Article No. / Date
Articles
wp80419de

Whitepaper

Geistiges Eigentum schützen und gleichzeitig geschäftliche A...

Viele Branchen, insbesondere diejenigen, die einerseits zusammenarbeiten und Informationen austauschen und andererseits mit streng vertraulichen Informationen und staatlicher Wirts...

wp80419

Whitepaper

Protecting Intellectual Properties while enabling business a...

Many industries, specifically the ones that on one hand must collaborate and share information and on the other hand have to deal with highly sensitive information and state-run in...

ab72551

Architecture Blueprint

Architecting your Security Operations Centre

A security operations centre (SOC) is a dedicated team, usually operating 24x365, to detect and respond to cybersecurity incidents within your organisation that potentially affect...

lb72583

Leadership Brief

Working for the Business, not the Auditors

Forward-thinking companies no longer see cybersecurity, governance, compliance and privacy as something they are just forced to do. Instead, a comprehensive alignment with applicab...

ev80420

Executive View

R&S®Trusted Gate - Secure Glocalization by Rohde & Schwarz...

Rohde & Schwarz Cybersecurity offers reliable management of regulated and sensitive information to promote compliant collaboration and file sharing in unified SharePoint platforms...

ev80141

Executive View

ManageEngine Log360

Log360 from ManageEngine is a tightly integrated suite of log management and network security analytics tools. Complementing SIEM capabilities with EDR, DLP, and even SOAR function...

lb80344

Leadership Brief

Incident Response Management

The probability of becoming a victim of a data breach is now higher than ever. The hyperconnected world and the ever-increasing complexity of modern IT systems and processes pose n...

ev80331

Executive View

Symantec Privileged Access Manager

Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and c...

lb80370

Leadership Brief

Introduction to the Information Protection Life Cycle and Fr...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

ev80001

Executive View

Exabeam Security Management Platform

Exabeam is a highly modular platform for collecting, storing, managing and correlating security events across multiple IT systems, both on-premises and in the cloud, with integrate...

lb80008

Leadership Brief

Find Your Route from SIEM to SIP and SOAR

Security Information and Event Management (SIEM) platforms have been a key part of many enterprises’ cybersecurity infrastructures for over a decade. However, facing the growing nu...

an70361

Advisory Note

Business Continuity in the age of Cyber Attacks

Business continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organizations to alter...

lb80502

Leadership Brief

Cybersecurity Trends & Challenges 2020

2019 already has been a challenging year in cybersecurity. There have (again) been many severe cyberattacks and breaches, and there is no hope that this might change in 2020. Cyber...

an80239

Advisory Note

KRIs and KPI for Cyber Security

This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the...

lb80336

Leadership Brief

Top Ten Trends in Cybersecurity

This report outlines 10 important trends and technologies in cybersecurity that KuppingerCole believes will shape security policies and solutions choice for organisations in the ye...

ev80172

Executive View

IBM Cloud Pak for Security

IBM Cloud Pak for Security is an innovative solution that can run in a variety of deployment models that supports security analytics and incident response for today’s complex, hybr...

ev80074

Executive View

One Identity Safeguard Suite

Privileged Access Management (PAM) has evolved into a set of crucial technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital...

lb70359

Leadership Brief

Penetration Testing Done Right

Penetration Testing should be a key part of any business's assurance process, providing a level on independent testing that they are not wide open to hackers or other malicious act...

lb80303

Leadership Brief

PSD2: New business opportunities and risks

The Revised Payment Service Directive (PSD2) Regulatory Technical Specifications (RTS) take effect this autumn across the EU. The directive will provide new benefits and rights for...

ev79035

Executive View

Securonix Cloud SIEM and UEBA

Securonix Cloud is a next-generation security intelligence platform that provides comprehensive security information and event management, as well as user and entity behavior analy...

ev72505

Executive View

Zscaler Security-as-a-Service Platform

Zscaler is the world’s largest multi-tenant distributed cloud security platform that delivers a broad range of services without any on-premises hardware or software agents, includi...

ev72525

Executive View

Senrio Insight

Senrio Insight is an Industrial IoT cybersecurity platform utilizing passive non-intrusive network device discovery to provide visibility and analytics of industrial device behavio...

wp79028

Whitepaper

Wertvolle Daten kennen, schützen und besser nutzen – die Cha...

Neue Regulierungen wie die Datenschutz-Grundverordnung (DSGVO) und die stetig wachsende Gefahr durch Cyber-Attacken führen zu einem hohen Druck auf Unternehmen. Es gibt aber auch C...

ev70366

Executive View

StealthDEFEND®

Cyber-attacks often involve a complex process, including an insider threat element, which exploits compromised or illicit user credentials to gain access to data. StealthDEFEND i...

ev71314

Executive View

Micro Focus Privileged Account Manager

With massive data breaches in the headlines and increased regulatory scrutiny of failures to implement effective cybersecurity controls, enterprise management of privileged user ac...

ev72510

Executive View

ERPScan Smart Cybersecurity Platform for SAP

ERPScan Smart Cybersecurity Platform for SAP is an Al-driven enterprise level solution for SAP security that leverages machine learning. By addressing predictive, preventive, detec...

ev70262

Executive View

AlgoSec Security Management Suite

AlgoSec Security Management Suite is a highly automated and business-focused integrated solution for managing network security policies and business application connectivity across...

wp70360

Whitepaper

Moving towards a holistic Cyber Risk Governance approach

The ongoing task of maintaining cyber security and risk governance, while providing evidence and communicating efficiently with corporate stakeholders is getting increasingly more...

an72599

Buyer's Compass

Buyer’s Guide: Ransomware Protection

Ransomware is a global cybersecurity threat. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for s...

an70947

Advisory Note

Understanding and Countering Ransomware

Ransomware is a top security threat and continuously on the rise. Financial organizations, healthcare institutions, and manufacturing industries are the most vulnerable groups; how...

lb70268

Leadership Brief

Lösungen für die Personalknappheit in Ihrem Cyber Defense Ce...

Ausreichend und gut qualifiertes Personal für ihr Cyber Defense Center (oder den IT-Sicherheitsbereich) zu finden ist schwierig. Die Antwort auf die Personalknappheit besteht aus d...

lb72800

Leadership Brief

How to close the skill gap in your Cyber Defense Center

Getting sufficient and sufficiently skilled people for your Cyber Defense Center (or your IT Security department) is tough. The answer to the skill gaps consists of three elements:...

ev72541

Executive View

Microsoft Enterprise Mobility + Security Suite

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecur...

ev71554

Executive View

Microsoft Advanced Threat Analytics

Microsoft Advanced Threat Analytics combines deep packet inspection with Active Directory and SIEM integration to build an Organizational Security Graph and identify suspicious use...

an71603

Advisory Note

Blockchains and Cybersecurity: Augmenting Trust with Algori...

From trusted third parties to algorithmic consensus: new cybersecurity opportunities and challenges with blockchains. Blockchains can provide distributed and decentralised improvem...

ev71571

Executive View

Balabit syslog-ng

The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the st...

top