Reports

Reload reports without any filters applied

Selected Filter(s):

  • Cloud Security Services, Brokers & Tools
  • Backup and Disaster Recovery
  • Cloud Service Providers

 All Reports
Advisory Note

KuppingerCole’s Advisory Notes are short reports that present information about a specific topic, company, or product. Advisory Notes are published on a regular basis and are aimed at the management of a company. An Advisory Note gives usage recommendations and helps decision makers solve specific problems.

Executive View

KuppingerCole’s Executive View is a short report with four to five pages written by one of KC’s Analysts about a specific client product. In an Executive View an analyst describes the product in a concise manner and shows its strengths and challenges to give end users a short expert reference.

Leadership Brief

KuppingerCole’s Leadership Brief provides condensed research and advice for executives and decision makers in organizations. These two-page documents cover business challenges and advise on how to address them, focusing on the key issues and allowing decision makers to quickly identify the right solutions.

Leadership Compass

KuppingerCole’s Leadership Compass is a tool that provides an overview of a particular IT market segment and identifies the leader in that segment. It is the compass that assists decision makers in identifying the right vendors and products for their projects.

Product Report

KuppingerCole’s Product Report is a report written by one of KC’s analysts about a special client product. In a Product Report an analyst describes the company and its product in a detailed way and looks closely at different aspects of the product to give end users an extensive expert reference.

Survey

KuppingerCole’s Surveys present the results of a predetermined set of questions that are given to a special target group. Surveys are published on a regular basis or due to assignment through a partner.

Vendor Report

KuppingerCole’s Vendor Report is a report written by one of KC’s Analysts about a specific company. In a vendor report an analyst describes the company and its whole product range in detailto give end users an extensive expert reference about the company as a vendor.

Whitepaper

KuppingerCole’s Whitepaper is a report written by one of KC’s analysts that informs readers about a specific, usually complex issue. A whitepaper is meant to help readers understand an issue, solve a problem, or make a decision.

 2019

top  

Date Title Price
Nov 07, 2019

Leadership Compass: Infrastructure as a Service – Global Providers - 80035

Mike Small

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment.  This Leadership Compass focusses on Infrastructure as a Service (IaaS) from Cloud Service providers (CSP) with a global presence and with a specific focus on security and compliance.

Sep 03, 2019

Executive View: Oracle Identity Cloud Service - 80156

Mike Small

Most organizations now have a hybrid IT environment with a cloud first approach to choosing new applications.  While this provides many benefits it also creates challenges around security and administration.  Managing identity and access in a consistent manner across all IT services, irrespective of how they are delivered, is key to meeting these challenges.  This report…

Nov 04, 2019

Executive View: Atos DirX Access - 80167

Martin Kuppinger

Atos DirX Access is a mature solution for Access Management, covering the full range of targets from legacy web applications to modern SaaS services. It comes with comprehensive support for modern standards, including FIDO 2.0. A specific strength is the support for specific capabilities such as session state sharing across servers, Dynamic Authorization Management, or integrated User…

Oct 25, 2019

Leadership Brief: Defending Against Ransomware - 80235

John Tolbert

Ransomware is an epidemic and continues to evolve. More than half of all companies and other organizations have been attacked with one form or ransomware or another. A multi-layered defense is the best strategy. Take steps now to reduce the likelihood of falling victim to it. Make sure you have good offline backups if you get hit. Don’t give up and pay the ransom.

Oct 09, 2019

Executive View: Curity Identity Server - 80159

John Tolbert

Curity AB delivers a software-based API-driven identity server for businesses that need help connecting identity infrastructure, digital services, and cloud applications. Their solution adheres to many identity standards, to promote interoperability and to make it easier for clients to deploy necessary new features while shielding users from complexity.

Oct 07, 2019

Executive View: AWS Control Tower - 80219

Mike Small

Managing access to applications, systems and resources is a key task for any organization and the hybrid IT deployment model has made this even more complex.  One area of concern is managing administrative access – administration is an essential process, but the administrator accounts provide the keys to the kingdom. This report describes how AWS Control Tower helps to…

Sep 10, 2019

Executive View: Akamai Zero Trust Security - 80054

Alexei Balaganski

Akamai’s Intelligent Edge Platform offers a broad range of access management, threat protection, and application security services that will support you in your journey to Zero Trust, making it safe, scalable and easy to manage – delivered entirely from the cloud.

Sep 02, 2019

Whitepaper: Oracle Identity Cloud Service: Identity for Business Applications in the Hybrid IT - 80155

Martin Kuppinger

Today, most businesses are using hybrid IT, with a mix on-premises and cloud applications and services. And hybrid IT is here to stay, given that many of the legacy applications are hard and costly to migrate. Thus, Identity Services must work well for all these applications and the entire hybrid IT  infrastructure. While they increasingly run from the cloud, as IDaaS (Identity as a…

Aug 29, 2019

Executive View: Micro Focus® Data Protector - 80193

Mike Small

Ensuring the continuity of IT services is an essential component of business continuity planning. Organizations typically use data protection solutions that take copies of the IT service data which can be used to restore the service when needed. Most organizations now have a hybrid IT environment with a cloud first approach to choosing new applications and data protection solutions need…

Mar 22, 2019

Executive View: Digital Shadows SearchLight™ - 79041

Matthias Reinwarth

Digital Risk Protection as a Service. A combination of data loss protection, the securing of brands and reputation online and the reduction of the overall attack surface by identifying weaknesses in an organization’s infrastructure.

Feb 14, 2019

Advisory Note: Maturity Level Matrix for Cyber Security - 72555

Mike Small

KuppingerCole Maturity Level Matrixes for the major market segments within cyber security. These provide the foundation for rating the current state of your cyber security projects and programs.  

Feb 06, 2019

Whitepaper: Cisco: Next-Generation Enterprise Security Delivered from the Cloud: Addressing Modern Cyber Threats with Cisco Umbrella - 80017

Alexei Balaganski

As businesses embrace the Digital Transformation and become increasingly cloud-native, mobile and interconnected, the corporate network perimeter is gradually disappearing, exposing users to malware, ransomware, and other cyber threats. Traditional perimeter security tools no longer provide adequate visibility, threat protection, and scalability, nor can they offer convenience and…

 2018

top  

Date Title Price
Aug 17, 2018

Executive View: CipherCloud CASB+ - 79037

Mike Small

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. This report provides an up to date review of CipherCloud CASB+ which strongly matches…

Jun 22, 2018

Buyer's Guide: Hybrid Cloud Services - 72562

Mike Small

Organizations now commonly use multiple cloud services as well as on premises IT. This KuppingerCole Buyer’s Guide focusses on IaaS services. It will provide you with questions to ask vendors, criteria to select your vendor, and the requirements for successful deployments. This report will prepare your organization to conduct RFIs and RFPs for IaaS as part of a Hybrid IT service…

Mar 14, 2018

Advisory Note: Security Organization Governance and the Cloud - 72564

Mike Small

The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost.   This document provides an overview of the approach that enables an organization to securely and reliably use cloud services to achieve business objectives.

Feb 28, 2018

Advisory Note: Cloud Services and Security - 72561

Mike Small

This report provides a review of the major security risks from the use of cloud services, how responsibility for security is divided between Cloud Service Provider and customer and the key controls that an organization should implement to manage these risks. 

Feb 13, 2018

Advisory Note: How to Assure Cloud Services - 72563

Mike Small

This report is one of a series of documents around the use of cloud services.  It identifies how standards as well as, independent certifications and attestations can be used to assure the security and compliance of cloud services.

Nov 29, 2018

Leadership Compass: Cloud Access Security Brokers - 70614

Mike Small

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

Oct 17, 2018

Executive View: Zscaler Security-as-a-Service Platform - 72505

Alexei Balaganski

Zscaler is the world’s largest multi-tenant distributed cloud security platform that delivers a broad range of services without any on-premises hardware or software agents, including cybersecurity, network transformation, public cloud connectivity, and secure access to on-premises and cloud services.

Sep 06, 2018

Executive View: Delphix Dynamic Data Platform - 79010

Alexei Balaganski

Die Delphix Dynamic Data Platform ist eine integrierte Plattform für die Verwaltung, Absicherung und Replizierung von Daten in lokalen, cloudbasierten und Hybrid-Umgebungen. Sie kombiniert eine hochleistungsfähige Virtualisierung mit integriertem Data Masking und automatisierten Self-Service-Workflows. Auf diese Weise erhöht sie signifikant die Effizienz in Bezug auf Agile…

Jul 17, 2018

Executive View: Delphix Dynamic Data Platform - 79010

Alexei Balaganski

Delphix Dynamic Data Platform is an integrated platform for managing, securing and replicating data across on-premises, cloud and hybrid environments. Combining high-performance virtualization, integrated masking and automated self-service workflows, it significantly increases efficiency of agile development, data analytics, cloud migration, disaster recovery and other DataOps use cases.

Apr 16, 2018

Leadership Compass: Infrastructure as a Service – Global Providers - 70303

Mike Small

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment.  This Leadership Compass focusses on Infrastructure as a Service (IaaS) from Cloud Service providers (CSP) with a global presence and with a specific focus on security and compliance.

Feb 28, 2018

Whitepaper: GDPR Herausforderungen mit Delphix meistern - 70368

Mike Small

Mit der neuen Datenschutz-Grundverordnung (GDPR) führt die EU strenge Kontrollen bezüglich der Verarbeitung personenbezogener Daten von EU-Bürgern sowie hohe Geldstrafen bei Nicht-Einhaltung eben dieser ein. Die Compliance der Grundverordnung erfordert kostenintensive Kontrollen, die sich mit den direkten geschäftlichen Vorteilen der Verarbeitung personenbezogener…

Feb 28, 2018

Whitepaper: Meeting GDPR Challenges with Delphix - 70368

Mike Small

GDPR introduces stringent controls over the processing of PII relating to people resident in the EU with high penalties for non-compliance.  Compliance requires costly controls that can be justified for processing of PII with direct business benefits.  However, using PII for non-production purposes such as development and test, incur the same risks and need the same costly…

Jan 16, 2018

Executive View: Symantec CloudSOC™ - 70615

Mike Small

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. This report provides an up to date review of Symantec CloudSOC™ which strongly matches…

 2017

top  

Date Title Price
Aug 02, 2017

Executive View: Microsoft Azure Stack - 72592

Alexei Balaganski

Microsoft Azure Stack is an integrated hardware and software platform for delivering Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) services of Microsoft Azure public cloud on premises, providing a truly consistent hybrid cloud platform for a wide variety of business use cases.

€190.00 *
Aug 17, 2017

Leadership Compass: Cloud Access Security Brokers - 72534

Mike Small

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

€1295.00 *
May 02, 2017

Executive View: Vendor Overview CyberArk - 70280

Graham Williamson

CyberArk is a pioneer in Privileged Account Security, and is widely recognized as the leader in this sector. Building upon a strong base product, CyberArk has enhanced its offering to include the capabilities that organizations need to secure and manage pr ivileged  accounts and their credentials associated with users, applications, and other system assets across  an…

€190.00 *
Feb 28, 2017

Executive View: NextLabs Data Centric Security in the Hybrid Cloud - 72531

Mike Small

Organizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with external parties. NextLabs Data Centric Security Suite provides a proven tool that can protect data and ensure compliance in this hybrid environment.

€190.00 *
Feb 15, 2017

Executive View: CensorNet Cloud Security Platform - 72529

Mike Small

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. CensorNet Unified Security Service provide a valuable tool that organizations can use to improve…

€190.00 *
Jan 11, 2017

Advisory Note: Plant Automation Security - 71560

Graham Williamson

Industrial Computer Systems (ICS) are increasingly coming under attack as hackers are realizing the economic and reputational benefit of a successful operations technology system compromise. Organizations seeking to exploit their plant automation systems to drive business processes are deploying communications paths to their ICSs and raising the risk profile of their organizations.

€995.00 *
Aug 17, 2017

Executive View: eperi Encryption Gateway - 70619

Alexei Balaganski

eperi provides an encryption gateway for data stored in the cloud, based on a unique flexible approach based on templates that specify which data should be  encrypted and how. Combined with built-in indexing capabilities, the product enables fully transparent and infinitely extensible end-to-end cloud data  encryption with out-of-the-box support for popular SaaS applications.

€190.00 *
Apr 21, 2017

Executive View: EmpowerID - 70297

John Tolbert

EmpowerID provides  a complete solution for IAM, CIAM, and Adaptive  Authentication.  With a highly  customizable workflow and authorization engine,  EmpowerID delivers advanced functionality for  enterprise and government  customers.

€190.00 *
Mar 29, 2017

Whitepaper: VMWare: Unified management and control of the digital workspace - 70286

Matthias Reinwarth

Identity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach for the administration and supervision  of all types of users, end user software and devices can foster efficiency, agility and security in many…

€295.00 *
Jan 30, 2017

Executive View: AWS Lambda - 72524

Alexei Balaganski

AWS Lambda is an event-driven serverless computing platform that completely abstracts the underlying cloud infrastructure to let developers focus on the core business functionality of their applications, providing transparent scalability and redundancy across multiple datacenters in the Amazon Cloud.

€190.00 *
Jan 30, 2017

Executive View: Microsoft Security Suite - 72541

Graham Williamson

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

€190.00 *
Jan 16, 2017

Executive View: Watchful Software RightsWatch - 70848

Dave Kearns

RightsWATCH automatically classifies and protects any file format in accordance with corporate policy based on content, context or metadata-aware policy rules, extending the Microsoft Right Management facility to ensure that sensitive and confidential information is identified and classified appropriately.

€190.00 *
Jan 13, 2017

Executive View: SAP HANA Cloud Platform Identity Authentication and Provisioning - 70290

John Tolbert

SAP HANA Cloud Platform Identity Authentication and Provisioning is a cloud- based platform for provisioning and managing digital identities and access for SAP solutions and more.  

€190.00 *

 2016

top  

Date Title Price
Dec 19, 2016

Executive View: CipherCloud Trust Platform - 72530

Mike Small

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. CipherCloud Trust Platform provides a valuable tool that organizations can use to improve governance…

€190.00 *
Dec 14, 2016

Executive View: Skyhigh Cloud Security Platform - 72532

Mike Small

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. Skyhigh Cloud Security Platform provides a valuable tool that organizations can use to improve…

€190.00 *
Nov 24, 2016

Executive View: Vaultive Cloud Data Security Platform - 72533

Mike Small

The data held in office productivity suites like Office 365 spans the whole operation of an organization from the board to the shop floor.  This makes it imperative that it is protected against risks of leakage and unauthorized disclosure.  Vaultive cloud data security provides an important solution for organizations seeking an approach for encrypting and otherwise protecting…

€190.00 *
Aug 23, 2016

Leadership Compass: Cloud Access Security Brokers - 71138

Mike Small

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

€1295.00 *
Jan 20, 2016

Executive View: IBM Cloud Security Enforcer - 71523

Mike Small

IBM Cloud Security Enforcer is a cloud-delivered solution that provides cloud application visibility, identity and access management, and threat prevention.

€190.00 *
Oct 14, 2016

Advisory Note: Rising to the Security Challenge of Heavy Cloud Adoption - 72542

Dan Blum

Many enterprises have decided on a “cloud first” strategy, or have seen heavy cloud adoption evolve spontaneously as their business units embrace cloud for cost savings, agility or other competitive imperatives. Security teams face challenges controlling, influencing or enabling cloud adoption. This document provides guidance on how IT security leadership should deal with the…

€995.00 *
Jul 21, 2016

Executive View: Sophos Protection for Amazon Web Services - 71680

Mike Small

Sophos UTM is a suite of integrated security applications that provides the same layered protection for applications and data hosted in the AWS cloud as for on premise deployments. This report provides a review of the functionality provided by this set of products and an assessment of its strengths and challenges.

€190.00 *
May 03, 2016

Executive View: Signicat Connect, Assure, Sign & Preserve - 72504

Martin Kuppinger

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. With these services, Signicat supports organizations in transforming paper-based processes to cloud-based services, while meeting legal and security requirements.

€190.00 *

 2015

top  

Date Title Price
Jul 28, 2015

Executive View: Virtustream IaaS – Security and Assurance - 71285

Mike Small

An overview of the Virtustream Infrastructure as a Service together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

€190.00 *
Oct 15, 2015

Executive View: AlienVault Unified Security Management (USM) Platform - 72520

Mike Small

AlienVault Unified Security Management (USM) platform provides a complete all in one security management solution for organizations with limited resources such as security staff, time and budget.

€190.00 *
Sep 02, 2015

Executive View: Using Certification for Cloud Provider Selection - 71308

Mike Small

An overview of how to use certification to assist in selecting a cloud service provider. 

€190.00 *
Aug 19, 2015

Executive View: Zscaler Internet Security Platform - 71010

Alexei Balaganski

Zscaler is a unified Security-as-a-Service platform integrating various security services like web and mobile security, next generation firewall, data leakage prevention, advanced threat protection and bandwidth management in an entirely cloud-based solution without any on-premise hardware.

€190.00 *
Aug 03, 2015

Executive View: FireHost Secure Virtual Private Cloud – Security and Assurance - 71284

Mike Small

An overview of FireHost Secure Virtual Private Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

€190.00 *
Jul 09, 2015

Executive View: HP Helion Managed Virtual Private Cloud – Security and Assurance - 71288

Mike Small

This report provides an overview of HP Helion Managed Virtual Private Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

€190.00 *
Jul 01, 2015

Executive View: VMWare vCloud® Air™ – Security and Assurance - 71286

Mike Small

This report provides an overview of VMWare vCloud Air Infrastructure as a Service together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

€190.00 *
May 05, 2015

Advisory Note: Information Security Predictions and Recommendations 2015 and beyond - 71045

Martin Kuppinger    Dave Kearns

Recommendations for investing in Information Security in 2015 and beyond. Predictions of the trends and hypes in Information Security in 2015. Advice on which of these trends and hypes to follow.

€995.00 *
Apr 27, 2015

Executive View: iWelcome Identity & Access Management as a Service - 71205

Martin Kuppinger

iWelcome delivers Identity and Access Management as a Service. The company, based in the Netherlands, runs all services from data centers located within the EU and covers a broad set of features for both managing identity and access for cloud and on-premise services.

€190.00 *
Apr 22, 2015

Executive View: Dell One Identity Cloud Access Manager - 71250

Martin Kuppinger

Dell One Identity Cloud Access Manager is an on-premise solution for Identity Federation and Web Access Management, enabling both business users to seamlessly access cloud services and external users to connect to internal, web-based applications.

€190.00 *
Apr 09, 2015

Executive View: Microsoft Azure – Security and Assurance - 71282

Mike Small

This report provides an overview of the Microsoft Azure cloud services together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

€190.00 *
Apr 02, 2015

Executive View: AWS – Security and Assurance - 71280

Mike Small

Amazon Web Services (AWS) offers a broad set of over 40 services including compute, storage, database, analytics, application, and deployment. This report provides an overview of the security and assurance aspects of these services.

€190.00 *
Mar 30, 2015

Executive View: IBM SoftLayer – Security and Assurance - 71281

Mike Small

IBM SoftLayer provides infrastructure services direct to customers and is also the foundation for many of IBM’s cloud services such as BlueMix. The SoftLayer platform is able to provide “bare metal” access to computing resources resulting in high performance. This report provides an overview of the security and assurance aspects of these services.

€195.00 *
Mar 27, 2015

Executive View: Rackspace Managed Cloud Hosting – Security and Assurance - 71283

Mike Small

This report provides an overview of Rackspace Managed Cloud Hosting services together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

€190.00 *
Mar 26, 2015

Leadership Compass: Infrastructure as a Service - 70959

Mike Small

This report provides an overview and analysis of the market for Infrastructure as a Service (IaaS). IaaS provides basic computing resources that the customer can use over a network to run software and to store data. This report provides you with a compass to help you to find the IaaS service that best meets your needs.

€1295.00 *
Feb 20, 2015

Studie zu digitalen Risiken und Sicherheitsbewusstsein - 71252

Martin Kuppinger

In einer weltweiten Online-Studie befragte KuppingerCole Experten aus dem Bereich der Informationssicherheit zu ihrer derzeitigen Wahrnehmung von digitalen Risiken und Sicherheit. Die Studie weist auf eine signifikant gestiegene Wahrnehmung beider Bedrohungen, d.h. von potenziellen Angriffen und Risiken, hin.

free
Feb 05, 2015

Digital Risk and Security Awareness Survey - 71252

Martin Kuppinger

A survey on the awareness of digital risks and security risks run and compiled by KuppingerCole. Providing insight into the current perception of digital and security risks, complemented with analysis and recommendations by KuppingerCole.

free

 2014

top  

Date Title Price
Jul 15, 2014

Leadership Compass: Cloud IAM/IAG - 71121

Martin Kuppinger

The Cloud IAM market is currently driven by products that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity Access Management/Governance) as an alternative to on-premise IAM suites, and Cloud IAM solutions that…

€1295.00 *
Oct 13, 2014

Advisory Note: Security Organization, Governance, and the Cloud - 71151

Mike Small

The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost.  This document provides an overview of the approach that enables an organization to securely and reliably use cloud services to achieve business objectives.

€995.00 *
Jul 18, 2014

Executive View: Symantec.cloud Security Services - 70926

Mike Small

Symantec was founded in 1982 and has evolved to become one of the world’s largest software companies with more than 18,500 employees in more than 50 countries. Symantec provides a wide range of software and services covering security, storage and systems management for IT systems.   Symantec has a very strong reputation in the field of IT security that has been built…

€190.00 *
May 13, 2014

Executive View: Cloud Standards Cross Reference - 71124

Mike Small

Cloud services are built using a technical architecture that may include both proprietary and standard protocols and interfaces. Many of these standard protocols and interfaces are already available and indeed form the basis of cloud connectivity. However the services themselves have significant proprietary content and this can make the costs of changing provider high.  This document…

€190.00 *
Feb 04, 2014

Product Report: Akamai Intelligent Platform - 70874

Rob Newby

Akamai is a software platform, originally built on Linux, and able to run on commodity hardware. According to Akamai’s own metrics, at any one time between 15% and 30% of web traffic is going between Akamai servers. It is not a separate network, running as it does over the Internet using the same backend connections, but it is resilient, and lessens traffic between Internet nodes.…

€495.00 *

 2013

top  

Date Title Price
Oct 28, 2013

Advisory Note: Infrastructure as a Service Market Report - 71021

Mike Small

This report provides an overview and analysis of the market for Infrastructure as a Service (IaaS). IaaS provides basic computing resources that the customer can use over a network to run software and to store data. This report shows that there is a range of IaaS service providers with strengths in various areas.

€495.00 *
Jul 03, 2013

Executive View: Salesforce Platform as a Service – Security and Assurance - 70751

Mike Small

Salesforce.com is best known as the provider of a cloud based CRM system.  Salesforce also provides a platform which can be used to develop and deploy cloud based applications.  This executive view provides an overview of this platform focused on the security and assurance aspects...

€190.00 *
May 13, 2013

Advisory Note: Selecting your cloud provider - 70742

Mike Small

The ready availability of cloud services has made it easy for employees and associates to obtain and use these services without consideration of the potential impact on the organization. Therefore, in order to ensure good governance over the use of cloud services, it is imperative that organizations create and communicate a policy for their acquisition and use. This should be supported by…

€495.00 *

 2012

top  

Date Title Price
Oct 02, 2012

Advisory Note: Cloud Provider Assurance - 70586

Mike Small

Can an organization trust an IT service provided through the Cloud? A survey by KuppingerCole showed that “Cloud security issues (84.4%) and Cloud privacy and compliance issues (84.9%) are the major inhibitors preventing organizations from moving to a private Cloud.” The answer to this question can be found in the old Russian maxim, which was often quoted by President Ronald…

€495.00 *
Jul 11, 2012

Scenario: Understanding Cloud Security - 70321

Mike Small

This research note is one of series of documents describing KuppingerCole’s basic positions and providing insights into IT Service and Information Security Management. It describes the principal information security risks associated with Cloud computing and how these risks can be managed by effective IT service management using the KuppingerCole model. The Cloud provides an…

€995.00 *
Apr 18, 2012

Best Practice: European Identity Award 2012: Sanofi S.A. - 70704

Martin Kuppinger

Best Project 2012 in the Category „Best Cloud Security Project”: Implementing Federation quickly to support business requirements. Federation becoming a business enabling technology. Building the foundation for future business cases. Enabling secure access to Cloud applications.

free

 2011

top  

Date Title Price
Dec 08, 2011

Vendor Report: Oracle Cloud Security - 70160

Mike Small

This document is an evaluation of Oracle’s platform for Cloud computing from an information security perspective. Oracle offers a comprehensive set of tools and technologies upon which to build Cloud services. These services which can be built range from IaaS (Infrastructure as a Service) using Oracle VM Server software and Sun hardware through to SaaS (Software as a Service) built…

€195.00 *
Aug 29, 2011

Vendor Report: Microsoft® Cloud Security - 70126

Mike Small

This document is an evaluation of Microsoft’s Windows Azure™ Cloud platform from a security perspective. This platform allows organizations to build Cloud applications which are then hosted in the worldwide network of Microsoft datacenters. It also allows organizations to host existing applications that run under Windows Server 2008 and certain types of data in these Microsoft…

€195.00 *
Mar 23, 2011

Advisory Note: Cloud Computing - Cloud Security Management - 70139

Mike Small

The Cloud allows the procurement of IT services from both internal and external suppliers to be opti-mized because the services are delivered through the Internet in a standard way.   The Cloud is not a single model but covers a wide spectrum from applications shared between multiple tenants to virtual servers used by one customer and hosted internally.  The information…

€95.00 *
Mar 15, 2011

Vendor Report: Symantec Cloud Security - 70115

Mike Small

The Cloud is an environment which allows the delivery of IT services in a standardized way.   This standardization makes it possible to optimize the procurement of IT services from both external and internal providers.   The information security risks associated with Cloud computing depend upon both the service model and the delivery model adopted.   The…

€95.00 *

 2010

top  

Date Title Price
Dec 21, 2010

Product Report: Zscaler Cloud Security

Alexei Balaganski

Zscaler is an integrated SaaS solution for web and e-mail security offered by the US-based company of the same name. It provides a cloud platform for anti-malware and anti-spam protection, application control, and data loss prevention. What makes Zscaler stand out their competitors in SaaS security market is that their solution is entirely cloud-based and does not require any extra…

€95.00 *

 2019

top  

Date Title Price
Feb 14, 2019

Advisory Note: Maturity Level Matrix for Cyber Security - 72555

Mike Small

KuppingerCole Maturity Level Matrixes for the major market segments within cyber security. These provide the foundation for rating the current state of your cyber security projects and programs.  

 2018

top  

Date Title Price
Jun 22, 2018

Buyer's Guide: Hybrid Cloud Services - 72562

Mike Small

Organizations now commonly use multiple cloud services as well as on premises IT. This KuppingerCole Buyer’s Guide focusses on IaaS services. It will provide you with questions to ask vendors, criteria to select your vendor, and the requirements for successful deployments. This report will prepare your organization to conduct RFIs and RFPs for IaaS as part of a Hybrid IT service…

Mar 14, 2018

Advisory Note: Security Organization Governance and the Cloud - 72564

Mike Small

The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost.   This document provides an overview of the approach that enables an organization to securely and reliably use cloud services to achieve business objectives.

Feb 28, 2018

Advisory Note: Cloud Services and Security - 72561

Mike Small

This report provides a review of the major security risks from the use of cloud services, how responsibility for security is divided between Cloud Service Provider and customer and the key controls that an organization should implement to manage these risks. 

Feb 13, 2018

Advisory Note: How to Assure Cloud Services - 72563

Mike Small

This report is one of a series of documents around the use of cloud services.  It identifies how standards as well as, independent certifications and attestations can be used to assure the security and compliance of cloud services.

 2017

top  

Date Title Price
Jan 11, 2017

Advisory Note: Plant Automation Security - 71560

Graham Williamson

Industrial Computer Systems (ICS) are increasingly coming under attack as hackers are realizing the economic and reputational benefit of a successful operations technology system compromise. Organizations seeking to exploit their plant automation systems to drive business processes are deploying communications paths to their ICSs and raising the risk profile of their organizations.

€995.00 *

 2016

top  

Date Title Price
Oct 14, 2016

Advisory Note: Rising to the Security Challenge of Heavy Cloud Adoption - 72542

Dan Blum

Many enterprises have decided on a “cloud first” strategy, or have seen heavy cloud adoption evolve spontaneously as their business units embrace cloud for cost savings, agility or other competitive imperatives. Security teams face challenges controlling, influencing or enabling cloud adoption. This document provides guidance on how IT security leadership should deal with the…

€995.00 *

 2015

top  

Date Title Price
May 05, 2015

Advisory Note: Information Security Predictions and Recommendations 2015 and beyond - 71045

Martin Kuppinger    Dave Kearns

Recommendations for investing in Information Security in 2015 and beyond. Predictions of the trends and hypes in Information Security in 2015. Advice on which of these trends and hypes to follow.

€995.00 *

 2014

top  

Date Title Price
Oct 13, 2014

Advisory Note: Security Organization, Governance, and the Cloud - 71151

Mike Small

The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost.  This document provides an overview of the approach that enables an organization to securely and reliably use cloud services to achieve business objectives.

€995.00 *

 2013

top  

Date Title Price
Oct 28, 2013

Advisory Note: Infrastructure as a Service Market Report - 71021

Mike Small

This report provides an overview and analysis of the market for Infrastructure as a Service (IaaS). IaaS provides basic computing resources that the customer can use over a network to run software and to store data. This report shows that there is a range of IaaS service providers with strengths in various areas.

€495.00 *
May 13, 2013

Advisory Note: Selecting your cloud provider - 70742

Mike Small

The ready availability of cloud services has made it easy for employees and associates to obtain and use these services without consideration of the potential impact on the organization. Therefore, in order to ensure good governance over the use of cloud services, it is imperative that organizations create and communicate a policy for their acquisition and use. This should be supported by…

€495.00 *

 2012

top  

Date Title Price
Oct 02, 2012

Advisory Note: Cloud Provider Assurance - 70586

Mike Small

Can an organization trust an IT service provided through the Cloud? A survey by KuppingerCole showed that “Cloud security issues (84.4%) and Cloud privacy and compliance issues (84.9%) are the major inhibitors preventing organizations from moving to a private Cloud.” The answer to this question can be found in the old Russian maxim, which was often quoted by President Ronald…

€495.00 *
Jul 11, 2012

Scenario: Understanding Cloud Security - 70321

Mike Small

This research note is one of series of documents describing KuppingerCole’s basic positions and providing insights into IT Service and Information Security Management. It describes the principal information security risks associated with Cloud computing and how these risks can be managed by effective IT service management using the KuppingerCole model. The Cloud provides an…

€995.00 *
Apr 18, 2012

Best Practice: European Identity Award 2012: Sanofi S.A. - 70704

Martin Kuppinger

Best Project 2012 in the Category „Best Cloud Security Project”: Implementing Federation quickly to support business requirements. Federation becoming a business enabling technology. Building the foundation for future business cases. Enabling secure access to Cloud applications.

free

 2011

top  

Date Title Price
Mar 23, 2011

Advisory Note: Cloud Computing - Cloud Security Management - 70139

Mike Small

The Cloud allows the procurement of IT services from both internal and external suppliers to be opti-mized because the services are delivered through the Internet in a standard way.   The Cloud is not a single model but covers a wide spectrum from applications shared between multiple tenants to virtual servers used by one customer and hosted internally.  The information…

€95.00 *

 2019

top  

Date Title Price
Sep 03, 2019

Executive View: Oracle Identity Cloud Service - 80156

Mike Small

Most organizations now have a hybrid IT environment with a cloud first approach to choosing new applications.  While this provides many benefits it also creates challenges around security and administration.  Managing identity and access in a consistent manner across all IT services, irrespective of how they are delivered, is key to meeting these challenges.  This report…

Nov 04, 2019

Executive View: Atos DirX Access - 80167

Martin Kuppinger

Atos DirX Access is a mature solution for Access Management, covering the full range of targets from legacy web applications to modern SaaS services. It comes with comprehensive support for modern standards, including FIDO 2.0. A specific strength is the support for specific capabilities such as session state sharing across servers, Dynamic Authorization Management, or integrated User…

Oct 09, 2019

Executive View: Curity Identity Server - 80159

John Tolbert

Curity AB delivers a software-based API-driven identity server for businesses that need help connecting identity infrastructure, digital services, and cloud applications. Their solution adheres to many identity standards, to promote interoperability and to make it easier for clients to deploy necessary new features while shielding users from complexity.

Oct 07, 2019

Executive View: AWS Control Tower - 80219

Mike Small

Managing access to applications, systems and resources is a key task for any organization and the hybrid IT deployment model has made this even more complex.  One area of concern is managing administrative access – administration is an essential process, but the administrator accounts provide the keys to the kingdom. This report describes how AWS Control Tower helps to…

Sep 10, 2019

Executive View: Akamai Zero Trust Security - 80054

Alexei Balaganski

Akamai’s Intelligent Edge Platform offers a broad range of access management, threat protection, and application security services that will support you in your journey to Zero Trust, making it safe, scalable and easy to manage – delivered entirely from the cloud.

Aug 29, 2019

Executive View: Micro Focus® Data Protector - 80193

Mike Small

Ensuring the continuity of IT services is an essential component of business continuity planning. Organizations typically use data protection solutions that take copies of the IT service data which can be used to restore the service when needed. Most organizations now have a hybrid IT environment with a cloud first approach to choosing new applications and data protection solutions need…

Mar 22, 2019

Executive View: Digital Shadows SearchLight™ - 79041

Matthias Reinwarth

Digital Risk Protection as a Service. A combination of data loss protection, the securing of brands and reputation online and the reduction of the overall attack surface by identifying weaknesses in an organization’s infrastructure.

 2018

top  

Date Title Price
Aug 17, 2018

Executive View: CipherCloud CASB+ - 79037

Mike Small

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. This report provides an up to date review of CipherCloud CASB+ which strongly matches…

Oct 17, 2018

Executive View: Zscaler Security-as-a-Service Platform - 72505

Alexei Balaganski

Zscaler is the world’s largest multi-tenant distributed cloud security platform that delivers a broad range of services without any on-premises hardware or software agents, including cybersecurity, network transformation, public cloud connectivity, and secure access to on-premises and cloud services.

Sep 06, 2018

Executive View: Delphix Dynamic Data Platform - 79010

Alexei Balaganski

Die Delphix Dynamic Data Platform ist eine integrierte Plattform für die Verwaltung, Absicherung und Replizierung von Daten in lokalen, cloudbasierten und Hybrid-Umgebungen. Sie kombiniert eine hochleistungsfähige Virtualisierung mit integriertem Data Masking und automatisierten Self-Service-Workflows. Auf diese Weise erhöht sie signifikant die Effizienz in Bezug auf Agile…

Jul 17, 2018

Executive View: Delphix Dynamic Data Platform - 79010

Alexei Balaganski

Delphix Dynamic Data Platform is an integrated platform for managing, securing and replicating data across on-premises, cloud and hybrid environments. Combining high-performance virtualization, integrated masking and automated self-service workflows, it significantly increases efficiency of agile development, data analytics, cloud migration, disaster recovery and other DataOps use cases.

Jan 16, 2018

Executive View: Symantec CloudSOC™ - 70615

Mike Small

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. This report provides an up to date review of Symantec CloudSOC™ which strongly matches…

 2017

top  

Date Title Price
Aug 02, 2017

Executive View: Microsoft Azure Stack - 72592

Alexei Balaganski

Microsoft Azure Stack is an integrated hardware and software platform for delivering Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) services of Microsoft Azure public cloud on premises, providing a truly consistent hybrid cloud platform for a wide variety of business use cases.

€190.00 *
May 02, 2017

Executive View: Vendor Overview CyberArk - 70280

Graham Williamson

CyberArk is a pioneer in Privileged Account Security, and is widely recognized as the leader in this sector. Building upon a strong base product, CyberArk has enhanced its offering to include the capabilities that organizations need to secure and manage pr ivileged  accounts and their credentials associated with users, applications, and other system assets across  an…

€190.00 *
Feb 28, 2017

Executive View: NextLabs Data Centric Security in the Hybrid Cloud - 72531

Mike Small

Organizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with external parties. NextLabs Data Centric Security Suite provides a proven tool that can protect data and ensure compliance in this hybrid environment.

€190.00 *
Feb 15, 2017

Executive View: CensorNet Cloud Security Platform - 72529

Mike Small

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. CensorNet Unified Security Service provide a valuable tool that organizations can use to improve…

€190.00 *
Aug 17, 2017

Executive View: eperi Encryption Gateway - 70619

Alexei Balaganski

eperi provides an encryption gateway for data stored in the cloud, based on a unique flexible approach based on templates that specify which data should be  encrypted and how. Combined with built-in indexing capabilities, the product enables fully transparent and infinitely extensible end-to-end cloud data  encryption with out-of-the-box support for popular SaaS applications.

€190.00 *
Apr 21, 2017

Executive View: EmpowerID - 70297

John Tolbert

EmpowerID provides  a complete solution for IAM, CIAM, and Adaptive  Authentication.  With a highly  customizable workflow and authorization engine,  EmpowerID delivers advanced functionality for  enterprise and government  customers.

€190.00 *
Jan 30, 2017

Executive View: AWS Lambda - 72524

Alexei Balaganski

AWS Lambda is an event-driven serverless computing platform that completely abstracts the underlying cloud infrastructure to let developers focus on the core business functionality of their applications, providing transparent scalability and redundancy across multiple datacenters in the Amazon Cloud.

€190.00 *
Jan 30, 2017

Executive View: Microsoft Security Suite - 72541

Graham Williamson

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

€190.00 *
Jan 16, 2017

Executive View: Watchful Software RightsWatch - 70848

Dave Kearns

RightsWATCH automatically classifies and protects any file format in accordance with corporate policy based on content, context or metadata-aware policy rules, extending the Microsoft Right Management facility to ensure that sensitive and confidential information is identified and classified appropriately.

€190.00 *
Jan 13, 2017

Executive View: SAP HANA Cloud Platform Identity Authentication and Provisioning - 70290

John Tolbert

SAP HANA Cloud Platform Identity Authentication and Provisioning is a cloud- based platform for provisioning and managing digital identities and access for SAP solutions and more.  

€190.00 *

 2016

top  

Date Title Price
Dec 19, 2016

Executive View: CipherCloud Trust Platform - 72530

Mike Small

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. CipherCloud Trust Platform provides a valuable tool that organizations can use to improve governance…

€190.00 *
Dec 14, 2016

Executive View: Skyhigh Cloud Security Platform - 72532

Mike Small

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. Skyhigh Cloud Security Platform provides a valuable tool that organizations can use to improve…

€190.00 *
Nov 24, 2016

Executive View: Vaultive Cloud Data Security Platform - 72533

Mike Small

The data held in office productivity suites like Office 365 spans the whole operation of an organization from the board to the shop floor.  This makes it imperative that it is protected against risks of leakage and unauthorized disclosure.  Vaultive cloud data security provides an important solution for organizations seeking an approach for encrypting and otherwise protecting…

€190.00 *
Jan 20, 2016

Executive View: IBM Cloud Security Enforcer - 71523

Mike Small

IBM Cloud Security Enforcer is a cloud-delivered solution that provides cloud application visibility, identity and access management, and threat prevention.

€190.00 *
Jul 21, 2016

Executive View: Sophos Protection for Amazon Web Services - 71680

Mike Small

Sophos UTM is a suite of integrated security applications that provides the same layered protection for applications and data hosted in the AWS cloud as for on premise deployments. This report provides a review of the functionality provided by this set of products and an assessment of its strengths and challenges.

€190.00 *
May 03, 2016

Executive View: Signicat Connect, Assure, Sign & Preserve - 72504

Martin Kuppinger

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. With these services, Signicat supports organizations in transforming paper-based processes to cloud-based services, while meeting legal and security requirements.

€190.00 *

 2015

top  

Date Title Price
Jul 28, 2015

Executive View: Virtustream IaaS – Security and Assurance - 71285

Mike Small

An overview of the Virtustream Infrastructure as a Service together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

€190.00 *
Oct 15, 2015

Executive View: AlienVault Unified Security Management (USM) Platform - 72520

Mike Small

AlienVault Unified Security Management (USM) platform provides a complete all in one security management solution for organizations with limited resources such as security staff, time and budget.

€190.00 *
Sep 02, 2015

Executive View: Using Certification for Cloud Provider Selection - 71308

Mike Small

An overview of how to use certification to assist in selecting a cloud service provider. 

€190.00 *
Aug 19, 2015

Executive View: Zscaler Internet Security Platform - 71010

Alexei Balaganski

Zscaler is a unified Security-as-a-Service platform integrating various security services like web and mobile security, next generation firewall, data leakage prevention, advanced threat protection and bandwidth management in an entirely cloud-based solution without any on-premise hardware.

€190.00 *
Aug 03, 2015

Executive View: FireHost Secure Virtual Private Cloud – Security and Assurance - 71284

Mike Small

An overview of FireHost Secure Virtual Private Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

€190.00 *
Jul 09, 2015

Executive View: HP Helion Managed Virtual Private Cloud – Security and Assurance - 71288

Mike Small

This report provides an overview of HP Helion Managed Virtual Private Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

€190.00 *
Jul 01, 2015

Executive View: VMWare vCloud® Air™ – Security and Assurance - 71286

Mike Small

This report provides an overview of VMWare vCloud Air Infrastructure as a Service together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

€190.00 *
Apr 27, 2015

Executive View: iWelcome Identity & Access Management as a Service - 71205

Martin Kuppinger

iWelcome delivers Identity and Access Management as a Service. The company, based in the Netherlands, runs all services from data centers located within the EU and covers a broad set of features for both managing identity and access for cloud and on-premise services.

€190.00 *
Apr 22, 2015

Executive View: Dell One Identity Cloud Access Manager - 71250

Martin Kuppinger

Dell One Identity Cloud Access Manager is an on-premise solution for Identity Federation and Web Access Management, enabling both business users to seamlessly access cloud services and external users to connect to internal, web-based applications.

€190.00 *
Apr 09, 2015

Executive View: Microsoft Azure – Security and Assurance - 71282

Mike Small

This report provides an overview of the Microsoft Azure cloud services together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

€190.00 *
Apr 02, 2015

Executive View: AWS – Security and Assurance - 71280

Mike Small

Amazon Web Services (AWS) offers a broad set of over 40 services including compute, storage, database, analytics, application, and deployment. This report provides an overview of the security and assurance aspects of these services.

€190.00 *
Mar 30, 2015

Executive View: IBM SoftLayer – Security and Assurance - 71281

Mike Small

IBM SoftLayer provides infrastructure services direct to customers and is also the foundation for many of IBM’s cloud services such as BlueMix. The SoftLayer platform is able to provide “bare metal” access to computing resources resulting in high performance. This report provides an overview of the security and assurance aspects of these services.

€195.00 *
Mar 27, 2015

Executive View: Rackspace Managed Cloud Hosting – Security and Assurance - 71283

Mike Small

This report provides an overview of Rackspace Managed Cloud Hosting services together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

€190.00 *

 2014

top  

Date Title Price
Jul 18, 2014

Executive View: Symantec.cloud Security Services - 70926

Mike Small

Symantec was founded in 1982 and has evolved to become one of the world’s largest software companies with more than 18,500 employees in more than 50 countries. Symantec provides a wide range of software and services covering security, storage and systems management for IT systems.   Symantec has a very strong reputation in the field of IT security that has been built…

€190.00 *
May 13, 2014

Executive View: Cloud Standards Cross Reference - 71124

Mike Small

Cloud services are built using a technical architecture that may include both proprietary and standard protocols and interfaces. Many of these standard protocols and interfaces are already available and indeed form the basis of cloud connectivity. However the services themselves have significant proprietary content and this can make the costs of changing provider high.  This document…

€190.00 *

 2013

top  

Date Title Price
Jul 03, 2013

Executive View: Salesforce Platform as a Service – Security and Assurance - 70751

Mike Small

Salesforce.com is best known as the provider of a cloud based CRM system.  Salesforce also provides a platform which can be used to develop and deploy cloud based applications.  This executive view provides an overview of this platform focused on the security and assurance aspects...

€190.00 *

 2019

top  

Date Title Price
Oct 25, 2019

Leadership Brief: Defending Against Ransomware - 80235

John Tolbert

Ransomware is an epidemic and continues to evolve. More than half of all companies and other organizations have been attacked with one form or ransomware or another. A multi-layered defense is the best strategy. Take steps now to reduce the likelihood of falling victim to it. Make sure you have good offline backups if you get hit. Don’t give up and pay the ransom.

 2019

top  

Date Title Price
Nov 07, 2019

Leadership Compass: Infrastructure as a Service – Global Providers - 80035

Mike Small

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment.  This Leadership Compass focusses on Infrastructure as a Service (IaaS) from Cloud Service providers (CSP) with a global presence and with a specific focus on security and compliance.

 2018

top  

Date Title Price
Nov 29, 2018

Leadership Compass: Cloud Access Security Brokers - 70614

Mike Small

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

Apr 16, 2018

Leadership Compass: Infrastructure as a Service – Global Providers - 70303

Mike Small

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment.  This Leadership Compass focusses on Infrastructure as a Service (IaaS) from Cloud Service providers (CSP) with a global presence and with a specific focus on security and compliance.

 2017

top  

Date Title Price
Aug 17, 2017

Leadership Compass: Cloud Access Security Brokers - 72534

Mike Small

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

€1295.00 *

 2016

top  

Date Title Price
Aug 23, 2016

Leadership Compass: Cloud Access Security Brokers - 71138

Mike Small

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

€1295.00 *

 2015

top  

Date Title Price
Mar 26, 2015

Leadership Compass: Infrastructure as a Service - 70959

Mike Small

This report provides an overview and analysis of the market for Infrastructure as a Service (IaaS). IaaS provides basic computing resources that the customer can use over a network to run software and to store data. This report provides you with a compass to help you to find the IaaS service that best meets your needs.

€1295.00 *

 2014

top  

Date Title Price
Jul 15, 2014

Leadership Compass: Cloud IAM/IAG - 71121

Martin Kuppinger

The Cloud IAM market is currently driven by products that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity Access Management/Governance) as an alternative to on-premise IAM suites, and Cloud IAM solutions that…

€1295.00 *

 2014

top  

Date Title Price
Feb 04, 2014

Product Report: Akamai Intelligent Platform - 70874

Rob Newby

Akamai is a software platform, originally built on Linux, and able to run on commodity hardware. According to Akamai’s own metrics, at any one time between 15% and 30% of web traffic is going between Akamai servers. It is not a separate network, running as it does over the Internet using the same backend connections, but it is resilient, and lessens traffic between Internet nodes.…

€495.00 *

 2010

top  

Date Title Price
Dec 21, 2010

Product Report: Zscaler Cloud Security

Alexei Balaganski

Zscaler is an integrated SaaS solution for web and e-mail security offered by the US-based company of the same name. It provides a cloud platform for anti-malware and anti-spam protection, application control, and data loss prevention. What makes Zscaler stand out their competitors in SaaS security market is that their solution is entirely cloud-based and does not require any extra…

€95.00 *

 2015

top  

Date Title Price
Feb 20, 2015

Studie zu digitalen Risiken und Sicherheitsbewusstsein - 71252

Martin Kuppinger

In einer weltweiten Online-Studie befragte KuppingerCole Experten aus dem Bereich der Informationssicherheit zu ihrer derzeitigen Wahrnehmung von digitalen Risiken und Sicherheit. Die Studie weist auf eine signifikant gestiegene Wahrnehmung beider Bedrohungen, d.h. von potenziellen Angriffen und Risiken, hin.

free
Feb 05, 2015

Digital Risk and Security Awareness Survey - 71252

Martin Kuppinger

A survey on the awareness of digital risks and security risks run and compiled by KuppingerCole. Providing insight into the current perception of digital and security risks, complemented with analysis and recommendations by KuppingerCole.

free

 2011

top  

Date Title Price
Dec 08, 2011

Vendor Report: Oracle Cloud Security - 70160

Mike Small

This document is an evaluation of Oracle’s platform for Cloud computing from an information security perspective. Oracle offers a comprehensive set of tools and technologies upon which to build Cloud services. These services which can be built range from IaaS (Infrastructure as a Service) using Oracle VM Server software and Sun hardware through to SaaS (Software as a Service) built…

€195.00 *
Aug 29, 2011

Vendor Report: Microsoft® Cloud Security - 70126

Mike Small

This document is an evaluation of Microsoft’s Windows Azure™ Cloud platform from a security perspective. This platform allows organizations to build Cloud applications which are then hosted in the worldwide network of Microsoft datacenters. It also allows organizations to host existing applications that run under Windows Server 2008 and certain types of data in these Microsoft…

€195.00 *
Mar 15, 2011

Vendor Report: Symantec Cloud Security - 70115

Mike Small

The Cloud is an environment which allows the delivery of IT services in a standardized way.   This standardization makes it possible to optimize the procurement of IT services from both external and internal providers.   The information security risks associated with Cloud computing depend upon both the service model and the delivery model adopted.   The…

€95.00 *

 2019

top  

Date Title Price
Sep 02, 2019

Whitepaper: Oracle Identity Cloud Service: Identity for Business Applications in the Hybrid IT - 80155

Martin Kuppinger

Today, most businesses are using hybrid IT, with a mix on-premises and cloud applications and services. And hybrid IT is here to stay, given that many of the legacy applications are hard and costly to migrate. Thus, Identity Services must work well for all these applications and the entire hybrid IT  infrastructure. While they increasingly run from the cloud, as IDaaS (Identity as a…

Feb 06, 2019

Whitepaper: Cisco: Next-Generation Enterprise Security Delivered from the Cloud: Addressing Modern Cyber Threats with Cisco Umbrella - 80017

Alexei Balaganski

As businesses embrace the Digital Transformation and become increasingly cloud-native, mobile and interconnected, the corporate network perimeter is gradually disappearing, exposing users to malware, ransomware, and other cyber threats. Traditional perimeter security tools no longer provide adequate visibility, threat protection, and scalability, nor can they offer convenience and…

 2018

top  

Date Title Price
Feb 28, 2018

Whitepaper: GDPR Herausforderungen mit Delphix meistern - 70368

Mike Small

Mit der neuen Datenschutz-Grundverordnung (GDPR) führt die EU strenge Kontrollen bezüglich der Verarbeitung personenbezogener Daten von EU-Bürgern sowie hohe Geldstrafen bei Nicht-Einhaltung eben dieser ein. Die Compliance der Grundverordnung erfordert kostenintensive Kontrollen, die sich mit den direkten geschäftlichen Vorteilen der Verarbeitung personenbezogener…

Feb 28, 2018

Whitepaper: Meeting GDPR Challenges with Delphix - 70368

Mike Small

GDPR introduces stringent controls over the processing of PII relating to people resident in the EU with high penalties for non-compliance.  Compliance requires costly controls that can be justified for processing of PII with direct business benefits.  However, using PII for non-production purposes such as development and test, incur the same risks and need the same costly…

 2017

top  

Date Title Price
Mar 29, 2017

Whitepaper: VMWare: Unified management and control of the digital workspace - 70286

Matthias Reinwarth

Identity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach for the administration and supervision  of all types of users, end user software and devices can foster efficiency, agility and security in many…

€295.00 *
* All prices excl. VAT

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Renovate Your IAM-House While You Continue to Live in It

Do you belong to the group of people who would like to completely retire all obsolete solutions and replace existing solutions with new ones in a Big Bang? Do you do the same with company infrastructures? Then you don't need to read any further here. Please tell us later, how things worked out for you. Or do you belong in the other extreme to those companies in which infrastructures can be further developed only through current challenges, audit findings, or particularly prestigious projects [...]

Latest Insights

Hot Topics

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00