Latest Research, Upcoming Webinars and Events
We are all living in the era of digitalization, where nearly all processes, business and private, accelerate at an enormous speed. For example, employees are today located in different places on the globe, they use different devices, and do so at any time they need to. For access to sensitive data, they need to be able to authenticate themselves reliably. More
Threat intelligence is a vital part of cyber-defence and cyber-incident response. To enable and automate the sharing threat intelligence, OASIS recently made available the specifications for STIX™, TAXII™ and CybOX™ as international open standards. This report provides an overview of these specifications and their application to Real Time Security Intelligence. More
Trying to find the right access security solution has always been a complex task. It is, however, even more challenging when the existing web access management solution is not sufficient anymore. More
Alles was Sie über den neuen EU-Datenschutz und dessen Auswirkungen auf Ihren Bereich wissen müssen – kompakt und fokussiert: Nach einer grundlegenden Einführung in Grundlagen und Begriffe der GDPR, konzentriert sich dieses Tutorial auf Unterschiede zum heute noch gültigen Recht und die Auswirkungen dieser Unterschiede auf Ihre Infrastruktur, Ihre Sicherheitsstrategie und die Prozesse. Die wichtigsten Themen im Überblick: Data Protection Impact Assessments (DPIA), Audits und Prüfungserfordernisse Das neue Haftungsrecht: Wie Sie More
KuppingerCole’s values are expertise, thought leadership, neutrality and outstanding practical relevance.
KuppingerCole’s highly qualified and globally recognized analysts continuously research and update KuppingerCole online research library, and perform manufacturer-independent advisory services.
Proven approach of KuppingerCole focuses on lean, efficient projects, with a structured methodology based on ongoing research, publications, and thought-leading deep knowledge of our analysts.
A large number of KuppingerCole’s existing reports and a significant number of new reports published every year ensures that you can always access up-to-date information you need for your decisions.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
The proverbial Computing Troika that KuppingerCole has been writing about for years does not show any signs of slowing down. The technological trio of Cloud, Mobile and Social computing, as well as their younger cousin, the Internet of Things, have profoundly changed the way our society works. [...]
Traditional tools are still widely deployed by many organizations and in certain scenarios serve as a useful part of enterprise security infrastructures, but recent trends in the IT industry have largely made them obsolete. Continued deperimeterization of corporate networks because of adoption of cloud and mobile services, as well as emergence of many new legitimate communication channels with external partners has made the task of protecting sensitive corporate information more and more difficult. The focus of information security has gradually shifted from perimeter protection towards [...]