Research

Executive View

KuppingerCole’s Executive View is a short report with four to five pages written by one of KC’s Analysts about a specific client product. In an Executive View an analyst describes the product in a concise manner and shows its strengths and challenges to give end users a short expert reference.
CYFIRMA DeCYFIR
Executive View
CYFIRMA DeCYFIR
Reactive security measures respond to cyberattacks that have already happened. While cybersecurity spending is increasing, cyberattacks are also becoming more frequent. To mitigate risks and...
Malwarebytes Nebula and Incident Response
Executive View
Malwarebytes Nebula and Incident Response
Organizations and individuals are constantly under threat by malware. Malware variants evolve and proliferate daily, making it increasingly difficult to prevent infections, compromises, and...
WSO2 Choreo
Executive View
WSO2 Choreo
WSO2 Choreo is a cloud-based fully managed integrated solution for developing, publishing, managing, monitoring, and productizing APIs. Based on a unique pro-code/low-code Ballerina programming...
ZertID from Sysintegra
Executive View
ZertID from Sysintegra
Sysintegra ZertID is an IGA solution that is built on top of the ServiceNow platform. It integrates natively with ServiceNow features such as the CMDB and Security Incident handling. By utilizing...
Arcserve Unified Data Resilience
Executive View
Arcserve Unified Data Resilience
Data resilience solutions are an essential element of business continuity plans and, as organizations go through digital transformation and become more dependent upon their IT services, the need...
Microsoft Entra Permissions Management
Executive View
Microsoft Entra Permissions Management
As organizations adopt multi cloud infrastructures to support business workflows involving user and workload identities it's increasingly difficult to know who has access to what data across which...
ARCON Endpoint Privilege Management
Executive View
ARCON Endpoint Privilege Management
The number of privileged requests made from endpoints has increased significantly in recent years, and more so since the pandemic. Those with traditional privileged access may now be working from...
Beyond Identity Secure Customers
Executive View
Beyond Identity Secure Customers
Password authentication is not only insecure, but it leads to poor consumer experiences and is costly for organizations to maintain. As far as customer authentication is concerned, there are three...
BehavioSec™, a LexisNexis® Risk Solutions Company
Executive View
BehavioSec™, a LexisNexis® Risk Solutions Company
BehavioSec™, a LexisNexis® Risk Solutions Company, ist ein Anbieter von Lösungen für die Erkennung von Angriffs- und Betrugsrisiken bei der Authentifizierung (Fraud Reduction). Die...
HYPR Passwordless and Phishing-resistant Authentication
Executive View
HYPR Passwordless and Phishing-resistant Authentication
Die passwortlose Authentifizierung wird zum neuen Standard. Benutzer müssen keine lästigen Passwörter mehr verwenden und die mit Passwörtern verbundenen Sicherheitsrisiken werden umgangen....
Oracle Security Zones
Executive View
Oracle Security Zones
Poorly managed security controls within a cloud services tenant’s resources are increasingly the cause of security incidents and compliance failures. Today’s dynamic infrastructure and development...
Keeper Enterprise
Executive View
Keeper Enterprise
Die Verwaltung von Passwörtern ist und bleibt eine wichtige Anforderung für Benutzer und Unternehmen, da Passwörter immer noch allgegenwärtig sind und damit weiterhin ein großes Sicherheitsrisiko...
Previous
1 2 3 4 5 6 7 Next