Webinar Recording

Using Deception for Early and Efficient Threat Detection

Show description
Speakers
Alexei Balaganski
Lead Analyst & CTO
KuppingerCole
Alexei Balaganski
Alexei is an analyst with specific focus on cybersecurity and Artificial Intelligence. At KuppingerCole, he covers a broad range of security-related topics: from database, application and API security to security analytics, information protection, and AI-based security automation. He holds a...
View profile
Wolfgang Halbartschlager
Sales Engineer EMEA
Illusive Networks
Wolfgang Halbartschlager
Wolfgang is a Senior Technical Sales Engineer with over 15 years of experience as a security engineer and consultant. He is responsible for Illusive Networks’ technical activities and strategy in the DACH region, where he has continued to develop his IT security and thought leadership...
View profile
Lead Sponsor
Illusive Networks
Playlist
KuppingerCole Webinars
Webinar Recording
Debunking Common Myths about XDR
Jan 25, 2023

Join security experts from KuppingerCole Analysts and SentinelOne to help you get an understanding of what eXtended Detection & Response (XDR) really is, and why you should consider this emerging technology in your enterprise security stack.

John Tolbert, Director Cybersecurity Research at KuppingerCole and Marko Kirschner, Director of Sales Engineering Central Europe at SentinelOne will define XDR, including which technical components are necessary for distinguishing XDR from Endpoint Detection & Response (EDR), and how XDR differs from Security Orchestration Automation & Response (SOAR).

They will also discuss why XDR is an important useful amalgamation and evolution of security tool sets, the use cases it solves, and where it should fit on organizational security technology roadmaps.

Webinar Recording
Ensuring a Proper Fit: Trends in CIAM and Strategies for Effective Solution Selection
Jun 30, 2023

As organizations increasingly rely on digital platforms and services to engage with customers, the management and security of consumer identities have become paramount. CIAM solutions play a crucial role in protecting user data, simplifying authentication processes, and personalizing customer experiences. Our webinar aims to equip you with the knowledge and strategies to carefully begin selecting the right CIAM solution for your organization.

Don't miss this opportunity to stay ahead of the curve and elevate your organization's CIAM capabilities. Join us for this informative webinar and unlock the secrets to mastering consumer identity management while delivering exceptional user experiences.

Webinar Recording
Delivering True B2B Identity Management in the Modern Era
Jun 21, 2023

Join Identity Management experts from KuppingerCole Analysts and Thales as they discuss how best to tackle the complexities of an increasingly interconnected B2B digital ecosystem, and overcome the operational inefficiencies, security risks, high admin costs, and poor user experiences associated with homegrown legacy IAM systems and solutions tailored to B2E IAM requirements.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the drivers and challenges of B2B Identity Management in an age of Work from Anywhere (WfA), and give his perspective on the special requirements for B2B Identity Management compared with B2E/workforce IAM and CIAM (Customer & Consumer IAM).

Marco Venuti, IAM Business Acceleration Director at Thales will detail a cost-effective and efficient approach to dealing with the complex demands of modern B2B and B2B2C Identity Management. He will describe how to meet the demands of digital-first businesses with the right level of automation.

Webinar Recording
Urgent: Find and Block Identity-Centric Security Threats Today
Mar 22, 2023

Join experts from KuppingerCole Analysts and AI-assisted behavioral analysis firm Sharelock as they discuss why Identity Threat Detection & Response (ITDR) is a crucial component of an overall Identity & Access Management (IAM) strategy, why Cloud Workload Protection (CWP) is a growing security concern, and how these issues can be addressed.

Martin Kuppinger, Principal Analyst at KuppingerCole will explain why we need to get better at protecting the digital identities of human and non-human actors in an age where the majority of cyber-attacks is identity-based, and why we need AI to be successful.

Andrea Rossi, Senior Identity & Cybersecurity expert at Sharelock will introduce the Sharelock behavioral anomaly detection platform and describe how ITDR platforms can augment IAM controls to identify potential security breaches and take preventive actions. He will also explain how a combination of ITDR and CWP can address run-time DevOps security requirements.

Webinar Recording
Beyond Just SAP: The Need for Cross-LoB Access Controls
Sep 07, 2023

In this webinar, you’ll learn about

  • The changing landscape of LoB applications and how to tackle the access-related challenges
  • Requirements on modern solutions for access control for SAP and for hybrid multi-vendor environments
  • A market leadership view: The KuppingerCole Leadership Compasses for access control tools
  • Implementing a multi-vendor, hybrid approach for access control for LoB applications

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the state of the market, the requirements on solutions, and will present selected results from the recent KuppingerCole Leadership Compasses covering this market segment for both SAP-specific and multi-vendor LoB environments.

Keri Bowman, Sr. Director Product Marketing, at Pathlock, then will explain how the Pathlock solutions support customers in managing access controls, access risk, and SoD rules across multiple LoB applications from different vendors from a unified interface.

Webinar Recording
Cyber Resilience Through SOC Automation
Mar 08, 2023

Join experts from Kuppinger Cole Analysts and Palo Alto Networks as they discuss why automating as much as possible and providing information to enable analysts to make timely decisions should be a priority for SOC management. They will also explore the benefits of Security Orchestration, Automation & Response (SOAR) technologies.

Paul Simmonds, Fellow Analyst at KuppingerCole, will address the requirements of modern SOCs, highlighting the importance of automation and integration. He will focus on SOAR, discuss the top use cases and requirements of SOAR, and explain how it relates to other security technologies for a modern SOC such SIEM and XDR.

Amitabh Singh, Field CTO EMEA at Palo Alto Networks, will provide insights into Palo Alto Networks' XSOAR (eXtended SOAR) approach, its key capabilities, and its relevance to modern, highly automated SOCs. He will describe how XSOAR solutions can be used to augment existing SOCs or be used as a foundation for new SOCs, and how XSOAR relates to ASM, XDR, and XSIAM.

Webinar Recording
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Sep 22, 2023

Join identity experts at KuppingerCole Analysts and Fastpath as they discuss the identity, access, and compliance challenges companies face, and examine how the convergence of Identity Governance and Administration (IGA) and Governance, Risk, and Compliance (GRC) can deliver a solution that enables businesses to anticipate and mitigate identity and access risks proactively.

Martin Kuppinger, Principal Analyst at KuppingerCole will talk about the fundamental functionalities of IGA solutions and the organizational activities they can support. He will also look what how the IGA market is likely to evolve and explain what needs to be taken into consideration when selecting an IGA solution.

Fastpath’s Mike Cassady, Chief Product Officer, and Matt Berdine, Sr. Director, Product and Solutions, will explore the synergy between IGA and GRC, and how implementing a best-of-breed IdentityGRC framework can streamline identity management and access control, while eliminating counterproductive silos and promoting collaborative focus on process and control ownership.

Webinar Recording
Mehr Widerstandsfähigkeit Gegen Cyberangriffe: Das Automatisierte SOC
Mar 03, 2023

SOCs müssen heute viel stärker automatisiert werden als in der Vergangenheit. Nur so kann auf die stetig wachsende Bedrohung auch in Zeiten einer Ressourcenknappheit bei Cybersicherheitsexperten reagiert werden. Zudem müssen sich technische Lösungen eng mit den Prozessen von der Analyse von Schwachstellen bis hin zum Umgang mit kritischen Sicherheitsereignissen integrieren. Das setzt moderne Technologie, aber auch das richtige Zusammenspiel zwischen Technologien, Prozessen sowie internen und externen Experten voraus.

Martin Kuppinger, Principal Analyst bei KuppingerCole Analysts, wird auf die Anforderungen an moderne SOCs (Security Operations Centers) eingehen und dabei insbesondere die Bedeutung von Automatisierung und Integration betrachten. Dabei steht SOAR als Technologie im Fokus. Die organisatorischen und technischen Voraussetzungen und die wichtigsten Anwendungsfälle, aber auch die Überlappung und Schnittstellen von SOAR zu anderen Sicherheitstechnologien für ein modernes SOC werden im Vortrag beleuchtet.

Thomas Maxeiner, Sr. Manager Presales  bei Palo Alto Networks, wird Einblicke in den Lösungsansatz XSOAR (eXtended SOAR) von Palo Alto Networks geben. Er wird beschreiben, wie man solche Lösungen effizient als Erweiterung bestehender SOCs oder als Basis von neuen SOCs umsetzt. Er wird darüber hinaus die wichtigsten Fähigkeiten von XSOAR und ihre Relevanz für moderne, hoch automatisierte SOCs betrachten und auf das Zusammenspiel mit weiteren Lösungsbereichen der Cybersecurity wie ASM (Attack Surface Management), XDR (eXtended Detection and Response) und den Palo Alto XSIAM-Ansatz (eXtended Security Intelligence and Automation Management) eingehen.

Webinar Recording
IGA Essentials: Embracing Trends and Amplifying Core Capabilities
Aug 11, 2023

The market for Identity Governance and Administration (IGA) is undergoing further development with the incorporation of more integrated solutions for Identity Lifecycle Management and Access Governance, which are now being enhanced by intelligent features. However, organizations still face the challenge of understanding the key functions to consider when choosing an IGA solution. Join KuppingerCole Analysts in this webinar to gain insights into the fundamental functionalities of an IGA (Identity Governance and Administration) solution. Additionally, learn about the prevailing market trends in the IGA landscape and discover how KuppingerCole Analysts can provide guidance in selecting the most suitable IGA solution for your specific needs.

Webinar Recording
Identity Assurance Using Biometrics
Jul 21, 2023

Join identity experts at KuppingerCole Analysts and iProov to as they discuss the vulnerabilities of access control systems that rely on something that is known or possessed, and the value of adding biometrics. They will also discuss the role of biometrics in identity verification and proofing, and how to ensure biometrics are used safely to address privacy concerns.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the drivers of the growing demand for identity verification and identity proofing across a range of use cases from B2E to B2B and B2C, including the Work from Anywhere trend and Supply Chain Security/3rd Party Risk Management. He will also look at which signals can be used for identity proofing.

Joe Palmer Chief Product & Innovation Officer of iProov will explain how biometrics can improve security for digital and physical access. He will also provide guidance on aligning biometrics with high-risk changes in the identity lifecycle, inclusivity considerations, and mitigating the risk of generative AI in cyber-attack methodologies.

Webinar Recording
Championing Privileged Access Management With Zero Trust Security
Jan 20, 2023

A modern approach to securing privileged accounts is to apply the principle of Zero Trust: Never trust, always verify. While Zero Trust is not an off-the-shelf solution, it is modern vendors of PAM solutions that recommend using this security principle to cement the technical capabilities of their products. This webinar will provide actionable insights for organizations to employ Zero Trust security in their overall PAM strategy and operations.

Paul Fisher, Senior Analyst at KuppingerCole, will look at the origins of Zero Trust theory and its development as well as how Zero Trust fits into the KuppingerCole identity and cybersecurity fabric architecture concepts. He will address how Zero Trust can assist in managing cloud entitlements and discuss we 100% Zero Trust is possible. Srilekha Sankaran, product consultant for PAM solutions at ManageEngine, will address the risks of insider threats and privilege misuse in the era of hybrid work, and discuss the management and elimination of the risks posed by standing privileges.

Webinar Recording
The Future of Identity Security: PAM+CIEM+ITDR
Nov 03, 2023

Join identity and experts at KuppingerCole Analysts and BeyondTrust as they discuss the impact of the evolution of business IT, the trends shaping the identity landscape, the importance of identity security, and the role of privileged access management (PAM), cloud infrastructure entitlement management (CIEM), and identity threat detection and response (ITDR).

Martin Kuppinger, Principal Analyst at KuppingerCole, will look at the convergence of PAM, CIEM, and ITDR, and their place within the Identity Fabric concept. He will analyze why new technologies are required to deal with ever-increasing cyberattacks and the reality of today’s hybrid and dynamic IT, and why a holistic approach is needed.

Marc Maiffret, Chief Technology Officer at BeyondTrust, will explain the value of an identity-first security strategy and the pivotal role of PAM, supported by CIEM and ITDR, in building a next-gen security capability. He will share insights on how to reap the rewards of digital transformation, while keeping the attack surface in check and minimizing risk.