Go to Market with KuppingerCole
Insights
Research
Advisory
Events
Company
Become a Client
Login
Search
Become a Client
Insights
Business Resilience Decentralized Identity Fraud Prevention Identity & Access Management Identity Governance and Administration Network Security Passwordless Authentication Zero Trust
Research
Leadership Compass Whitepaper Executive View Advisory Note Leadership Brief Blog
Advisory
Advisory Services Meet our Advisors
Events
EIC 2023 cyberevolution Webinars Virtual Events
Company
About us People Jobs Newsroom Contact us
Go to Market with KuppingerCole
Insights
Business Resilience
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Network Security
Passwordless Authentication
Zero Trust
See all insights
Most recent in Business Resilience
Layoffs at Technology Firms: An Indicator of a Busting Bubble?
Blog
Layoffs at Technology Firms: An Indicator of a Busting Bubble?
Undoubtedly, many technology companies enjoyed an outstanding success during and after the COVID-19 outbreak. Businesses changed in several fields and we saw situations that we would have rarely expected before: switching to online shopping, online education, remote working, minimizing trips and
Security Operations Center as a Service (SOCaaS)
Buyer's Compass
Security Operations Center as a Service (SOCaaS)
The Security Operations Center-as-a-Service (SOCaaS) market continues to develop in response to demand for security monitoring, analysis, detection, response, and improvement recommendations either instead of or as a supplement to permanent on-premises SOCs. This KuppingerCole Buyer's Compass will
Analyst Chat #149: The Top 5 Cybersecurity Trends - Looking Back at CSLS 2022
Analyst Chat
Analyst Chat #149: The Top 5 Cybersecurity Trends - Looking Back at CSLS 2022
Deep Fakes, AI as friend and foe, Business Resilience, Mis-, Dis- and Malinformation: The Cybersecurity Leadership Summit has taken place in Berlin and covered all of this and much more. Martin Kuppinger and Matthias look back on the event and identify their Top 5 Trends from CSLS2022 in
Most recent in Decentralized Identity
The Path of Unifying Identities
Blog
The Path of Unifying Identities
One Identity Field Strategist Robert Byrne explains why he thinks that the identity community needs to better educate business and even IT managers who shortsightedly equate identity with their login account.
Reusable Verified Identity
Leadership Compass
Reusable Verified Identity
This Leadership Compass provides an overview of up-to-date insights on the leaders in innovation, product features, and market reach for Reusable Verified Identity. These vendors enable a digital identity that has been verified to represent a real-world entity to be reused by the issuing
The Future of Access Management: The Role of Contextual Intelligence, Verifiable Credentials, Decentralized Identity and Beyond
Event Recording
The Future of Access Management: The Role of Contextual Intelligence, Verifiable Credentials, Decentralized Identity and Beyond
Most recent in Fraud Prevention
Are Cyber Insurance Policies Necessary?
Blog
Are Cyber Insurance Policies Necessary?
Cyber insurance offers protection against financial damage resulting from catastrophes involving computer networks, such as data breaches, network failures, and cyber-attacks. Cyber insurance policies are typically used to cover a wide variety of costs associated with cyber incidents, including reme
Security Operations Center as a Service (SOCaaS) for the UAE
Market Compass
Security Operations Center as a Service (SOCaaS) for the UAE
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the Security Operations Center-as-a-Service (SOCaaS) market in the UAE that continues to develop in response to demand for security monitoring,
Cyber Resilience Through SOC Automation
Webinar Recording
Cyber Resilience Through SOC Automation
Join experts from Kuppinger Cole Analysts and Palo Alto Networks as they discuss why automating as much as possible and providing information to enable analysts to make timely decisions should be a priority for SOC management. They will also explore the benefits of Security Orchestration,
Most recent in Identity & Access Management
2023 Trends and Predictions - Passwordless Authentication
Blog
2023 Trends and Predictions - Passwordless Authentication
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is still the driving force behind a number of security breaches and incidents, the modern cybersecurity la
Sharelock ITDR
Executive View
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify anomalies and threats across a wide range of systems is the foundation for proper response. Sharelock
Urgent: Find and Block Identity-Centric Security Threats Today
Webinar Recording
Urgent: Find and Block Identity-Centric Security Threats Today
Join experts from KuppingerCole Analysts and AI-assisted behavioral analysis firm Sharelock as they discuss why Identity Threat Detection & Response (ITDR) is a crucial component of an overall Identity & Access Management (IAM) strategy, why Cloud Workload Protection (CWP) is a
Most recent in Identity Governance and Administration
Identity Fabrics: Where Do You Stand? Where Should You Go?
Blog
Identity Fabrics: Where Do You Stand? Where Should You Go?
The term and concept of Identity Fabrics has become popular in recent years. We observe widespread adoption of the concept as the foundation for further evolving IAM (Identity & Access Management) infrastructures. To provide a guideline for organizations, KuppingerCole Analysts have developed a matu
Identity Governance and Administration 2022
Leadership Compass
Identity Governance and Administration 2022
The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Lifecycle Management and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the IGA
The Business Value of Cloud-Based Identity Security
Webinar Recording
The Business Value of Cloud-Based Identity Security
Join identity experts at KuppingerCole Analysts and SailPoint as they discuss the challenges of on-prem identity security solutions, the benefits of moving to software-as-a-service solutions, how to determine if that’s the right option, key questions to ask, how to quantify the financial
Most recent in Network Security
State-sponsored Cyber Attacks
Blog
State-sponsored Cyber Attacks
Leading organizations have long factored state-sponsored cyber-attacks into their risk-based cyber defense planning, but the need to do so has been highlighted in recent months due to an increase in this type of attack associated with the conflict in Ukraine.
ExeonTrace NDR
Executive View
ExeonTrace NDR
Network monitoring is a foundational element of security architecture. Sophisticated attackers may deliberately delete logs on servers and endpoints to cover up their tracks. This means that the network, including private and public clouds, may be the last place that investigators can look to find
Pioneering Zero Trust Network Access With Intelligent Microsegmentation
Webinar Recording
Pioneering Zero Trust Network Access With Intelligent Microsegmentation
Adopting a Zero Trust security model of strict identity verification and access control for every user or device is widely accepted as a solution, but many organizations struggle to find the best route to implementing it. Join security experts from KuppingerCole Analysts and Zero Networks as they
Most recent in Passwordless Authentication
2023 Trends and Predictions - Passwordless Authentication
Blog
2023 Trends and Predictions - Passwordless Authentication
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is still the driving force behind a number of security breaches and incidents, the modern cybersecurity la
HID Global Authentication Platform
Executive View
HID Global Authentication Platform
In recent years, investment into cybersecurity has soared but, in most cases, these efforts have not fully addressed the reliance on passwords and the challenges they introduce. Without secure access to resources, businesses and organizations are at risk of suffering from phishing and social
Passwordless: A Step on the Journey
Video
Passwordless: A Step on the Journey
The topic of passwordless authentication holds immense significance in today's digital landscape. Security experts believe that passwords comprise a significant weakness in security and advocate for their elimination. However, does the elimination of passwords guarantee the ultimate solution?
Most recent in Zero Trust
IGA, the key to security and compliance
Blog
IGA, the key to security and compliance
Securing data and complying with the growing number of associated local, regional, and international regulations are two of the biggest challenges facing most modern organizations as they become increasingly reliant on complex IT environments.
SASE Integration Suites
Leadership Compass
SASE Integration Suites
This report provides an overview of the market for Secure Access Service Edge (SASE) Integration Suites. In this Leadership Compass, we examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing SASE Integration solutions.
Pioneering Zero Trust Network Access With Intelligent Microsegmentation
Webinar Recording
Pioneering Zero Trust Network Access With Intelligent Microsegmentation
Adopting a Zero Trust security model of strict identity verification and access control for every user or device is widely accepted as a solution, but many organizations struggle to find the best route to implementing it. Join security experts from KuppingerCole Analysts and Zero Networks as they
Research
Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Blog
See all research
Most recent in Leadership Compass
Cloud Backup for Ransomware Protection
Mar 30, 2023
Cloud Backup for Ransomware Protection
This report provides an overview of the Cloud Backup for Ransomware Protection market and a compass to help you find a solution that best meets your needs. It examines solutions that provide backup, restore, and disaster recovery of the data held in today’s hybrid IT services into the cloud. It
SASE Integration Suites
Feb 06, 2023
SASE Integration Suites
This report provides an overview of the market for Secure Access Service Edge (SASE) Integration Suites. In this Leadership Compass, we examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing SASE Integration solutions.
Security Orchestration Automation and Response (SOAR)
Jan 30, 2023
Security Orchestration Automation and Response (SOAR)
This report provides an overview of the SOAR market and a compass to help you find a solution that best meets your needs. We examine the SOAR market segment, product/service functionality, relative market share, and innovative approaches to providing SOAR solutions.
Most recent in Whitepaper
Understanding the Value of Upgrading to Cloud-Based Identity Security
Mar 30, 2023
Understanding the Value of Upgrading to Cloud-Based Identity Security
Organizations are facing ever increasing challenges maintaining and modernizing legacy identity security solutions. The shift from on-premises legacy solutions to SaaS based identity security solutions can address these challenges and leverage the benefits of modern tools for identity security.
Die Automatisierung des SOC
Feb 23, 2023
Die Automatisierung des SOC
SOAR, Security Orchestration, Automation and Response, ist das jüngste in einer Reihe von mit Security verbundenen Modewörtern, die sich auf dem Markt verbreiten. Obwohl SOAR erst in den letzten Jahren aufgekommen ist, entwickelt es sich schnell zu einem unverzichtbaren Werkzeug für Unternehmen.
Zoom Unified Communications Platform Security and Compliance
Feb 16, 2023
Zoom Unified Communications Platform Security and Compliance
Zoom offers a cloud-based unified communications platform (UCaaS) featuring video communications. UCaaS delivers many benefits including flexibility, performance, and price. Organizations should choose and use their UCaaS solution based on trustworthiness as well as the cost and efficiency
Most recent in Executive View
Sharelock ITDR
Mar 22, 2023
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify anomalies and threats across a wide range of systems is the foundation for proper response. Sharelock
SailPoint Identity Security Cloud
Mar 20, 2023
SailPoint Identity Security Cloud
SailPoint Identity Security Cloud is a cloud-based identity security solution that helps organizations manage access to their applications, data, and other resources. The platform provides a comprehensive view of user access across an organization's IT environment, allowing administrators to manage
ExeonTrace NDR
Mar 08, 2023
ExeonTrace NDR
Network monitoring is a foundational element of security architecture. Sophisticated attackers may deliberately delete logs on servers and endpoints to cover up their tracks. This means that the network, including private and public clouds, may be the last place that investigators can look to find
Most recent in Advisory Note
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Nov 09, 2022
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Vulnerability Management (VM) is a security practice that focuses on the process by which organizations identify, analyze, manage, and prevent the exploitation of IT vulnerabilities. If implemented successfully, a VM program has the potential to increase the overall security of the organization and
2022 IAM Reference Architecture
Apr 21, 2022
2022 IAM Reference Architecture
IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. The challenges for a future proof IAM are complex, diverse, and sometimes even conflicting. Organizations that demand for
Maturity Level Matrix for IAM
Jan 13, 2022
Maturity Level Matrix for IAM
KuppingerCole Maturity Level Matrices for the major market segments within IAM (Identity, and Access Management), IGA (Identity Governance and Administration) and CIAM (Consumer Identity and Access Management). These provide the foundation for rating the current state of your IAM/IGA projects and
Most recent in Leadership Brief
Why Vulnerability Management Is a Strategic Investment
Nov 04, 2022
Why Vulnerability Management Is a Strategic Investment
Considering that the threat landscape is constantly changing, it is important to maintain a strong cybersecurity foundation. Organizations need security hygiene standards to increase security and readiness while preventing vulnerabilities from being exploited by adversaries. By introducing a
Managing RDP Security Risks to Block Ransomware Attacks
Aug 30, 2022
Managing RDP Security Risks to Block Ransomware Attacks
Remote working is becoming widespread for social and economic reasons, and one of the key enablers is the Remote Desktop Protocol (RDP). However, RDP is one of the most popular initial cyber-attack vectors, which is all too often overlooked. This leadership brief details the security risks
Advanced IT security solutions for OT environments
Aug 09, 2022
Advanced IT security solutions for OT environments
Industrial Control Systems operators are increasingly targeted by Advanced Persistent Threat (APT) actors and cybercriminals as digital transformation accelerates. Many hitherto isolated systems now connected, which introduces additional risks from enterprise IT and the cloud. Although such
Most recent in Blog
The Disjointed State of CIAM
Mar 28, 2023
The Disjointed State of CIAM
As conscious consumers, we are all familiar with the different stages of the digital consumer lifecycle from registration and onboarding to authentication, transaction, and sometimes also the deletion of an account. As users we expect a frictionless experience while our data is kept safe.
2023 Trends and Predictions - Passwordless Authentication
Mar 24, 2023
2023 Trends and Predictions - Passwordless Authentication
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is still the driving force behind a number of security breaches and incidents, the modern cybersecurity la
A New Pamocracy is Growing Inside Your Organization
Mar 23, 2023
A New Pamocracy is Growing Inside Your Organization
OK everybody is doing it right now, so I asked the analyst’s new best friend, Chat GPT, to define Privileged Access Management. Here is what it said: “Privileged Access Management (PAM) is a critical security discipline that provides a framework to manage and monitor privileged access to sensitive s
Events
EIC 2023
cyberevolution
Webinars
Virtual Events
European Identity and Cloud Conference 2023
European Identity and Cloud Conference 2023
The European Identity and Cloud Conference is the place where the digital identity and cyber community comes together to set the course for the future of digitization. Come to Berlin or tune in online and get actionable insights for your digitization journey, build strategic partnerships for your business, and enjoy connecting with your colleagues and peers from all over the world.
To the Event Agenda Overview
cyberevolution
cyberevolution
Join the biggest international cybersecurity conference in Germany and meet 500 security practitioners. Participate in four interactive tracks to get insights on Quantum Computing, Supply Chain Security, Human Factor, Zero Trust, and many more. Explore societal, technological, and environmental megatrends.
To the Event Call for Speakers
Most recent in Webinars
Welcome to the Pamocracy!
Apr 18, 2023
Welcome to the Pamocracy!
As the business world embraces cloud, continuous infrastructure development and a revolution in software procurement and deployment, what was once confined to the few is now open to many. We are talking of course about privileged access which has spread from traditional IT roles into the embrace of
Take Invisible MFA to the Next Level with Passwordless Continuous Authentication
Apr 20, 2023
Take Invisible MFA to the Next Level with Passwordless Continuous Authentication
Credential theft is the top enabler of cybercrime. In response, many organizations are turning to multifactor authentication (MFA), but not all MFA solutions are hacker resistant. Some approaches are more effective than others, but finding the right approach can be challenging.
Phishing-Resistant MFA: The Next Evolution for Strong Authentication
Apr 25, 2023
Phishing-Resistant MFA: The Next Evolution for Strong Authentication
Using stolen credentials is one of the most popular and effective ways for cyber-attacks to infiltrate the IT systems of targeted organizations. Most cybersecurity teams are implementing multi-factor authentication (MFA), but not all MFA systems are created equal or implemented effectively, leaving
Most recent in Virtual Events
Access Management: Managing Your Risk
Dec 07, 2022
Access Management: Managing Your Risk
For many businesses, Access Management still remains a big challenge. Not only should we control who has access to our systems, but we should also know where people are accessing this information from, and what exactly they are doing with it. This is particularly challenging when working in the
Driving Innovation With Identity Fabrics
Oct 06, 2022
Driving Innovation With Identity Fabrics
Digital Transformation has put businesses under a lot of pressure, not only with regards to compliance but also through a high demand for customer privacy and improved user experience. With too much security, e.g., through Authentication, users are scared off, whereas having too little security is
Becoming a Better Privileged Access Manager
Sep 14, 2022
Becoming a Better Privileged Access Manager
Organizations across the world are plagued by limited visibility of privileged accounts, users, and credentials. This creates a host of security and audibility issues, with former employees retaining access to sensitive information - a dangerous backdoor for attackers. As organizations accelerate
Advisory
Advisory Services

KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.

See Advisory Services
Contact our advisors

E-mail info@kuppingercole.com
Phone
+49 (211) 2370 77-0

Meet our Advisors
Company
About us People Jobs Newsroom Contact us
Discover Our Passion for Advancing Identity and Security
We are specialized in the strategic management of digital identities, privileges, authentication, and access control as well as cybersecurity and business resilience.​
Read more about our philosophy
Analysts & Advisors

Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.

Business Team

Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.

Meet the Team
Career Opportunities
(Junior) Advisor (m/w/d) für Cybersecurity, IAM, Digitale Transformation
Advisory
 Stuttgart, Wiesbaden
(Junior) Advisor (m/w/d) für Cybersecurity, IAM, Digitale Transformation
Zum nächstmöglichen Zeitpunkt suchen wir eine/n motivierte/n Advisor/in zur Ergänzung unseres Advisorteams.  Junge Talente – entweder direkt von der Universität oder mit ersten Berufserfahrungen in der Industrie oder Beratung im Bereich Cybersecurity, IAM, Digitale
Analyst Information Security (m/f/d)
Analysts
 Stuttgart | Wiesbaden | Seattle
Analyst Information Security (m/f/d)
As an Analyst for Information Security, you will analyze vendors, products, and trends in Information Security and create research documents. You will provide advice to end users, system integrators, and vendors. If you have a strong knowledge at least of certain fields of Information Security
Senior Analyst Information Security (m/f/d)
Analysts
 Stuttgart | Wiesbaden | Seattle
Senior Analyst Information Security (m/f/d)
As a Senior Analyst for Information Security, you will analyze vendors, products, and trends in Information Security and create research documents and lead research for certain market segments, including creating Leadership Compass documents for these segments in your full responsibility. You will
View all Job Offers
Latest Press Releases
KuppingerCole Analysts Predicts SASE Integration Suites Market to Grow to 4.98 bn USD by 2026  
March 16, 2023
KuppingerCole Analysts Predicts SASE Integration Suites Market to Grow to 4.98 bn USD by 2026  
KuppingerCole Analysts predicts a CAGR of 13.65% for this market segment, which will lift the market size to 4.98 billion USD by 2026. The largest share of the global revenue in this market segment comes from North America, currently representing 52.4%.
KuppingerCole Analysts predicts IGA Market to grow to 3.99 bn USD by 2025 
February 23, 2023
KuppingerCole Analysts predicts IGA Market to grow to 3.99 bn USD by 2025 
KuppingerCole research predicts that the Compound Annual Grow Rate (CAGR) of the IGA Market Segment will be 14.3%, lifting the market volume to 3.99 billion US dollars by 2025. The largest share of the global revenue in this market segment comes from North America, currently representing 55.1%.
KuppingerCole Launches a New and Innovative Shortlisting Tool
February 15, 2023
KuppingerCole Launches a New and Innovative Shortlisting Tool
KupingerCole launches KC Open Select, an innovative shortlisting tool  helping users make more informed decisions on their cybersecurity-related purchases.
Basic contact information
KuppingerCole Analysts AG
Wilhelmstr. 20-22
65185 Wiesbaden
Germany
E-mail Phone info@kuppingercole.com
+49 (211) 2370 77-0
Linkedin Linkedin
Twitter Twitter
Facebook Facebook
YouTube YouTube
Instagram Instagram
Contact us
See all locations, phone numbers, e-mail addresses
Blog

AI Governance: What to Consider

May 07, 2020
Martin Kuppinger
Latest posts by Martin Kuppinger
Passwordless Authentication 101
Enhancing Zero Trust in a ServiceNow Environment
Thales Acquires OneWelcome: Beyond CIAM
The Changing Market for Access Control & Risk Management for Business Applications
Linkedin Linkedin
Twitter Twitter
Facebook Facebook
YouTube YouTube
Instagram Instagram
Insights
Business Resilience
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Network Security
Passwordless Authentication
Zero Trust
Research
Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Blog
Advisory
Advisory Services
Meet our Advisors
Events
EIC 2023
cyberevolution
Webinars
Virtual Events
Company
About us
People
Jobs
Newsroom
Contact us
Insights
Business Resilience
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Network Security
Passwordless Authentication
Zero Trust
Research
Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Blog
Advisory
Advisory Services
Meet our Advisors
Events
EIC 2023
cyberevolution
Webinars
Virtual Events
Company
About us
People
Jobs
Newsroom
Contact us
Switch to dark theme
Switch to light theme
Imprint Terms & Conditions Privacy Policy © Copyright KuppingerCole Analysts AG
© Copyright KuppingerCole Analysts AG
Go to Market with KuppingerCole
Go to Market with KuppingerCole