Attend cyberevolution in Germany and meet 500 security experts. Participate in interactive sessions to explore cybersecurity in an AI powered digital world. Network with an international community and learn about societal, technological, and environmental megatrends.
KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Discover Our Passion for Advancing Identity and Security
We are specialized in the strategic management of digital identities, privileges, authentication, and access control as well as cybersecurity and business resilience.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Business Team
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Optimize your decisions based on current analysis and gain the insights you need to stay up to date, grow within your organization, and perform your daily tasks.
Actionable
Cutting edge
Comprehensive
Make smarter business decisions based on practical advice from our independent research.
Be ahead of the curve and anticipate critical developments in your business environment with current insights.
Get a 360° view of market segments in digital identity and cybersecurity from in-depth market analysis.
Latest Publications
All
Blogs
Research
Videos
Webinar Recording
Sep 29, 2023 by Warwick Ashford
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
57:17 min watch
Event Blog
Sep 26, 2023 by Marius Goeddert
Making Cybersecurity ‘Lagom’
1 min read
Analyst Chat
Sep 25, 2023 by Mike Neuenschwander
Analyst Chat #191: The Second Law of AuthN Dynamics
16:06 min watch
Webinar Recording
Sep 22, 2023 by Martin Kuppinger
Harness IGA and GRC Synergies for Effective ID Management and Access Control
53:09 min watch
Advisory Note
Sep 22, 2023 by Osman Celik
Architecting Your SOC to Defend Against Today's Attack Vectors
21 min read
Event Blog
Sep 20, 2023 by Marius Goeddert
Enhancing AI Cybersecurity: A Two-Fold Approach
1 min read
Webinar Recording
Sep 20, 2023 by John Tolbert
Digital Transformation in Financial Services Using Biometrics
57:52 min watch
Event Blog
Sep 19, 2023 by Paul Fisher
A Secure Supply Chain is Impossible. Here is why.
5 min read
Analyst Chat
Sep 18, 2023 by Warwick Ashford
Analyst Chat #190: Cyberproof Your Business - Unpacking EU's DORA Framework for Digital Resilience
23:06 min watch
Leadership Compass
Sep 18, 2023 by Osman Celik
Attack Surface Management
97 min read
Event Blog
Sep 26, 2023 by Marius Goeddert
Making Cybersecurity ‘Lagom’
1 min read
Event Blog
Sep 20, 2023 by Marius Goeddert
Enhancing AI Cybersecurity: A Two-Fold Approach
1 min read
Event Blog
Sep 19, 2023 by Paul Fisher
A Secure Supply Chain is Impossible. Here is why.
5 min read
Event Blog
Sep 15, 2023 by Marius Goeddert
Ransomware Attacks in a Protected Environment
1 min read
Event Blog
Sep 12, 2023 by Alejandro Leal
Tech vs. Law: A Dialectical Approach to Balancing Innovation and Regulation
5 min read
Event Blog
Sep 07, 2023 by Marius Goeddert
Navigating China's Cybersecurity Laws and Their Economic Impact
1 min read
Event Blog
Sep 05, 2023 by John Tolbert
Who is Responsible for Operational Technology Security?
5 min read
Blog
Aug 28, 2023 by Mike Neuenschwander
The Second Law of AuthN Dynamics
5 min read
Event Blog
Aug 24, 2023 by Alexei Balaganski
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
5 min read
Event Blog
Aug 15, 2023 by Alejandro Leal
Beyond Boundaries: The Geopolitics of Cyberspace
4 min read
Advisory Note
Sep 22, 2023 by Osman Celik
Architecting Your SOC to Defend Against Today's Attack Vectors
21 min read
Leadership Compass
Sep 18, 2023 by Osman Celik
Attack Surface Management
97 min read
Advisory Note
Sep 04, 2023 by Warwick Ashford
EU Digital Operational Resilience Act (DORA)
16 min read
Advisory Note
Sep 04, 2023 by Mike Small
Cyber Risks from China: How Contract Negotiations Can Mitigate IT Risks
13 min read
Whitepaper
Aug 31, 2023 by Shikha Porwal
A Shift Toward MSP Delivery: How MSPs Are Mitigating Enterprise IAM Delivery Challenges
21 min read
Advisory Note
Aug 25, 2023 by Alejandro Leal
Cybersecurity Resilience with Generative AI
15 min read
Executive View
Aug 16, 2023 by Paul Fisher
SailPoint Non-Employee Risk Management
9 min read
Leadership Compass
Aug 16, 2023 by Alejandro Leal
Access Management
119 min read
Executive View
Aug 03, 2023 by Richard Hill
Tanium XEM Platform
11 min read
Leadership Compass
Aug 02, 2023 by Richard Hill
Software Supply Chain Security
62 min read
Webinar Recording
Sep 29, 2023 by Warwick Ashford
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
57:17 min watch
Analyst Chat
Sep 25, 2023 by Mike Neuenschwander
Analyst Chat #191: The Second Law of AuthN Dynamics
16:06 min watch
Webinar Recording
Sep 22, 2023 by Martin Kuppinger
Harness IGA and GRC Synergies for Effective ID Management and Access Control
53:09 min watch
Webinar Recording
Sep 20, 2023 by John Tolbert
Digital Transformation in Financial Services Using Biometrics
57:52 min watch
Analyst Chat
Sep 18, 2023 by Warwick Ashford
Analyst Chat #190: Cyberproof Your Business - Unpacking EU's DORA Framework for Digital Resilience
23:06 min watch
Webinar Recording
Sep 15, 2023 by Paul Fisher
Perfecting Privileged Access Management (PAM)
58:57 min watch
Webinar Recording
Sep 13, 2023 by Martin Kuppinger
Unleashing the Power of Modernized Authorization
53:07 min watch
Analyst Chat
Sep 11, 2023 by Alexei Balaganski
Analyst Chat #189: Decrypting the Future - How Quantum Computing Will Reshape Cybersecurity
18:55 min watch
Webinar Recording
Sep 07, 2023 by Martin Kuppinger
Beyond Just SAP: The Need for Cross-LoB Access Controls
54:56 min watch
Webinar Recording
Sep 06, 2023 by Martin Kuppinger
Schon perfekt vorbereitet für NIS2? Wenn nicht: warum Identity Governance so wichtig ist
Benefit from the Exchange of Senior Information Security Experts
Cybersecurity Council
With the Cybersecurity Council, we bring together world-class information security professionals in leading positions from across many industries and schools of thought to exchange and discuss how to secure the rapidly growing cyber economy. The results of these fruitful discussions will flow into every of our services.