Latest Research, Upcoming Webinars and Events
Consumer identity and access management solutions have emerged in the recent years to meet evolving business requirements. CIAM is bringing value to the organizations regarding higher numbers of successful registrations, customer profiling, authentication variety, identity analytics, and marketing insights. Companies and public sector organizations with deployed CIAM solutions can provide better digital experiences for and gather more information about the consumers who are using their services. More
Nok Nok Labs S3 Authentication Suite is a unified strong authentication platform that incorporates FIDO Alliance specifications and other industry standards, as well as proprietary innovations. The S3 Authentication Suite provides a full stack of client- and server-side technologies for incorporating interoperable and future-proof risk-based biometric authentication into mobile and web applications. More
Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. To do their daily job successfully, users today expect to get access to information they need from anywhere at any time, regardless of the target system or application. IT departments are struggling to make this access frictionless for users yet maintain compliance with corporate and government-imposed security and privacy regulations. This task is even more complicated if business-critical platforms like SAP are involved – not More
Symantec Advanced Threat Protection is a unified platform for uncovering and remediating advanced cyber-attacks across endpoints, network and email, which augments existing Symantec endpoint protection and threat intelligence technologies with advanced security analytics capabilities. More
KuppingerCole’s values are expertise, thought leadership, neutrality and outstanding practical relevance.
KuppingerCole’s highly qualified and globally recognized analysts continuously research and update KuppingerCole online research library, and perform manufacturer-independent advisory services.
Proven approach of KuppingerCole focuses on lean, efficient projects, with a structured methodology based on ongoing research, publications, and thought-leading deep knowledge of our analysts.
A large number of KuppingerCole’s existing reports and a significant number of new reports published every year ensures that you can always access up-to-date information you need for your decisions.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
WannaCry counts, without any doubt, amongst the most widely publicized cyber-attacks of the year, although this notoriety may not necessarily be fully justified. Still, it has affected hospitals, public transport, and car manufacturing, to name just a few of the examples that became public. In an [...]
Today, the Cyber Defence Center (CDC) or Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes [...]