Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Intelligent SIEM Platforms
Buyer's Compass
Intelligent SIEM Platforms
Modern organizations rely heavily on IT and data, making them prime targets for cyber attackers, including activist groups, cybercriminals, and state-sponsored entities. Security Information and...
Cyber Risk Frameworks in 2024
Advisory Note
Cyber Risk Frameworks in 2024
The landscape of cybersecurity is continually evolving, with new threats and technologies reshaping the way organizations protect their digital assets. In order to understand the significance of...
Web Application Firewalls
Leadership Compass
Web Application Firewalls
This report provides up-to-date insights into the Web Application Firewall (WAF) market. We examine the market segment, vendor service functionality, relative market share, and innovation to help...
Managing Cloud Data Migration Risks
Executive View
Managing Cloud Data Migration Risks
Data is the most valuable asset of the modern organization but protecting and controlling it when migrating to cloud services is a major challenge. This report provides an overview of how the...
Xayone Best Practice: Combatting Identity and Document Fraud at Border Control
Executive View
Xayone Best Practice: Combatting Identity and Document Fraud at Border Control
This KuppingerCole Executive View Report looks at a best practice implementation for mitigating identity and document fraud at Royal Air Maroc (RAM) Handling and describes how the implementation of...
Pathlock Cybersecurity Application Controls
Executive View
Pathlock Cybersecurity Application Controls
This KuppingerCole Executive View report looks at Pathlock Cybersecurity Application Controls (CAC), a solution for managing cybersecurity for SAP. A technical review of the solution is included.
Cloud-Native Application Protection Platforms
Buyer's Compass
Cloud-Native Application Protection Platforms
Cloud IaaS is used extensively to develop, deliver new applications, and reengineer existing ones. This is often because cloud services provide an environment for accelerated development without...
Identity Verification
Buyer's Compass
Identity Verification
Being able to verify that an identity does indeed describe the individual it was created for is a valuable capability in many use cases, including know your customer (KYC), passwordless...
Fraud Reduction Intelligence Platforms
Buyer's Compass
Fraud Reduction Intelligence Platforms
Fraud is a major cost to businesses worldwide and this has been exacerbated by the worldwide Covid pandemic. Banking, finance, payment services, and retail are some of the most frequent targets of...
Data Governance
Leadership Compass
Data Governance
This KuppingerCole Leadership Compass on Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and...
Maturity Level for Zero Trust: A Comprehensive Analysis
Advisory Note
Maturity Level for Zero Trust: A Comprehensive Analysis
This Advisory Note explores the fundamental principles of Zero Trust, emphasizing its significance in modern cybersecurity. It discusses the Department of Defense (DoD) Zero Trust Strategy and...
Cybersecurity & IAM:​ 2023 in Numbers
Survey
Cybersecurity & IAM:​ 2023 in Numbers
Significant advancements happened in identity and access management (IAM) and cybersecurity in 2023. For most organizations, it has become more and more important to strengthen cybersecurity and...
1 2 3 4 5 6 7 Next