an identity-centric strategy that combines the best of Zero Trust, IAM, IGA and PAM, and as they explore the benefits of a converged identity security approach using Contextual Data Models.

Webinar Recording
Optimize Security With Security Orchestration, Automation, & Response
May 05, 2023

Join security experts from KuppingerCole Analysts and IBM as they explain how Security Orchestration, Automation, and Response (SOAR) solutions address this and other security challenges. They will also examine different approaches to SOAR, and discuss how to identify SOAR solutions that are a good fit for your organization.

Alejandro Leal, Research Analyst at KuppingerCole and author of the latest Leadership Compass on SOAR will explain the background of the report, discuss the SOAR market, identify the main capabilities of SOAR solutions, and talk about what makes IBM’s QRadar SOAR a market leader.

Oren Shevach, Product leader for IBM Security QRadar SOAR will provide further details and insights into IBM’s SOAR offering, explain how organizations can benefit from its implementation, and give a demonstration to show the solution’s major capabilities in action.

Webinar Recording
Simplify Identity Management With User Centric Personas and PBAC
Jun 23, 2023

Join experts from KuppingerCole Analysts and TrustBuilder as they discuss how to tackle these and other modern Identity Management challenges by using Policy-Based Access Controls and combining different personas into a single user profile to enable users to authenticate with a single set of credentials.

Nitish Deshpande, Research Analyst at KuppingerCole Analysts will examine the concept of Policy Based Access Control (PBAC), looking at what that entails, as well as the security and business advantages of adopting this approach to identity management.

Kurt Berghs, Product Manager at TrustBuilder will explain how using PBAC with personas consolidates multiple accounts across disparate systems into one user profile for each identity, enables the management of user lifecycles, secures complex environments, and allows organizations to delegate rights enabled with self-service.

Webinar Recording
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
Sep 29, 2023

Join security experts at KuppingerCole Analysts and CrowdStrike as they discuss why SOCs typically struggle to be more proactive, explore what is required to build a flexible, scalable and automated SOC, and explain the role of ML, LLMs and other forms of AI in extending the capabilities of the SOC.

Warwick Ashford, Senior Analyst at KuppingerCole Analysts, will outline the challenges facing cybersecurity teams, why traditional approaches to building SOCs need to change, and why automation and human-machine collaboration is the key to meet security and business needs.

Aris Koios, Technology Strategist, DACH, at CrowdStrike will explain how to measure success beyond activity driven metrics, why it is important to use open standards and API-driven approaches, and how to supercharge detection and response with a single, unified SOC tech stack.


Attend this webinar to:

  • Understand the challenges being faced by modern SOCs.
  • Learn why traditional SOCs are no longer fit for purpose.
  • Discover the benefits of a flexible, scalable and automated SOC
  • Find out how SOCs can benefit from the use of AI technology.
  • See how a unified SOC tech stack can boost enterprise detection and response.
Webinar Recording
The Future of Identity Security: PAM+CIEM+ITDR
Nov 03, 2023

Join identity and experts at KuppingerCole Analysts and BeyondTrust as they discuss the impact of the evolution of business IT, the trends shaping the identity landscape, the importance of identity security, and the role of privileged access management (PAM), cloud infrastructure entitlement management (CIEM), and identity threat detection and response (ITDR).

Martin Kuppinger, Principal Analyst at KuppingerCole, will look at the convergence of PAM, CIEM, and ITDR, and their place within the Identity Fabric concept. He will analyze why new technologies are required to deal with ever-increasing cyberattacks and the reality of today’s hybrid and dynamic IT, and why a holistic approach is needed.

Marc Maiffret, Chief Technology Officer at BeyondTrust, will explain the value of an identity-first security strategy and the pivotal role of PAM, supported by CIEM and ITDR, in building a next-gen security capability. He will share insights on how to reap the rewards of digital transformation, while keeping the attack surface in check and minimizing risk.

Webinar Recording
Access Governance für SAP-Systeme – Direkt aus dem IGA-System
Feb 10, 2023

In diesem Webinar lernen Sie:

  • Warum Zugriffskontrollen auch über Systemgrenzen hinweg funktionieren müssen und nicht auf SAP-Systeme beschränkt sein können
  • Wie IGA-Lösungen effektive Risikoanalysen und Zugriffskontrollen für SAP und andere kritische Anwendungen in einer Gesamtsicht ermöglichen
  • Welche Informationen im Fokus der Risikoanalyse sein müssen
  • Wie man die Sicherheit von Systemen und Daten durch Risikoanalyse und Zugriffskontrollen erhöhen und automatisiert steuern kann

Kai Boschert, Senior Advisor bei KuppingerCole Analysts, gibt einen Überblick über das sich verändernde SAP-Ökosystem und für Geschäftsanwendungen (LoB, Line of Business Applications), aber auch weitere Systeme, die mit Blick auf Funktionstrennung, Zugriffskontrolle und Risikoanalyse mit einbezogen werden. Er nennt wesentliche Anforderungen an moderne Lösungen und vergleicht Lösungsansätze von auf SAP-Umgebungen spezialisierten Lösungen bis hin zu offenen IGA-Systemen bezüglich ihrer Eignung, heutige und zukünftige IT-Infrastrukturen zu bedienen.

Klaus Hild, Principal Identity Strategist bei SailPoint und Sven Pieper, Operations Director bei Turnkey Consulting, gehen dann im Detail darauf ein, wie man risikobehaftete Zugriffsberechtigungen und deren Nutzung in SAP-Umgebungen analysieren kann, wie sich regulatorische Vorgaben einhalten lassen und Notfallzugriffe umgesetzt werden können, ohne dass dafür spezialisierte Lösungen nur für die SAP-Welt zum Einsatz kommen. Der Fokus liegt dabei auf IGA-integrierten Lösungsansätzen, die die gesamte Bandbreite von LoB-Applikationen unterstützen.