Video

Why You Shouldn’t Just Use IGA for Third Party Access Management

Show description
Speaker
Research Analyst
KuppingerCole Analysts AG
Nitish joined KuppingerCole Analysts AG in February 2022 as a Research Analyst. His focus area is IAM, IGA and Cybersecurity topics.
View profile
Playlist
KuppingerCole Videocasts
Interview
The Future of IAM is Automated
Nov 05, 2020

Interview with Paul Trulove, Chief Product Owner, SailPoint

Interview
How Can Privileged Access Management Help Securing the Enterprise?
Mar 18, 2021

How can PAM technologies fit into a Zero Trust architecture and model? How could a PAM technology help us sleep better at night, as many are anxious about falling victim to an attack similar to the Solar Winds attack? Is there a future in deploying PAM in DevOps environments? And how can PAM technologies help to address regulatory compliance? Join Paul and Jim as they talk about different current topics around PAM - Privileged Access Management.

Interview
Security in Financial Services
Jan 27, 2021

Join Simon Keates (Head of Strategy and Payment Security at Thales) and Dr. Udo Milkau (Fellow Analyst at KuppingerCole) talking about Security Issues in the FinTec Industry!

Video
What is the Digital Double?
Mar 09, 2023

Everything we do in the digital world, is done by our digital representation of the physical world. Asanka Abeysinghe of WSO2 invented the idea of the "digital double" - a replication of people and things in a digital ecosystem.

He is a guest on our videocast and discusses with Martin Kuppinger how the digital double can become a reality, its benefits and how it relates to consumer identity management.

Interview
Privileged Access Management from a CISO Perspective
Feb 16, 2021

Privileged user accounts are significant targets for attacks as they have elevated permission, access to confidential data and the ability to change settings. And if compromised, the amount of damage to an organization can be disastrous. No wonder that this is on the mind of our chief information security officers. Join our CEO Berthold and Rob Edmondson, Technology Strategist at Thycotic in this conversation!

Interview
Accelerate your Identity's Digital Transformation
Apr 13, 2021

Join Martin with Jackson and TJ from Clear Skye as they talk about how Clear Skye accelerates your Identity's digital transformation.

Interview
When AI meets IoT: Does the Public Perception Reflect Reality?
Apr 29, 2021

The Internet of Things is everywhere around us. Almost every device we use is connected to the internet. But are they really smart or intelligent? An most important – what are we and will we be doing about their security?

Join Thom from SentinelOne and Alexei as they discuss what AI and IoT really are to learn how many IoT devices Alexei has at home and how long we have to wait until "The Terminator" will be al real thing.

Interview
The Interplay between Zero Trust and IAM
Nov 18, 2020

Martin Kuppinger and Danna Bethlehem, Director of Product Marketing at Thales discuss their perspectives on the interplay of Zero Trust and Identity and Access Management.

Interview
Continual Access Control, Policies and Zero Trust
Jan 04, 2023

Trust no one, always verify. We know that Zero Trust phrase already. But this principle is rather abstract - how and where exactly should we do that? Martin sits down with Jackson Shaw, Chief Strategy Officer at Clear Skye to discuss one very important part of Zero Trust: Identity and Access Management. Because you can only verify what or who you know - they need an identity to get access.

Video
Protection Against Multi-Vector DDoS and Bot Attacks
Aug 11, 2023

Join John Tolbert, Director of Cybersecurity Research at KuppingerCole, in this insightful episode featuring George Tarasov, Product Manager at Qrator Labs. Explore the world of multi-vector DDoS attacks and bot detection as they shed light on the increasing complexities and challenges faced by organizations. Learn about the evolution of multi-vector attacks, the rise of bad bots, and the strategies used by attackers to overwhelm target companies. Discover key insights and mitigation techniques to fortify your defenses against these sophisticated threats.

Interview
Dark Web Monitoring - CYFIRMA on an Undercover Mission
Jul 14, 2022

With CYFIRMA's products, you can take a look at your business through the eyes of a cybercriminal. But to know what they know, they need to take steps into the dark side of the World Wide Web. Osman interviews Kumar Ritesh from CYFIRMA about their work on the Dark Web.

Interview
How CYFIRMA Puts Threat Intelligence Into Practice
Jul 05, 2022

Do you know what information about your company is out there and can be used by cybercriminals? What are they interested in? Are they actually targeting your company and planning to exploit it? These are many questions that you may want to consider answering. After all, part of a good defense strategy is knowing your enemy. Kumar Ritesh wanted to solve this challenge and founded CYFIRMA to help others with a complete, comprehensive view, on one platform. Learn more about how they help you look through the eyes of cybercriminals.