KC for CIOs / CISOs

Expertise & market knowledge in all relevant decision-making processes

KC for IT Professionals

Learn more how we can support you in the definition of future IT strategies

KC for Vendors

Sell-side and business-side advisory, research syndication and events

KC for Integrators

Take advantage of our Networking and Advisory Opportunities to be one step ahead

KC for CIOs / CISOs

Expertise & market knowledge in all relevant decision-making processes

KC for IT Professionals

Learn more how we can support you in the definition of future IT strategies

KC for Vendors

Sell-side and business-side advisory, research syndication and events

KC for Integrators

Take advantage of our Networking and Advisory Opportunities to be one step ahead

KuppingerCole - Research, Upcoming Webinars and Events

Consumer Identity World Tour 2018

Conference

Consumer Identity World Tour 2018

Cybersecurity Leadership Summit Tour

Conference

Cybersecurity Leadership Summit Tour

Security and Governance in the Hybrid Multi-Cloud

Webinar

Security and Governance in the Hybrid Multi-Cloud

Most organizations now use multiple cloud services as well as retaining some IT services on-premises, this multi-cloud hybrid environment creates many challenges for security and governance.

Executive View: Deep Secure Content Threat Removal Platform - 79056

Executive View

Executive View: Deep Secure Content Threat Removal Platform - 79056

The Content Threat Removal Platform by Deep Secure operates at the network boundary, intercepts and analyzes incoming data, extracts only the useful business information while eliminating malicious content and then creates new, clean data for onward delivery. In this way, it defeats zero-day attacks and prevents covert data loss, all transparent to end users.

Active Directory Disaster Recovery

Webcast

Active Directory Disaster Recovery

Active Directory has grown both in importance and complexity in recent years, with businesses have become increasingly dependent on AD for authentication and authorization of mobile workforce and cloud-based applications. The new AD usage landscape has introduced greater complexity to the enterprise IT environment, raising the risk of AD disasters tied to human error and cyberattack. More and more frequently, attackers are using AD as an attack vector to compromise enterprises and, in some severe cases, wiping out the entire IT environment.

Executive View: One Identity Safeguard - 79042

Executive View

Executive View: One Identity Safeguard - 79042

One Identity is one of the leading vendors in the field of IAM. With their recent acquisition of Balabit and the integration of their Privilege Management offerings into the Safeguard product portfolio, the company positions itself among the leaders in the Privilege Management market, delivering a comprehensive portfolio of Privilege Management capabilities.

About KuppingerCole

Our Capabilities

KuppingerCole’s values are expertise, thought leadership, neutrality and outstanding practical relevance.

Our People

KuppingerCole’s highly qualified and globally recognized analysts continuously research and update KuppingerCole online research library, and perform manufacturer-independent advisory services.

Our Methodologies

Proven approach of KuppingerCole focuses on lean, efficient projects, with a structured methodology based on ongoing research, publications, and thought-leading deep knowledge of our analysts.

Our Experience

A large number of KuppingerCole’s existing reports and a significant number of new reports published every year ensures that you can always access up-to-date information you need for your decisions.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Stay Connected

Blog

Spotlight

Compliance, Risk & Security Learn more

Compliance, Risk & Security

Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical, qualitative and infrastructural conditions of the services provided. Therefore, it is difficult to meet all compliance requirements, particularly within the fields of data protection and data security. The decisive factors are transparency, controllability and influenceability of the service provider and his [...]

Latest Insights

Welcome to KuppingerCole

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00