KC for CIOs / CISOs

Expertise & market knowledge in all relevant decision-making processes

KC for IT Professionals

Learn more how we can support you in the definition of future IT strategies

KC for Vendors

Sell-side and business-side advisory, research syndication and events

KC for Integrators

Take advantage of our Networking and Advisory Opportunities to be one step ahead

KC for CIOs / CISOs

Expertise & market knowledge in all relevant decision-making processes

KC for IT Professionals

Learn more how we can support you in the definition of future IT strategies

KC for Vendors

Sell-side and business-side advisory, research syndication and events

KC for Integrators

Take advantage of our Networking and Advisory Opportunities to be one step ahead

KuppingerCole - Research, Upcoming Webinars and Events

Consumer Identity World Tour 2018

Conference

Consumer Identity World Tour 2018

Cybersecurity Leadership Summit Tour

Conference

Cybersecurity Leadership Summit Tour

Cyber Access Summit 2018

Conference

Cyber Access Summit 2018

Security and Governance in the Hybrid Multi-Cloud

Webinar

Security and Governance in the Hybrid Multi-Cloud

Most organizations now use multiple cloud services as well as retaining some IT services on-premises, this multi-cloud hybrid environment creates many challenges for security and governance.

Executive View: Senrio Insight - 72525

Executive View

Executive View: Senrio Insight - 72525

Senrio Insight is an Industrial IoT cybersecurity platform utilizing passive nonintrusive network device discovery to provide visibility and analytics of industrial device behavior and rapid detection of abnormal activities.  

Welcome to the European Identity & Cloud Conference 2019

Webcast

Welcome to the European Identity & Cloud Conference 2019

Learn all you need to know about the future of information security today!

Cybersecurity Innovation Night

Innovation Slam

Cybersecurity Innovation Night

Every year the number of cyber attacks is increasing. The types of targets include just about everyone, ranging from Fortune 500 companies, small and medium-sized businesses, critical infrastructure, and government agencies. Cyber-attacks are becoming more sophisticated as well as growing in frequency. Up to a million new malware variants are created every day. Each new threat group can be significantly different from previous ones and can be used in damaging attacks around the world. The Cybersecurity Innovation Night will focus on cutting-edge approaches and advanced solutions in...

About KuppingerCole

Our Capabilities

KuppingerCole’s values are expertise, thought leadership, neutrality and outstanding practical relevance.

Our People

KuppingerCole’s highly qualified and globally recognized analysts continuously research and update KuppingerCole online research library, and perform manufacturer-independent advisory services.

Our Methodologies

Proven approach of KuppingerCole focuses on lean, efficient projects, with a structured methodology based on ongoing research, publications, and thought-leading deep knowledge of our analysts.

Our Experience

A large number of KuppingerCole’s existing reports and a significant number of new reports published every year ensures that you can always access up-to-date information you need for your decisions.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Stay Connected

Blog

Blog

Decentralized Identity 101: What It Is and Why It Matters

Guest Author: Vinny Lingham, CEO, Civic Technologies Bitcoin. Blockchain. Crypto. Decentralization. Tokens. A lot of buzzwords have emerged alongside the rise of blockchain technology. Yet, there is often a lack of context about what those terms actually mean and the impact they will have. [...]

Spotlight

Compliance, Risk & Security Learn more

Compliance, Risk & Security

Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical, qualitative and infrastructural conditions of the services provided. Therefore, it is difficult to meet all compliance requirements, particularly within the fields of data protection and data security. The decisive factors are transparency, controllability and influenceability of the service provider and his [...]

Latest Insights

Welcome to KuppingerCole

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00