Syteca 7.21 is live — Real-time data masking, agentless access & more
Every Interaction Secured
Every Action Visible
Real-time data masking, agentless access, modern design, and beyond.
Get inspired by how Syteca’s extensive capabilities can cover your use case.
Download “How to build Insider Threat Program in 10 Steps” white paper and enhance your insider risk management strategy through concrete actions.
Assist your customers in building secure and reliable IT infrastructures
Defining a PAM policy is a critical step toward secure and compliant privileged access governance. This template gives you a complete foundation so you can establish strong controls without starting from scratch.
The template is fully customizable, helping you save time, reduce compliance risks, and enforce consistent privileged access practices across your organization.
LinkedIn Profile
KuppingerCole Profile
Paul Fisher is a Former Lead Analyst at KuppingerCole, where he specializes in cybersecurity with a focus on Identity & Access Management (IAM) and Privileged Access Management (PAM). His research also covers emerging areas such as AI, IoT, and data governance across multiple industries, including automotive.
Before becoming an analyst, Paul built his career in technology journalism. He held senior editorial roles at major UK publications and collaborated with companies such as IBM, HP Enterprise Security Services, and Sky UK, advising on security communications and strategy.
At KuppingerCole, Paul leads quantitative research initiatives and regularly publishes reports, whitepapers, and market analyses for decision-makers. He is also a frequent speaker at international conferences, sharing insights on access security, identity management, and zero trust architectures.
Share: