Research

Advisory Note

KuppingerCole’s Advisory Notes are short reports that present information about a specific topic, company, or product. Advisory Notes are published on a regular basis and are aimed at the management of a company. An Advisory Note gives usage recommendations and helps decision makers solve specific problems.
Understanding and Countering Ransomware
Advisory Note
Understanding and Countering Ransomware
Ransomware is a top security threat and continuously on the rise. Financial organizations, healthcare institutions, and manufacturing industries are the most vulnerable groups; however, individual...
Cyber Risk Frameworks in 2024
Advisory Note
Cyber Risk Frameworks in 2024
The landscape of cybersecurity is continually evolving, with new threats and technologies reshaping the way organizations protect their digital assets. In order to understand the significance of...
Patch Management: Zero Day Risks
Advisory Note
Patch Management: Zero Day Risks
This advisory note explores Patch Management as a cornerstone of cyber resilience in the contemporary threat landscape. Delving into the evolution of strategies, it navigates the reader through the...
Federal Regulations on Cybersecurity
Advisory Note
Federal Regulations on Cybersecurity
Federal Regulations on cybersecurity are regularly published at the national level. However, these national regulations also impact federal regulations in other countries. Therefore, looking at...
Maturity Level Matrix for Cyber Security
Advisory Note
Maturity Level Matrix for Cyber Security
KuppingerCole Maturity Level Matrices cover the major market segments within cyber security. This matrix aligns with the processes essential to good cyber hygiene as well as the NIST cybersecurity...
Business Continuity in the age of Cyber Attacks
Advisory Note
Business Continuity in the age of Cyber Attacks
Business continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organizations to alter their approach....
Cyber Risk – Choosing the Right Framework
Advisory Note
Cyber Risk – Choosing the Right Framework
As organizations undergo Digital Transformation the business impact of cyber risks increases. It is essential that organizations manage these risks. There are several frameworks that...
Trends in Privileged Access Management for the Digital Enterprise
Advisory Note
Trends in Privileged Access Management for the Digital Enterprise
Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to...
KRIs and KPI for Cyber Security
Advisory Note
KRIs and KPI for Cyber Security
This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks...
Protect Your Cloud Against Hacks and Industrial Espionage
Advisory Note
Protect Your Cloud Against Hacks and Industrial Espionage
Hacks against on-premises and cloud infrastructure happen every day. Corporate espionage is not just the stuff of spy novels. Unethical corporate competitors and even government intelligence...
Maturity Level Matrix for IAM
Advisory Note
Maturity Level Matrix for IAM
KuppingerCole Maturity Level Matrices for the major market segments within IAM (Identity, and Access Management), IGA (Identity Governance and Administration) and CIAM (Consumer Identity and Access...
Future of Identity Management
Advisory Note
Future of Identity Management
Digital identities are at the core of Digital Transformation, Information Security and Privacy, and therefore it has never been more important for enterprises to ensure they have the capability to...
1 2 Next