Webinar Recording

Unlock the Potential of Passwordless Authentication

Show description
Speakers
Alejandro Leal
Research Analyst
KuppingerCole
Alejandro Leal
Alejandro joined KuppingerCole as a Research Analyst in December 2021. His main areas of expertise include digital transformation in the public and private sector, managing business in today’s geopolitical context, and governance in artificial intelligence and cyberspace. Background...
View profile
Christie Pugh
Product Manager
KuppingerCole Analysts AG
Christie Pugh
Christie joined KuppingerCole in December 2022 as the Digital Products Manager. She is passionate about setting her colleagues, partners, and customers up for success by providing them with the tools necessary to define, execute and achieve their goals. Located in Berlin, she came to...
View profile
Lead Sponsor
KuppingerCole Analysts AG
Playlist
KuppingerCole Webinars
Webinar Recording
Fight Fraud With Fraud Reduction Intelligence Platforms (FRIP)
In today's digital landscape, businesses face an increasing threat of fraud that can lead to significant financial losses and damage to their reputation. To effectively combat fraud, businesses need Fraud Reduction Intelligence Platforms (FRIPs). These advanced technologies leverage multiple data sources, data analytics, and ML detection models to proactively detect and prevent fraudulent activities in real-time. FRIPs empower organizations to stay ahead of fraudsters by uncovering hidden patterns, identifying anomalies, and generating alerts. By implementing FRIPs, businesses can mitigate risks, reduce false positives, and safeguard their financial well-being and brand image. Stay one step ahead of fraud with FRIPs and ensure a secure future for your business.
Webinar Recording
Evolving Identity and Access Management for the Digital Era
Businesses are undergoing digital transformations and adopting new technologies to become as flexible and agile as possible to remain competitive. But ensuring that only authorized entities have access to critical business data and applications is essential. Modern IT demands modern IAM that supports cloud adoption and business process optimization.
Webinar Recording
The Business Value of Cloud-Based Identity Security
Identity Governance and Administration (IGA) is crucial for security and compliance. But legacy IGA systems are costly and time consuming to maintain, and most companies are looking to improve identity security, lower costs, and tap into AI-driven automation. Many are considering migrating to the cloud, but don’t know if that’s right or where to begin.
Webinar Recording
Cloud Security Early Warning Systems: From CSPM to CNAPP
Cloud computing delivers the benefits of accelerated development without the hardware costs. But the dynamic nature of cloud services and the proprietary security features offered by different cloud service providers make it challenging for customers to manage the risks and to be sure they are meeting security and compliance obligations. Most organizations need some form of guardrails.
Webinar Recording
Optimize Security With Security Orchestration, Automation, & Response
Business IT environments are getting increasing complex and cyber criminals are rapidly adapting to exploit the growing attack surface. While most organizations have invested in security controls, many are struggling to respond quickly and efficiently to attacks. Finding the right solution to coordinate and automate incident response and forensic analysis is crucial.
Webinar Recording
Beyond Just SAP: The Need for Cross-LoB Access Controls
The market for solutions that support in application access control, application risk management, and SoD (Segregation of Duties) management in a heterogeneous LoB (Line of Business) applications landscape is changing. Most organizations already have a hybrid, multi-vendor LoB landscape, consisting of solutions ranging from SAP ECC to SAP S/4HANA, SAP SaaS applications, and other vendors’ (Oracle, Salesforce, Workday,…) LoB applications.
Webinar Recording
Digital Transformation in Financial Services Using Biometrics
High-value, high-risk transactions that used to be in-person only, have moved online as part of the accelerated digital transformation of financial services providers in the wake of the pandemic. But delivering high levels of identity verification is challenging, leading to the adoption of new methods.
Webinar Recording
The Evolution of Secure Access in Critical Infrastructure
Cyberattacks are putting increased pressure on all organizations, especially those running operational technology (OT), industrial control systems (ICS), and critical infrastructure systems (CIS) with high availability requirements. Secure remote access (SRA) for the maintenance of such systems is critical, but challenging.
Webinar Recording
Using Data Security Platforms in a Modern, Hybrid World
Data is the lifeblood of any modern business organization. It is therefore critical to maintain data security and integrity by protecting it appropriately depending on what the data is, what it is used for, who is accessing it, and how it is used. But implementing consistent and comprehensive data protection across an enterprise, on premises and in the cloud, can be challenging.
Webinar Recording
Welcome to the Pamocracy!
As the business world embraces cloud, continuous infrastructure development and a revolution in software procurement and deployment, what was once confined to the few is now open to many. We are talking of course about privileged access which has spread from traditional IT roles into the embrace of regular employees, third party users and millions and millions of non-human identities!