Go to Market with KuppingerCole
Insights
Research
Advisory
Events
KC Open Select
Company
Become a Client
Login
Search
Become a Client
Insights
Business Resilience Decentralized Identity Fraud Prevention Identity & Access Management Identity Governance and Administration Passwordless Authentication Privileged Access Management Zero Trust
Research
Leadership Compass Whitepaper Executive View Advisory Note Leadership Brief Blog
Advisory
Advisory Services Meet our Advisors
Events
cyberevolution EIC 2024 Webinars
KC Open Select
Visit Open Select Contact Us
Company
About us People Jobs Newsroom Contact us
Go to Market with KuppingerCole
Insights
Business Resilience
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Passwordless Authentication
Privileged Access Management
Zero Trust
See all insights
Most recent in Business Resilience
Continuous Exposure Management - Keeping one step ahead of attackers through continuous exposure management
Event Recording
Continuous Exposure Management - Keeping one step ahead of attackers through continuous exposure management
Companies are facing increasingly complex security threats. Many are struggling to assess their own security risks due to an inability to address potential issues as they arise, due to the breakneck pace at which issues are disclosed, and teams' ability to address said issues as they accumulate
Layoffs at Technology Firms: An Indicator of a Busting Bubble?
Blog
Layoffs at Technology Firms: An Indicator of a Busting Bubble?
Undoubtedly, many technology companies enjoyed an outstanding success during and after the COVID-19 outbreak. Businesses changed in several fields and we saw situations that we would have rarely expected before: switching to online shopping, online education, remote working, minimizing trips and
Security Operations Center as a Service (SOCaaS)
Buyer's Compass
Security Operations Center as a Service (SOCaaS)
The Security Operations Center-as-a-Service (SOCaaS) market continues to develop in response to demand for security monitoring, analysis, detection, response, and improvement recommendations either instead of or as a supplement to permanent on-premises SOCs. This KuppingerCole Buyer's Compass will
Most recent in Decentralized Identity
Microsoft Putting Decentralized Identities Into Practice
Blog
Microsoft Putting Decentralized Identities Into Practice
Microsoft has announced their support for Verified Workplace in LinkedIn using Microsoft Entra Verified ID. While this focuses on a specific use case, it is an important step forward towards the ubiquitous use of decentralized identities
CIAM, Wallets, Decentralized - Where is
Event Recording
CIAM, Wallets, Decentralized - Where is "Traditional" CIAM Heading?
Reusable Verified Identity
Leadership Compass
Reusable Verified Identity
This Leadership Compass provides an overview of up-to-date insights on the leaders in innovation, product features, and market reach for Reusable Verified Identity. These vendors enable a digital identity that has been verified to represent a real-world entity to be reused by the issuing
Most recent in Fraud Prevention
Speeding Up Zero Trust Delivery Using Managed Services
Webinar Recording
Speeding Up Zero Trust Delivery Using Managed Services
Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture for ensuring that all IT networks and information systems are protected from cyber-attacks. Martin
Fraud Reduction Intelligence  Platforms (FRIP)
Leadership Compass
Fraud Reduction Intelligence Platforms (FRIP)
This report provides an overview of the market for Fraud Reduction Intelligence Platforms and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to
The IAM Market: What is driving growth in 2023?
Blog
The IAM Market: What is driving growth in 2023?
Identity and Access Management (IAM) is an essential component of IT security today, enabling organizations to control access to their systems and data by managing user identities, access entitlements and authentication. The importance of IAM continues to grow as cyber threats continue to evolve an
Most recent in Identity & Access Management
Speeding Up Zero Trust Delivery Using Managed Services
Webinar Recording
Speeding Up Zero Trust Delivery Using Managed Services
Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture for ensuring that all IT networks and information systems are protected from cyber-attacks. Martin
Delivering Business Value through Orchestration
Whitepaper
Delivering Business Value through Orchestration
In an ever-changing digital world, enterprises and vendors face new digital challenges. This is driving the adoption of new solution strategies in which delivering satisfactory modern identity services is key. As a result, the market is shifting to a more agile and modular approach that leverages
Identity as the Most Critical Element of Security
Blog
Identity as the Most Critical Element of Security
With all of us having multiple identities in today's highly digitized world, it would be difficult to disagree with Hed Kovetz, when he says that identity is "almost the last thing that defines the virtual enterprise". As CEO and Co-Founder of Silverfort, Hed knows a thing or two about managing iden
Most recent in Identity Governance and Administration
Policy-based Provisioning: Automating Access Entitlements and Access Reviews
Whitepaper
Policy-based Provisioning: Automating Access Entitlements and Access Reviews
Manually granting access to entitlements and access reviews is not easy. Organizations are shifting focus towards learning and discovering capabilities. Automation tools such as policy mining are being introduced to reduce the burden of governance for granting access and reviewing access.
Veni, Vidi, Vici: How AI will Shape the Future of IGA
Event Recording
Veni, Vidi, Vici: How AI will Shape the Future of IGA
Imagine a world where security risks are identified and mitigated before they even happen. Imagine if access and auditing recommendations were made with the precision of a computer algorithm. Imagine the power of artificial intelligence to revolutionize your organization's identity governance and
The IAM Market: What is driving growth in 2023?
Blog
The IAM Market: What is driving growth in 2023?
Identity and Access Management (IAM) is an essential component of IT security today, enabling organizations to control access to their systems and data by managing user identities, access entitlements and authentication. The importance of IAM continues to grow as cyber threats continue to evolve an
Most recent in Passwordless Authentication
Passwordless Authentication
Open Select
Passwordless Authentication
Create a shortlist of solutions tailored to your needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly.
FIDO à la Carte
Event Recording
FIDO à la Carte
Finding the right passwordless solution can be a daunting task. Searching the web for a passwordless authentication solution will present many options for various use cases. With so many options, how do you choose the solution that best meets your requirements? This presentation will help guide
Top 3 EIC Topics Picked by Martin Kuppinger
Blog
Top 3 EIC Topics Picked by Martin Kuppinger
We sat down with KuppingerCole co-founder and principal analyst Martin Kuppinger to ask him about the top three topics that have gained importance since last year’s European Identity and Cloud Conference.
Most recent in Privileged Access Management
Privileged Access Management
Open Select
Privileged Access Management
Create a shortlist of solutions tailored to your needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly.
Analyst Chat #173: Controlling the Accelerator for Secrets Management
Analyst Chat
Analyst Chat #173: Controlling the Accelerator for Secrets Management
Graham Williamson, Fellow Analyst with KuppingerCole, shares his insights and expertise with our host Matthias Reinwarth as they discuss the lessons learned from Graham's research on secrets management. They also explore the concept of "Machine Identity" and why it's important for businesses to
NRI Secure Uni-ID Libra 2.7
Executive View
NRI Secure Uni-ID Libra 2.7
Consumer Identity and Access Management (CIAM) continues to be a growing market year over year, offering a better user experience for the consumer and new challenges for the organization. With a focus on the Japanese market, the updated NRI Secure’s Uni-ID Libra v2.7 continues to provide innovative
Most recent in Zero Trust
Speeding Up Zero Trust Delivery Using Managed Services
Webinar Recording
Speeding Up Zero Trust Delivery Using Managed Services
Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture for ensuring that all IT networks and information systems are protected from cyber-attacks. Martin
The IAM Market: What is driving growth in 2023?
Blog
The IAM Market: What is driving growth in 2023?
Identity and Access Management (IAM) is an essential component of IT security today, enabling organizations to control access to their systems and data by managing user identities, access entitlements and authentication. The importance of IAM continues to grow as cyber threats continue to evolve an
SASE Integration Suites
Leadership Compass
SASE Integration Suites
This report provides an overview of the market for Secure Access Service Edge (SASE) Integration Suites. In this Leadership Compass, we examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing SASE Integration solutions.
Research
Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Blog
See all research
Most recent in Leadership Compass
Unified Endpoint Management (UEM)
May 30, 2023
Unified Endpoint Management (UEM)
This report provides an updated overview of the Unified Endpoint Management (UEM) market and provides a compass to help you find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing UEM
Access Governance
May 08, 2023
Access Governance
The Access Governance (AG) market is continuing to evolve through more intelligent solutions. This Leadership Compass will give an overview and insights into the IGA market, providing you a compass to help you find the products that can meet the criteria necessary for successful IGA deployments.
Fraud Reduction Intelligence  Platforms (FRIP)
Apr 25, 2023
Fraud Reduction Intelligence Platforms (FRIP)
This report provides an overview of the market for Fraud Reduction Intelligence Platforms and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to
Most recent in Whitepaper
Policy-based Provisioning: Automating Access Entitlements and Access Reviews
May 30, 2023
Policy-based Provisioning: Automating Access Entitlements and Access Reviews
Manually granting access to entitlements and access reviews is not easy. Organizations are shifting focus towards learning and discovering capabilities. Automation tools such as policy mining are being introduced to reduce the burden of governance for granting access and reviewing access.
Delivering Business Value through Orchestration
May 16, 2023
Delivering Business Value through Orchestration
In an ever-changing digital world, enterprises and vendors face new digital challenges. This is driving the adoption of new solution strategies in which delivering satisfactory modern identity services is key. As a result, the market is shifting to a more agile and modular approach that leverages
Zoom Unified Communications Platform Security and Compliance
May 12, 2023
Zoom Unified Communications Platform Security and Compliance
Zoom bietet eine Cloud-basierte Unified Communications-Plattform (UCaaS) für Videokommunikation. UCaaS besitzt viele Vorteile, einschließlich Flexibilität, Leistung und Preis. Organisationen sollten ihre UCaaS-Lösung auf Grundlage von Vertrauenswürdigkeit sowie Kosten- und Effizienzvorteilen
Most recent in Executive View
NRI Secure Uni-ID Libra 2.7
May 08, 2023
NRI Secure Uni-ID Libra 2.7
Consumer Identity and Access Management (CIAM) continues to be a growing market year over year, offering a better user experience for the consumer and new challenges for the organization. With a focus on the Japanese market, the updated NRI Secure’s Uni-ID Libra v2.7 continues to provide innovative
Pathlock Platform
Apr 27, 2023
Pathlock Platform
This KuppingerCole Executive View report looks at the Pathlock Platform, a SaaS-based solution for managing access and entitlements in Line of Business (LoB) solutions such as SAP.
Devolutions Server and Remote Desktop Manager
Apr 24, 2023
Devolutions Server and Remote Desktop Manager
CISOs must provide secure, rapid access to on-premises, IaaS and SaaS computing environments. It requires a rethink on traditional approaches to authentication, including to privileged resources. This report looks at the PAM challenges companies face with many thousands of active machine and human
Most recent in Advisory Note
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Nov 09, 2022
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Vulnerability Management (VM) is a security practice that focuses on the process by which organizations identify, analyze, manage, and prevent the exploitation of IT vulnerabilities. If implemented successfully, a VM program has the potential to increase the overall security of the organization and
2022 IAM Reference Architecture
Apr 21, 2022
2022 IAM Reference Architecture
IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. The challenges for future proof IAM are complex, diverse, and sometimes even conflicting. Organizations that demand a
Maturity Level Matrix for IAM
Jan 13, 2022
Maturity Level Matrix for IAM
KuppingerCole Maturity Level Matrices for the major market segments within IAM (Identity, and Access Management), IGA (Identity Governance and Administration) and CIAM (Consumer Identity and Access Management). These provide the foundation for rating the current state of your IAM/IGA projects and
Most recent in Leadership Brief
Why Vulnerability Management Is a Strategic Investment
Nov 04, 2022
Why Vulnerability Management Is a Strategic Investment
Considering that the threat landscape is constantly changing, it is important to maintain a strong cybersecurity foundation. Organizations need security hygiene standards to increase security and readiness while preventing vulnerabilities from being exploited by adversaries. By introducing a
Managing RDP Security Risks to Block Ransomware Attacks
Aug 30, 2022
Managing RDP Security Risks to Block Ransomware Attacks
Remote working is becoming widespread for social and economic reasons, and one of the key enablers is the Remote Desktop Protocol (RDP). However, RDP is one of the most popular initial cyber-attack vectors, which is all too often overlooked. This leadership brief details the security risks
Advanced IT security solutions for OT environments
Aug 09, 2022
Advanced IT security solutions for OT environments
Industrial Control Systems operators are increasingly targeted by Advanced Persistent Threat (APT) actors and cybercriminals as digital transformation accelerates. Many hitherto isolated systems now connected, which introduces additional risks from enterprise IT and the cloud. Although such
Most recent in Blog
Microsoft Putting Decentralized Identities Into Practice
May 17, 2023
Microsoft Putting Decentralized Identities Into Practice
Microsoft has announced their support for Verified Workplace in LinkedIn using Microsoft Entra Verified ID. While this focuses on a specific use case, it is an important step forward towards the ubiquitous use of decentralized identities
Identity as the Most Critical Element of Security
May 03, 2023
Identity as the Most Critical Element of Security
With all of us having multiple identities in today's highly digitized world, it would be difficult to disagree with Hed Kovetz, when he says that identity is "almost the last thing that defines the virtual enterprise". As CEO and Co-Founder of Silverfort, Hed knows a thing or two about managing iden
The IAM Market: What is driving growth in 2023?
Apr 18, 2023
The IAM Market: What is driving growth in 2023?
Identity and Access Management (IAM) is an essential component of IT security today, enabling organizations to control access to their systems and data by managing user identities, access entitlements and authentication. The importance of IAM continues to grow as cyber threats continue to evolve an
Events
cyberevolution
EIC 2024
Webinars
See past events
cyberevolution
cyberevolution
Attend cyberevolution in Germany and meet 500 security experts. Participate in interactive sessions to explore cybersecurity in an AI powered digital world. Network with an international community and learn about societal, technological, and environmental megatrends.
To the Event Call for Speakers
European Identity and Cloud Conference 2024
European Identity and Cloud Conference 2024
Join the iconic identity community from June 4 - 7, 2024 in Berlin! Get the Prime Discount and register for 1,000 EUR!
To the Event
Most recent in Webinars
3rd Party Identity Risk – Der Feind Im Eigenen Haus (?)
Jun 13, 2023
3rd Party Identity Risk – Der Feind Im Eigenen Haus (?)
Unternehmen verwalten heute eine Vielzahl von Identitäten, die über die eigene Belegschaft hinausgehen. Auftragnehmer, Partner, Saisonarbeiter, Lieferanten und sogar nicht-menschliche Mitarbeiter wie RPAs (Robotic Process Automation) und Servicekonten machen einen großen Prozentsatz der Identitäten
Achieve Effective Risk and Vulnerability Management With a Platform Approach
Jun 15, 2023
Achieve Effective Risk and Vulnerability Management With a Platform Approach
Effective cyber security is essentially about identifying and remediating vulnerabilities across the entire IT estate quickly to reduce the risk of cyber attack and data loss. However, a proliferation of disparate tools often makes this difficult to achieve. Companies need to find a better approach.
Delivering True B2B Identity Management in the Modern Era
Jun 20, 2023
Delivering True B2B Identity Management in the Modern Era
In today’s digital-first world, managing the identities of a large number of different business partners remains a challenge for many organizations against a backdrop of ever-increasing cyber risks. A new approach is needed to address modern B2B and B2B2C IAM use cases.
Advisory
Advisory Services

KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.

See Advisory Services
Contact our advisors

E-mail info@kuppingercole.com
Phone
+49 (211) 2370 77-0

Meet our Advisors
Discover and compare cybersecurity solutions

Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.

Visit KC Open Select
Contact KuppingerCole

E-mail info@kuppingercole.com
Phone
+49 (211) 2370 77-0

Contact Us
Company
About us People Jobs Newsroom Contact us
Discover Our Passion for Advancing Identity and Security
We are specialized in the strategic management of digital identities, privileges, authentication, and access control as well as cybersecurity and business resilience.​
Read more about our philosophy
Analysts & Advisors

Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.

Business Team

Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.

Meet the Team
Career Opportunities
(Junior) Advisor (m/w/d) für Cybersecurity, IAM, Digitale Transformation
Advisory
 Stuttgart, Wiesbaden
(Junior) Advisor (m/w/d) für Cybersecurity, IAM, Digitale Transformation
Zum nächstmöglichen Zeitpunkt suchen wir eine/n motivierte/n Advisor/in zur Ergänzung unseres Advisorteams.  Junge Talente – entweder direkt von der Universität oder mit ersten Berufserfahrungen in der Industrie oder Beratung im Bereich Cybersecurity, IAM, Digitale
Analyst Information Security (m/f/d)
Analysts
 Stuttgart | Wiesbaden | Seattle
Analyst Information Security (m/f/d)
As an Analyst for Information Security, you will analyze vendors, products, and trends in Information Security and create research documents. You will provide advice to end users, system integrators, and vendors. If you have a strong knowledge at least of certain fields of Information Security
Senior Analyst Information Security (m/f/d)
Analysts
 Stuttgart | Wiesbaden | Seattle
Senior Analyst Information Security (m/f/d)
As a Senior Analyst for Information Security, you will analyze vendors, products, and trends in Information Security and create research documents and lead research for certain market segments, including creating Leadership Compass documents for these segments in your full responsibility. You will
View all Job Offers
Latest Press Releases
KuppingerCole Honors Outstanding Projects with 2023 European Identity and Cloud Awards
May 11, 2023
KuppingerCole Honors Outstanding Projects with 2023 European Identity and Cloud Awards
Global IT analyst firm KuppingerCole Analysts celebrated the winners of the prestigious 2023 European Identity Awards at this week’s 16th annual European Identity and Cloud Conference in Berlin, attended by some of Europe’s most eminent industry representatives.
KuppingerCole Analysts Predicts SASE Integration Suites Market to Grow to 4.98 bn USD by 2026  
March 16, 2023
KuppingerCole Analysts Predicts SASE Integration Suites Market to Grow to 4.98 bn USD by 2026  
KuppingerCole Analysts predicts a CAGR of 13.65% for this market segment, which will lift the market size to 4.98 billion USD by 2026. The largest share of the global revenue in this market segment comes from North America, currently representing 52.4%.
KuppingerCole Analysts predicts IGA Market to grow to 3.99 bn USD by 2025 
February 23, 2023
KuppingerCole Analysts predicts IGA Market to grow to 3.99 bn USD by 2025 
KuppingerCole research predicts that the Compound Annual Grow Rate (CAGR) of the IGA Market Segment will be 14.3%, lifting the market volume to 3.99 billion US dollars by 2025. The largest share of the global revenue in this market segment comes from North America, currently representing 55.1%.
Basic contact information
KuppingerCole Analysts AG
Wilhelmstr. 20-22
65185 Wiesbaden
Germany
E-mail Phone info@kuppingercole.com
+49 (211) 2370 77-0
Linkedin Linkedin
Twitter Twitter
Facebook Facebook
YouTube YouTube
Instagram Instagram
Contact us
See all locations, phone numbers, e-mail addresses
Blog

KuppingerCole Analyst Chat: Cybersecurity Portfolio Optimization

May 15, 2020
Christopher Schütze

Matthias Reinwarth and Christopher Schütze talk about how to efficiently identify and rate your investments into Cybersecurity.

Free Analyst Advice:
Business Resilience Management (Crisis Roadmap for Beginners)

Latest posts by Christopher Schütze
The Evolution of Endpoint Security: Beyond Anti-Malware
Security Fabric: Investing in the Right Architecture for a Secure Future
3 Steps to Improve Your Cybersecurity with Enterprise Risk Management
KuppingerCole Analyst Chat: Incident Response Management
Linkedin Linkedin
Twitter Twitter
Facebook Facebook
YouTube YouTube
Instagram Instagram
Insights
Business Resilience
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Passwordless Authentication
Privileged Access Management
Zero Trust
Research
Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Blog
Advisory
Advisory Services
Meet our Advisors
Events
cyberevolution
EIC 2024
Webinars
KC Open Select
Visit Open Select
Contact Us
Company
About us
People
Jobs
Newsroom
Contact us
Insights
Business Resilience
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Passwordless Authentication
Privileged Access Management
Zero Trust
Research
Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Blog
Advisory
Advisory Services
Meet our Advisors
Events
cyberevolution
EIC 2024
Webinars
KC Open Select
Visit Open Select
Contact Us
Company
About us
People
Jobs
Newsroom
Contact us
Switch to dark theme
Switch to light theme
Imprint Terms & Conditions Privacy Policy © Copyright KuppingerCole Analysts AG
© Copyright KuppingerCole Analysts AG
Go to Market with KuppingerCole
Go to Market with KuppingerCole