Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
EIC Speaker Spotlight: Graham Williamson on IoT Project Success
Graham Williamson, Senior Analyst at KuppingerCole, is to deliver a presentation entitled Meeting Expectations – 5 pillars for IoT project success on Tuesday, September 14 starting at 7:20...
Learn more
Executive View
Executive View
Akana by Perforce
Akana API Platform is a fully integrated API management, transformation, and security platform that can address a multitude of enterprise use cases from API design and development to business...
Learn more
Event Recording
Event Recording
Future-Proof Network Detection & Response for IT & OT – Made in Switzerland
Learn more
Zero Trust Network Access
Leadership Compass
Zero Trust Network Access
Zero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats. Unlike traditional...
Cequence Security Unified API Protection
Executive View
Cequence Security Unified API Protection
Cequence Security’s Unified API Protection (UAP) brings together discovery, compliance, and protection across all internal and external APIs to defend against fraud, business logic attacks,...
Tata Communications MDR
Executive View
Tata Communications MDR
This KuppingerCole Executive View report looks at the managed detection and response (MDR) market and at how solutions address key challenges, with a review of the MDR service and related...
Email Security
Leadership Compass
Email Security
This report provides an overview of the Email Security market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor...
ReliaQuest GreyMatter
Executive View
ReliaQuest GreyMatter
Dieser Executive View Report von KuppingerCole befasst sich mit den Herausforderungen im Bereich der Cybersicherheit und den Optionen, die den Sicherheitsverantwortlichen für Managed Security...
API Security & Management
Leadership Compass
API Security & Management
This Leadership Compass provides an overview of the market for API security and management solutions, along with recommendations and guidance for finding the products which address your...
Invisily Zero Trust Network Access
Executive View
Invisily Zero Trust Network Access
Invisily is a Zero Trust Network Access platform that supports a broad range of deployment scenarios without the technical debt of existing competing solutions. It offers several unique...
Speeding up Zero Trust Delivery using Managed Services
Whitepaper
Speeding up Zero Trust Delivery using Managed Services
Zero Trust is important as a fundamental and essential paradigm for a stronger cybersecurity posture. Zero Trust, on the other hand, is complex to put in practice. For succeeding with the Zero...
ExeonTrace NDR
Executive View
ExeonTrace NDR
Network monitoring is a foundational element of security architecture. Sophisticated attackers may deliberately delete logs on servers and endpoints to cover up their tracks. This means that the...
SASE Integration Suites
Leadership Compass
SASE Integration Suites
This report provides an overview of the market for Secure Access Service Edge (SASE) Integration Suites. In this Leadership Compass, we examine the market segment, vendor service functionality,...
Security Orchestration Automation and Response (SOAR)
Leadership Compass
Security Orchestration Automation and Response (SOAR)
This report provides an overview of the SOAR market and a compass to help you find a solution that best meets your needs. We examine the SOAR market segment, product/service functionality, relative...
PingOne Authorize
Executive View
PingOne Authorize
Due to its value and sensitivity, customer identity and data must be protected with strong access management systems. Key use cases include managing usage of customer data and its availability both...
1 2 3 Next