12 past events found
Back to Search Begin New Search Save Search Auto-Notify
Enterprise Blockchain Day
Navigating the Enterprise Blockchain Landscape Blockchain technology has been touted as the ‘solution’ to every problem, yet few enterprises have effectively deployed the technology. The Enterprise Blockchain Day aims to stimulate conversations that matter - reflecting the spectrum of views in the domain. Register now as CTOs and Blockchain Leads at leading organizations come together to bridge the gap between the physical and digi...
October 13, 2021
Organizer: KuppingerCole
Location: Virtual
Add Favorite
Enabling Zero Trust With Dynamic Author...
Increased global competition is driving businesses to adopt new technologies to enhance existing processes and enable new business models, new revenue streams, and greater interactions with partners and customers through Digital Transformation. Service-based business IT, however, is not without challenges, particularly around access governance and control, which can reduce business agility and velocity. The adoption of API driven digital servi...
February 4, 2021
Organizer: KuppingerCole
Location: Webcast
Add Favorite
The Evolution of Access Control
The purpose of an identity management system is to support access control to an organization’s sensitive systems and protected resources. Contemporary access control has progressed from static entitlements, still used in many organisations. Not only manual interventions are necessary to change roles, also provisioning, reconciliation, recertification and auditing are laborious tasks, which complicate each business process. Th...
January 26, 2021
Organizer: KuppingerCole
Location: Webcast
Add Favorite
Accelerating Your Digital Transformatio...
The use of cloud services is one of the key enablers of digital transformation - accelerating time to value, providing more access to powerful IT resources in a more cost-effective manner and removing the management costs associated with commodity services. However, these benefits come with some risks. Migrating your business applications to the cloud without creating security vulnerabilities, unnecessary risks to your data and ensuring compli...
January 20, 2021
Organizer: KuppingerCole
Location: Virtual
Add Favorite
Effective Endpoint Security With Automa...
The realization that cyber-attacks are inevitable has led the cybersecurity industry to shift some of its focus to detection and response rather than prevention in recent years. Therefore, the market for solutions designed to detect attacks on endpoints and respond accordingly has grown significantly. These Endpoint Detection & Response (EDR) solutions look for evidence and effects of malware that may have slipped past Endpoint Protection...
January 14, 2021
Organizer: KuppingerCole
Location: Webcast
Add Favorite
Making Zero Trust Work With the NIST Fr...
How to Overcome Challenges in Implementing Zero Trust in Your Existing IT Environment There’s lots of hype around Zero Trust Security in the context of our changing mobile and cloud-centric working environments. Moving towards a modern and agile Zero Trust security concept is essential in today's mobile first, work-securely-from-anywhere world. Implementing Zero Trust with consistent security policies is tough when applied across all app...
December 16, 2020
Organizer: KuppingerCole
Location: Webcast
Add Favorite
Entering the Virtual World With Identit...
The way consumers access products and services across sectors has changed forever as interactions move from physical to digital engagement. What started as a change born from convenience, is now a necessity and solidifying into a long-term behavioural shift. As consumers choose to access more goods and services digitally than ever before, it is essential that organisations meet users’ expectations of instant and convenient transactions,...
December 15, 2020
Organizer: KuppingerCole
Location: Webcast
Add Favorite
There Is No Successful Digital Transfor...
2020 will go down in history as the year in which many companies gave their stagnating digital transformation initiatives a big new push. Due to the pandemic, organizations were forced to rapidly scale up their remote working facilities, secure employee-owned devices (Bring Your Own Devices (BYODs) , and maintain a secure environment for enterprise and customer identities . However, when it comes to their identity architecture, the picture is...
December 3, 2020
Organizer: KuppingerCole
Location: Webcast
Add Favorite
Privacy Compliance That Empowers Instea...
Protecting user privacy has become much more complicated as of late. Organizations must optimize consent rates while ensuring compliance with ever-changing global regulations and frameworks. They must look critically at their own processes to identify gaps or failures to meet privacy regulations. And organizations must find ways to effectively manage consumer requests, meticulously document processing activities and data transfers, and stay on...
November 19, 2020
Organizer: KuppingerCole
Location: Webcast
Add Favorite
Cybersecurity Leadership Summit 2020
*CET Time Zone In our highly digitalized world, cybersecurity is more important than ever before. To be at the forefront of digital and technological advancements and remain secure, you must be prepared for future threats. An outstanding line-up of international speakers and KuppingerCole analysts will equip you with critical knowledge on emerging trends in cybercrime and cybersecurity at this year’s Cybersecurity Leadership Summit from...
November 9-11, 2020
Organizer: KuppingerCole
Location: Virtual
Add Favorite
Back to Search Begin New Search