Insights

Cloud Security

As more and more organizations use cloud services cyber security and compliance has taken center stage. The benefits of using the cloud for business-critical applications can be undermined if this leads to cyber-attacks, data breaches and compliance failure.

Guide
Guide
Stairway to Cloud Security
Read the complete step-by-step guide to help you make the right decisions to minimize risk and achieve high cloud security.
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join the iconic identity community from June 4 - 7, 2024 in Berlin, Germany! Get the Prime Discount and register for 1,000 EUR!
Learn more
Blog
Blog
How Does Using Cloud Services Alter Risk
I am often asked “does using a cloud service alter risk?” I always reply to this question with “well it depends”. Every organization has its own set of circumstances, and the answer needs to take...
Learn more
Executive View
Executive View
Britive
This Executive View report examines cloud entitlement management challenges companies face. It also provides a concise analysis of the Britive platform that enables cloud-first security best...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #84: Hybrid IT 3 - Managing and Governing
Part three of the four-part series on hybrid IT looks at approaches to appropriately manage and evolve hybrid architectures. Mike Small and Matthias put the focus not only on technical...
Learn more
Achieving Security and Compliance Across Hybrid Multi-Cloud Environments
Webinar Recording
Achieving Security and Compliance Across Hybrid Multi-Cloud Environments
Join security experts from KuppingerCole Analysts and IBM as they discuss the challenges of achieving security and compliance across hybrid multi-cloud environments, and potential solutions, that...
AWS Announces EU Sovereign Cloud
Blog
AWS Announces EU Sovereign Cloud
On October 25th, 2023, AWS announced their intention to launch AWS European Sovereign Cloud. This is an important announcement which reflects the impact of EU GDPR regulation and the EU recent...
Cloud Security Early Warning Systems: From CSPM to CNAPP
Webinar Recording
Cloud Security Early Warning Systems: From CSPM to CNAPP
Cloud computing delivers the benefits of accelerated development without the hardware costs. But the dynamic nature of cloud services and the proprietary security features offered by different...
Cloud Security Alphabet Soup
Blog
Cloud Security Alphabet Soup
Is securing your cloud security different from securing other forms of IT? You would think so from the alphabet soup of acronyms around the subject.
Analyst Chat #192: Exploring Cloud Security Posture Management (CSPM)
Analyst Chat
Analyst Chat #192: Exploring Cloud Security Posture Management (CSPM)
Join Matthias Reinwarth and Senior Analyst Mike Small in a quick chat on the evolution of Cloud Security Posture Management (CSPM). They discuss its proactive approach, the challenges in...
Using Data Security Platforms in a Modern, Hybrid World
Webinar Recording
Using Data Security Platforms in a Modern, Hybrid World
Join security experts from KuppingerCole Analysts and Imperva as they discuss the challenges of protecting data distributed across hybrid IT environments, and look at what technologies and...
Cloud Security Posture Management
Leadership Compass
Cloud Security Posture Management
This report provides an overview of the CSPM (Cloud Security Posture Management) market and a compass to help you find a solution that best meets your needs. It examines solutions that provide a...
Britive
Executive View
Britive
This Executive View report examines cloud entitlement management challenges companies face. It also provides a concise analysis of the Britive platform that enables cloud-first security best...
How to Manage Complex Clouds Based on Cyber Resistance
Event Recording
How to Manage Complex Clouds Based on Cyber Resistance
You have probably heard about Cyber Resilience, and how about Cyber Resistance? What should be the differences between the two terms in the context of Cybersecurity? Cyber Resistance is the same...
Covering Your Customer Identity Needs - The Way Forward
Event Recording
Covering Your Customer Identity Needs - The Way Forward
The Art of CIAM is to converge user Experience (UX) , security and privacy in a way  that is seamless and unobtrusive for the user. In this panel session we will discuss the role of...
1 2 3 4 5 6 7 Next