Research

Advisory Note

KuppingerCole’s Advisory Notes are short reports that present information about a specific topic, company, or product. Advisory Notes are published on a regular basis and are aimed at the management of a company. An Advisory Note gives usage recommendations and helps decision makers solve specific problems.
Identity Authentication Standards
Advisory Note
Identity Authentication Standards
Authentication is a core component of Identity and Access Management (IAM) Solutions and central to the security and management of modern organizations. For many years, the industry has been...
Mobile Biometrics for Authentication and Authorization
Advisory Note
Mobile Biometrics for Authentication and Authorization
Many new biometric technologies and products have emerged in the last few years. Biometrics have improved considerably, and are now increasingly integrated into smartphones. Mobile biometric...
Cyber Risk Frameworks in 2024
Advisory Note
Cyber Risk Frameworks in 2024
The landscape of cybersecurity is continually evolving, with new threats and technologies reshaping the way organizations protect their digital assets. In order to understand the significance of...
Maturity Level for Zero Trust: A Comprehensive Analysis
Advisory Note
Maturity Level for Zero Trust: A Comprehensive Analysis
This Advisory Note explores the fundamental principles of Zero Trust, emphasizing its significance in modern cybersecurity. It discusses the Department of Defense (DoD) Zero Trust Strategy and...
Maturity Level Matrix for Cyber Security
Advisory Note
Maturity Level Matrix for Cyber Security
KuppingerCole Maturity Level Matrices cover the major market segments within cyber security. This matrix aligns with the processes essential to good cyber hygiene as well as the NIST cybersecurity...
How Enterprises Will Learn to Love Decentralized IDs: The Roles of Distributed and Sovereign Identities in Our Private Metaverse
Advisory Note
How Enterprises Will Learn to Love Decentralized IDs: The Roles of Distributed and Sovereign Identities in Our Private Metaverse
Recently, Meta CEO Mark Zuckerberg demonstrated in captivating detail a working beta version of photorealistic—or rather, video realistic—avatars in the metaverse. Zuckerberg also claims that this...
2022 IAM Reference Architecture
Advisory Note
2022 IAM Reference Architecture
IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. The challenges for...
Maturity Level Matrix for IAM
Advisory Note
Maturity Level Matrix for IAM
KuppingerCole Maturity Level Matrices for the major market segments within IAM (Identity, and Access Management), IGA (Identity Governance and Administration) and CIAM (Consumer Identity and Access...
KRIs and KPI for Cyber Security
Advisory Note
KRIs and KPI for Cyber Security
This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks...
Redefining Access Governance:  A broader perspective
Advisory Note
Redefining Access Governance: A broader perspective
Traditional approaches to Access Governance are no longer fit for purpose due to the complexity of modern IT environments, increased security risk, and growing regulatory compliance requirements....
The Role of APIs for Business
Advisory Note
The Role of APIs for Business
An Application Programming Interface (API) is an intermediary that allows two applications to talk to each other. Without APIs, the digital experiences consumers have grown accustomed to, such as...
Protect Your Cloud Against Hacks and Industrial Espionage
Advisory Note
Protect Your Cloud Against Hacks and Industrial Espionage
Hacks against on-premises and cloud infrastructure happen every day. Corporate espionage is not just the stuff of spy novels. Unethical corporate competitors and even government intelligence...
1 2 3 4 Next