Article No. / Date
Articles
lb80303

Leadership Brief

PSD2: New business opportunities and risks

The Revised Payment Service Directive (PSD2) Regulatory Technical Specifications (RTS) take effect this autumn across the EU. The directive will provide new benefits and rights for...

lb72573

Leadership Brief

How to get a Grip on OT Cybersecurity

With the increasing demand for more connectivity, Operational Technology (OT) organizations will need to become more interconnected with IT over time. The convergence of IT and OT...

lb80296

Leadership Brief

Do I need Network Threat Detection & Response (NDTR)?

NTDR products/services are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? We’ll look at what NTDR products do, reason...

lb80186

Leadership Brief

The Differences Between Endpoint Protection (EPP) and Endpoi...

Endpoint Detection & Response products are capturing a lot of mindshare in cybersecurity. But how do they differ from the more standard Endpoint Protection products? We’ll look at...

lb80187

Leadership Brief

Do I Need Endpoint Detection & Response (EDR)?

EDR products are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? If so, do you have the expertise in-house to properly...

an80110

Advisory Note / Buyer's Guide

Buyer's Compass: Endpoint Protection

Malware remains a global cybersecurity threat. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements f...

ev79074

Executive View

Exostar Supplier Risk Management

Exostar Supplier Risk Management delivers advanced capabilities for identifying and managing risk and compliance with cybersecurity and other best practices and standards, along th...

lb70278

Leadership Brief

Artificial Intelligence in Cybersecurity

Artificial Intelligence remains the hottest buzzword in almost every segment of the IT industry nowadays, and not without reason. The very idea of teaching a machine to mimic the w...

ev80036de

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Verlässliche Kontrolle und Monitoring sensibler Informationen, die in öffentlichen Clouds und Kollaborationstools (Microsoft SharePoint, Office 365) gespeichert sind, durch Virtual...

lc79014

Leadership Compass

Privileged Access Management

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Con...

wp80037

Whitepaper

PATECCO Privileged Access Management Services

Privilege Management is the set of critical cybersecurity controls that deal with the management of security risks associated with privileged access in an organization. Maintaining...

ev80036

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (SharePoint, Office 365) through virtualization, encryption and fragmentati...

lc71147

Leadership Compass

Access Management and Federation

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Web Access Management and Identity Federation on-premises platforms....

ev72505

Executive View

Zscaler Security-as-a-Service Platform

Zscaler is the world’s largest multi-tenant distributed cloud security platform that delivers a broad range of services without any on-premises hardware or software agents, includi...

ev70362

Executive View

TechDemocracy Intellicta

A software platform designed to achieve a holistic assessment of an organization’s cybersecurity, compliance, risk and governance status by establishing risk governance, resilience...

ev72525

Executive View

Senrio Insight

Senrio Insight is an Industrial IoT cybersecurity platform utilizing passive non-intrusive network device discovery to provide visibility and analytics of industrial device behavio...

wp79028

Whitepaper

Wertvolle Daten kennen, schützen und besser nutzen – die Cha...

Neue Regulierungen wie die Datenschutz-Grundverordnung (DSGVO) und die stetig wachsende Gefahr durch Cyber-Attacken führen zu einem hohen Druck auf Unternehmen. Es gibt aber auch C...

ev70366

Executive View

StealthDEFEND®

Cyber-attacks often involve a complex process, including an insider threat element, which exploits compromised or illicit user credentials to gain access to data. StealthDEFEND i...

ev71314

Executive View

Micro Focus Privileged Account Manager

With massive data breaches in the headlines and increased regulatory scrutiny of failures to implement effective cybersecurity controls, enterprise management of privileged user ac...

ev72510

Executive View

ERPScan Smart Cybersecurity Platform for SAP

ERPScan Smart Cybersecurity Platform for SAP is an Al-driven enterprise level solution for SAP security that leverages machine learning. By addressing predictive, preventive, detec...

ev70262

Executive View

AlgoSec Security Management Suite

AlgoSec Security Management Suite is a highly automated and business-focused integrated solution for managing network security policies and business application connectivity across...

top