Research

Executive View

KuppingerCole’s Executive View is a short report with four to five pages written by one of KC’s Analysts about a specific client product. In an Executive View an analyst describes the product in a concise manner and shows its strengths and challenges to give end users a short expert reference.
ARCON Security Compliance Management
Executive View
ARCON Security Compliance Management
This KuppingerCole Executive View Report looks at some of the options available to IT leaders and security strategists to manage security compliance across their IT estate. A technical review of...
IBM Security and Compliance Center
Executive View
IBM Security and Compliance Center
IBM Security and Compliance Center represents a fresh approach toward the very notion of security and compliance in multi-cloud environments. With this product that unifies a full-featured CNAPP...
Veracode Application Security Platform
Executive View
Veracode Application Security Platform
Veracode Application Security Platform is a cloud-based application security testing platform providing unified insights into software security risks at every stage of the development lifecycle.
NextLabs Data Centric Security in the Hybrid Cloud
Executive View
NextLabs Data Centric Security in the Hybrid Cloud
Organizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with external parties....
Exabeam Security Management Platform
Executive View
Exabeam Security Management Platform
Exabeam is a highly modular platform for collecting, storing, managing and correlating security events across multiple IT systems, both on-premises and in the cloud, with integrated orchestration...
United Security Providers Secure Entry Server
Executive View
United Security Providers Secure Entry Server
United Security Providers (USP) provides a web access management platform designed to provide a unified and efficient approach towards Web Application Firewall (WAF), Authentication, CIAM and...
CYFIRMA DeCYFIR
Executive View
CYFIRMA DeCYFIR
Reactive security measures respond to cyberattacks that have already happened. While cybersecurity spending is increasing, cyberattacks are also becoming more frequent. To mitigate risks and...
SailPoint Non-Employee Risk Management
Executive View
SailPoint Non-Employee Risk Management
This KuppingerCole Executive View looks at some of the options available to IT leaders and senior security strategists to manage non-employee and other third-party identities. A technical review of...
Exostar Supplier Risk Management
Executive View
Exostar Supplier Risk Management
Exostar Supplier Risk Management delivers advanced capabilities for identifying and managing risk and compliance with cybersecurity and other best practices and standards, along the entire supply...
Beyond Identity Secure DevOps
Executive View
Beyond Identity Secure DevOps
Organizations that fail to secure access to resources are at risk of suffering from cyberattacks, data loss or compliance failure. As the market grows and business demands become more acute,...
Sharelock ITDR
Executive View
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify...
Archer Integrated Risk Management
Executive View
Archer Integrated Risk Management
Today’s GRC solutions offer better alignment with corporate objectives, increased transparency, superior information risk management and more cost-effective compliance. This paper looks at the...
1 2 3 Next