In only one hour, you'll get practical knowledge on a topic of your choice! Gain quick insights and hands-on solutions for your business challenges. Each webinar is a combined presentation including an independent KuppingerCole Analyst and one of the industry's finest experts. The presentations are followed by a Q&A session where you can address individual business issues.
Upcoming Webinars
View past Webinars
Cloud Alphabet Soup - CNAPP
Feb 29, 2024 4:00pm CET, 10:00am EST, 7:00am PST
Organizations are using cloud services to develop and deploy new and existing applications. However, the responsibilities for security and compliance are shared between the CSP (Cloud Service Providers) and the cloud customer. The cloud user is responsible for implementing controls to meet their security and compliance obligations.
Supercharge Your Business with Cloud-Based Data Modernization
Mar 05, 2024 4:00pm CET, 10:00am EST, 7:00am PST
Data modernization is critical for businesses to remain competitive in today’s data-driven world, and while the cloud is an important enabler of data modernization, migrating sensitive data to the cloud is challenging. However, it is possible, with the right approach.
Road to EIC: Exploring the Power of Decentralized Identity Solutions
Mar 06, 2024 4:00pm CET, 10:00am EST, 7:00am PST
Decentralized Identity (DID) is pivotal in the digital era, offering a secure, privacy-centric identity solution. In contrast to traditional systems, which are centralized and prone to breaches, DID is built on blockchain technology. With DID, users have control over their data, reducing the risk of identity theft. Interoperability is enhanced, enabling secure authentication across platforms without a central authority. DID aligns with privacy regulations like the EU’s GDPR, emphasizing user consent and data control in a self-sovereign environment. As digital interactions surge,...
Proactive Cyber Defense with Intelligent SIEM Platforms
Mar 07, 2024 4:00pm CET, 11:00am ET, 8:00am PT
Security information and event management (SIEM) solutions have dominated the enterprise security market for nearly two decades, but due to high operating costs, a shortage of skilled security experts, and the rapid pace of change in the business IT and cyber threat environments, traditional SIEMs are no longer effective. A new generation of SIEMs has emerged.
Mastering CIAM: Advanced Techniques for Designing a Resilient CIAM Program
Mar 12, 2024 4:00pm CET, 10:00am EST, 7:00am PST
In today's digital landscape, mastering CIAM is crucial for IT professionals. Challenges like imperfect client touchpoints, high abandonment rates, and limited system insights hinder best practices. Join us to explore and overcome these hurdles, enhancing user experiences through strategic CIAM implementation. Explore advanced CIAM techniques in our webinar. From implementing best practices to deploying APIs for user insights, discover strategies to reduce abandonment rates. Unlock techniques for enhancing end-user engagement and revenue, supported by real-world testimonials. Learn to...
Unlocking Zero Trust Network Access
Mar 13, 2024 4:00pm CET, 10:00am EST, 7:00am PST
Zero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats. As a result, ZTNA solutions play a critical role in today's cybersecurity landscape by providing a holistic approach to secure access to business applications and resources regardless of user location. These solutions fundamentally align with the principles of Zero Trust, extending its influence across devices, networks, systems, applications, and data. This webinar provides a comprehensive overview of ZTNA solutions,...
Decentralized Identity – a Key to Reusing Identity for Improved Security and User Experiences
Mar 14, 2024 4:00pm CET, 10:00am EST, 7:00am
Decentralized identity has earned a place in identity management for its capacity to increase privacy and security, while improving the user experience. It is fundamental to creating a reusable verified identity which enables numerous use cases such as reusable KYC, proof of employment, remote onboarding and passwordless authentication.
Road to EIC: eIDAS 2.0 – The Way to "Trusted, Voluntary, and User-Controlled" Digital Identity
Mar 20, 2024 4:00pm CET, 10:00am EST, 7:00am PST
The regulation on electronic identification and trust services (eIDAS), is designed to increase trust and security in electronic transactions within the EU's internal market. One of eIDAS’ aims is to make it possible for individuals and businesses to use their own national e-Identification systems to access public services in other EU countries. EIDAS 2.o focuses on expanding the availability and usage of digital wallets, whereby member states provide citizens with secure and privacy-preserving digital wallets to manage digital credentials, aiming for 80% EU resident adoption by 2030.
IAM Meets Data Management: A Recipe for Peak Performance
Mar 21, 2024 4:00pm CET, 10:00am EST, 7:00am PST
In today's competitive landscape, organizations need to unlock the full potential of their data by ensuring the data management and identity and access Management (IAM) are tightly linked. However, this can be challenging due to factors such as disconnected data, inadequate tooling, and concerns about security and compliance risks. An integrated approach is essential. Join experts from KuppingerCole Analysts and IndyKite to explore real-world challenges and solutions, including the integration of data management and IAM. Discover how organizations can overcome obstacles to harnessing the...
Navigating Identity Security: Integrating SAP Into an Identity Fabric
Mar 26, 2024 8:00am PST, 11:00am EST, 4:00pm CET
SAP customers are shifting away from SAP Identity Management (IDM), which will no longer be supported after 2027, as they are adopting newer SAP solutions. They need to find effective ways of dealing with the technical challenges, while at the same time ensuring secure access control and management of digital identities. Join identity and security experts from KuppingerCole Analysts, One Identity, and SAP as they discuss the significance of and key considerations for integrating and complementing the SAP identity security model across various SAP solutions, including SAP Identity...
Road to EIC: Leveraging Reusable Identities in Your Organization
Apr 03, 2024 4:00pm CET, 10:00am EST, 7:00am PST
In the realm of customer onboarding, the prevailing challenges are manifold. Traditional methods entail redundant data collection and authentication hurdles, contributing to inefficiencies and frustrations for both customers and businesses. Moreover, siloed systems exacerbate the issue, leading to fragmented user experiences that impede smooth onboarding processes and hinder operational agility.
Modern IAM builds on Policy Based Access
Apr 04, 2024 4:00 PM - 5:00 PM CET
In this webinar, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the status and future of PBAM and the various types of solutions that are available in the market. He will look at the overall ratings for this market segment and provide concrete recommendations on how to best select the vendor, but also will discuss strategic approaches for PBAM.
Navigating Security Silos: Identity as a New Security Perimeter
Apr 09, 2024 4:00pm CEST, 11:00am EDT, 8:00am PDT
Companies are grappling with countless challenges in the realm of identity security. These challenges range from dealing with the dynamic nature of identities, the rise of insider threats, the ever-evolving threat landscapes, handling the complexity of identity ecosystems to insufficient visibility into identity posture. This webinar explores the fundamental role of Identity Threat Detection & Response (ITDR) and Identity Security Posture Management in fortifying defenses against these challenges.
The Right Foundation for Your Identity Fabric
Apr 15, 2024 4:00 PM - 5:00 PM CET
In this webinar, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the status and future of Identity Fabrics, on what to consider when defining the own approach for an Identity Fabric, and how the vendor landscape looks like. He will discuss different approaches, from unified solutions to integrating / orchestrating different best-of-breed solutions. He also will look at the best approach for defining your own Identity Fabric.