Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Mehr Widerstandsfähigkeit gegen Cyberangriffe: Das Automatisierte SOC
Cybersicherheit ist zu einer zentralen Herausforderung für jedes Unternehmen geworden. Die Widerstandsfähigkeit, also die Cyber Resilience, ist inzwischen elementar für die Überlebensfähigkeit von...
Learn more
Blog
Blog
Staying Ahead in the Innovation Race
Composable Enterprise, Privacy-by-Design, Zero Trust... the direction your organization chooses to innovate in will have an influence on its investment decisions. Find inspiration, to stay ahead in...
Learn more
Leadership Brief
Leadership Brief
EU NIS2 Directive
Every organization needs to take steps to ensure their cyber resilience and this updated directive provides a useful framework for this. This report provides a summary of the technical obligations...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #71: Cybercriminal Behavior in the COVID Era
While the world tries to cope up with the on-going pandemic, cybercriminals have got their hands on a gold mine. Annie and Matthias sit down again to chat about the overall picture of...
Learn more
Debunking Common Myths about XDR
Webinar Recording
Debunking Common Myths about XDR
Join security experts from KuppingerCole Analysts and SentinelOne to help you get an understanding of what eXtended Detection & Response (XDR) really is, and why you should consider this...
KC Open Select: Your #1 Shortlisting Tool
Video
KC Open Select: Your #1 Shortlisting Tool
Discover and Compare Cybersecurity Solutions for Free Optimize your decision-making process with the most comprehensive and up-to-date market data available. Configure your individual...
Analyst Chat #154: 2022 Wrapped Up - Major Trends in IAM and Cybersecurity
Analyst Chat
Analyst Chat #154: 2022 Wrapped Up - Major Trends in IAM and Cybersecurity
Another year gone already! It's time to take a look back at 2022. Martin Kuppinger and Matthias talk about what happened in the past year and identify top trends in IAM and Cybersecurity....
Recap Cybersecurity Leadership Summit 2022
Video
Recap Cybersecurity Leadership Summit 2022
Key Findings on Malign Information, Misinformation, and Cyberattacks
Interview
Key Findings on Malign Information, Misinformation, and Cyberattacks
Ksenia Iliuk, Head of Research at Detector Media, Ukraine tells us about some key findings of their research in the media landscape of Ukraine. Find out what she has to say about Telegram and what...
Making Passwordless Authentication a Reality: The Hitchhiker’s Guide
Webinar Recording
Making Passwordless Authentication a Reality: The Hitchhiker’s Guide
In this webinar, Bojan Simic, founder and CEO at HYPR, and Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, share their insights and experience on what to consider when moving...
Analyst Chat #149: The Top 5 Cybersecurity Trends - Looking Back at CSLS 2022
Analyst Chat
Analyst Chat #149: The Top 5 Cybersecurity Trends - Looking Back at CSLS 2022
Deep Fakes, AI as friend and foe, Business Resilience, Mis-, Dis- and Malinformation: The Cybersecurity Leadership Summit has taken place in Berlin and covered all of this and much more. Martin...
How the Current Crisis could become a Catalyst for Various Transformations
Event Recording
How the Current Crisis could become a Catalyst for Various Transformations
Panel | Cyber Hygiene Best Practices: Why Does It Matter?
Event Recording
Panel | Cyber Hygiene Best Practices: Why Does It Matter?
Security of users, data, devices and networks is orchestrated via a set of precautionary cyber measures called  cyber hygiene.  Enterprises today deal wih a sheer volume users, data and...
Continuous Zero Trust Transformation using a Value and Risk Driven Approach
Event Recording
Continuous Zero Trust Transformation using a Value and Risk Driven Approach
For big companies like Mercedes, there is no generic zero trust implementation to deliver the values for customer, workforce, suppliers and logistics.  It is unlikely to have a greenfield...
1 2 3 4 5 6 7 Next