Expert Analysis and Insights for Identity and Security

Unlock the power of identity security with KuppingerCole — Your trusted advisor for informed decisions. 
cyberevolution
Balance Innovation and Regulation

cyberevolution
Early Bird Expires October 10

cyberevolution
Quantum Computing Horizons in Cybersecurity

Is China Inside Your Data?
Don't Be China's Next Target!

Tech vs. Law
Early Bird Tickets
Quantum Computing
Security & China
Fine-tune your decisions

Insights to Inspire

Optimize your decisions based on current analysis and gain the insights you need to stay up to date, grow within your organization, and perform your daily tasks.

Actionable

Cutting edge

Comprehensive

Make smarter business decisions based on practical advice from our independent research.
Be ahead of the curve and anticipate critical developments in your business environment with current insights.
Get a 360° view of market segments in digital identity and cybersecurity from in-depth market analysis.
Latest Publications
All
Blogs
Research
Videos
Webinar Recording
Sep 22, 2023 by Martin Kuppinger
Harness IGA and GRC Synergies for Effective ID Management and Access Control
53:09 min watch
Advisory Note
Sep 22, 2023 by Osman Celik
Architecting Your SOC to Defend Against Today's Attack Vectors
21 min read
Event Blog
Sep 20, 2023 by Marius Goeddert
Enhancing AI Cybersecurity: A Two-Fold Approach
1 min read
Webinar Recording
Sep 20, 2023 by John Tolbert
Digital Transformation in Financial Services Using Biometrics
57:52 min watch
Event Blog
Sep 19, 2023 by Paul Fisher
A Secure Supply Chain is Impossible. Here is why.
5 min read
Analyst Chat
Sep 18, 2023 by Warwick Ashford
Analyst Chat #190: Cyberproof Your Business - Unpacking EU's DORA Framework for Digital Resilience
23:06 min watch
Leadership Compass
Sep 18, 2023 by Osman Celik
Attack Surface Management
97 min read
Event Blog
Sep 15, 2023 by Marius Goeddert
Ransomware Attacks in a Protected Environment
1 min read
Webinar Recording
Sep 15, 2023 by Paul Fisher
Perfecting Privileged Access Management (PAM)
58:57 min watch
Webinar Recording
Sep 13, 2023 by Martin Kuppinger
Unleashing the Power of Modernized Authorization
53:07 min watch
Event Blog
Sep 20, 2023 by Marius Goeddert
Enhancing AI Cybersecurity: A Two-Fold Approach
1 min read
Event Blog
Sep 19, 2023 by Paul Fisher
A Secure Supply Chain is Impossible. Here is why.
5 min read
Event Blog
Sep 15, 2023 by Marius Goeddert
Ransomware Attacks in a Protected Environment
1 min read
Event Blog
Sep 12, 2023 by Alejandro Leal
Tech vs. Law: A Dialectical Approach to Balancing Innovation and Regulation
5 min read
Event Blog
Sep 07, 2023 by Marius Goeddert
Navigating China's Cybersecurity Laws and Their Economic Impact
1 min read
Event Blog
Sep 05, 2023 by John Tolbert
Who is Responsible for Operational Technology Security?
5 min read
Blog
Aug 28, 2023 by Mike Neuenschwander
The Second Law of AuthN Dynamics
5 min read
Event Blog
Aug 24, 2023 by Alexei Balaganski
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
5 min read
Event Blog
Aug 15, 2023 by Alejandro Leal
Beyond Boundaries: The Geopolitics of Cyberspace
4 min read
Event Blog
Aug 08, 2023 by Martin Kuppinger
Securing the Digital Universe: Where Do We Even Start?
4 min read
Advisory Note
Sep 22, 2023 by Osman Celik
Architecting Your SOC to Defend Against Today's Attack Vectors
21 min read
Leadership Compass
Sep 18, 2023 by Osman Celik
Attack Surface Management
97 min read
Advisory Note
Sep 04, 2023 by Warwick Ashford
EU Digital Operational Resilience Act (DORA)
16 min read
Advisory Note
Sep 04, 2023 by Mike Small
Cyber Risks from China: How Contract Negotiations Can Mitigate IT Risks
13 min read
Whitepaper
Aug 31, 2023 by Shikha Porwal
A Shift Toward MSP Delivery: How MSPs Are Mitigating Enterprise IAM Delivery Challenges
21 min read
Advisory Note
Aug 25, 2023 by Alejandro Leal
Cybersecurity Resilience with Generative AI
15 min read
Executive View
Aug 16, 2023 by Paul Fisher
SailPoint Non-Employee Risk Management
9 min read
Leadership Compass
Aug 16, 2023 by Alejandro Leal
Access Management
119 min read
Executive View
Aug 03, 2023 by Richard Hill
Tanium XEM Platform
11 min read
Leadership Compass
Aug 02, 2023 by Richard Hill
Software Supply Chain Security
62 min read
Webinar Recording
Sep 22, 2023 by Martin Kuppinger
Harness IGA and GRC Synergies for Effective ID Management and Access Control
53:09 min watch
Webinar Recording
Sep 20, 2023 by John Tolbert
Digital Transformation in Financial Services Using Biometrics
57:52 min watch
Analyst Chat
Sep 18, 2023 by Warwick Ashford
Analyst Chat #190: Cyberproof Your Business - Unpacking EU's DORA Framework for Digital Resilience
23:06 min watch
Webinar Recording
Sep 15, 2023 by Paul Fisher
Perfecting Privileged Access Management (PAM)
58:57 min watch
Webinar Recording
Sep 13, 2023 by Martin Kuppinger
Unleashing the Power of Modernized Authorization
53:07 min watch
Analyst Chat
Sep 11, 2023 by Alexei Balaganski
Analyst Chat #189: Decrypting the Future - How Quantum Computing Will Reshape Cybersecurity
18:55 min watch
Webinar Recording
Sep 07, 2023 by Martin Kuppinger
Beyond Just SAP: The Need for Cross-LoB Access Controls
54:56 min watch
Webinar Recording
Sep 06, 2023 by Martin Kuppinger
Schon perfekt vorbereitet für NIS2? Wenn nicht: warum Identity Governance so wichtig ist
56:53 min watch
Analyst Chat
Sep 04, 2023 by Alejandro Leal
Analyst Chat #188: Beyond Tradition - The Evolution and Integration of Access Management
13:40 min watch
Analyst Chat
Aug 28, 2023 by Nitish Deshpande
Analyst Chat #187: Securing the Autonomous World 
15:27 min watch
Join our Events

Build a Professional Network

Connect with a global community of IT professionals

Enter valuable and long-term partnerships

Gain a new perspective

Contribute your ideas

Arrange personal appointments and discuss your business case with experts, analysts, and peers to gain a strategic edge over your competitors.
Exchange with representatives from cross-industry enterprises, software vendors, consultancies, academia, and politics.
Become a speaker and present your use cases, best practices, and theories to a growing audience.
See upcoming Events
Advice you need, when you need it.

For individuals and teams

Neutral

You can count on independent market guidance for your projects and strategic goals.

Customized

We have tested methodologies but your timeline and budget is our guiding principle.

Familiar

You will be closely advised by a small group of experienced consultants knowing your critical priorities.
Learn more about Advisory Services
Benefit from the Exchange of Senior Information Security Experts

Cybersecurity Council

With the Cybersecurity Council, we bring together world-class information security professionals in leading positions from across many industries and schools of thought to exchange and discuss how to secure the rapidly growing cyber economy. The results of these fruitful discussions will flow into every of our services.
Learn more
Become a Client

The First Step to a Digitized Business Future

Depending on what you need, we have a lot of free services. With more customizations comes more support. Let us know where we can support you.

Do it yourself

Write to us

Let us help you choose

Create a free account and subscribe to one of the packages. Start a free trial or choose full support for you and your team. Subscription Packages
Describe your needs briefly and we’ll contact you with some ideas sketched out to go further with. Send an Inquiry
Let’s talk. Our team will help you choose the package you need. Contact us
Need more details?
Let's talk
Call us
+49 211 2370770
Mo – Fr 8:00 — 17:00 CET
Write to us
Send an inquiry

Stay up to date

Subscribe for a newsletter to receive updates on newest events, insights and research.
I have read and agree to the Privacy Policy
I have read and agree to the Terms of Use