Research

Whitepaper

KuppingerCole’s Whitepaper is a report written by one of KC’s analysts that informs readers about a specific, usually complex issue. A whitepaper is meant to help readers understand an issue, solve a problem, or make a decision.
Accelerating Your Digital Business with Customer Identity
Whitepaper
Accelerating Your Digital Business with Customer Identity
The role of Consumer Identity and Access Management (CIAM) is still massively undervalued by many organizations. Both drop-off and churn rates are heavily impacted by cumbersome registration and...
Oracle Identity Cloud Service: Identity for Business Applications in the Hybrid IT
Whitepaper
Oracle Identity Cloud Service: Identity for Business Applications in the Hybrid IT
Today, most businesses are using hybrid IT, with a mix on-premises and cloud applications and services. And hybrid IT is here to stay, given that many of the legacy applications are hard and costly...
Considerations for Reducing the Risk of Ransomware
Whitepaper
Considerations for Reducing the Risk of Ransomware
In this paper, we will expand our view of ransomware and demonstrate how treating it as an isolated security challenge is not a sustainable approach. We will show why prevention is the best...
Zoom Unified Communications Platform Security and Compliance
Whitepaper
Zoom Unified Communications Platform Security and Compliance
Zoom offers a cloud-based unified communications platform (UCaaS) featuring video communications. UCaaS delivers many benefits including flexibility, performance, and price. Organizations should...
Zoom Unified Communications Platform Security and Compliance
Whitepaper
Zoom Unified Communications Platform Security and Compliance
Zoom bietet eine Cloud-basierte Unified Communications-Plattform (UCaaS) für Videokommunikation. UCaaS besitzt viele Vorteile, einschließlich Flexibilität, Leistung und Preis. Organisationen...
Going Beyond Traditional Penetration Testing
Whitepaper
Going Beyond Traditional Penetration Testing
Penetration testing is an essential methodology used to discover and remediate vulnerabilities and reduce risks from cyber-attacks and cybercrime. Regular penetration testing is recommended and, in...
Zero Trust Network Access for OT Environments
Whitepaper
Zero Trust Network Access for OT Environments
Operational Technology (OT) environments are often quite different from regular enterprise IT environments in terms of hardware and software deployed. However, both OT and IT need rigorous security...
Multi-Organization Access Governance
Whitepaper
Multi-Organization Access Governance
This KuppingerCole Whitepaper explores identity access across multi-organizations and parts of their supply chains, from a single point. By using such, organizations can streamline access and...
Success in the Digital Age: Put Identity & Access at the Forefront
Whitepaper
Success in the Digital Age: Put Identity & Access at the Forefront
Success in the Digital Age depends on many factors. Bringing the right digital services to the market on time is the foundation for differentiating in today’s volatile competitive landscape....
Understanding the Value of Upgrading to Cloud-Based Identity Security
Whitepaper
Understanding the Value of Upgrading to Cloud-Based Identity Security
Organizations are facing ever increasing challenges maintaining and modernizing legacy identity security solutions. The shift from on-premises legacy solutions to SaaS based identity security...
Software Supply Chain Security: Don’t Get Your Code Tampered
Whitepaper
Software Supply Chain Security: Don’t Get Your Code Tampered
Recent events such as the SolarWinds and Kaseya incidents have demonstrated the need to focus significantly more on software supply chain security. Thus, avoiding code tampering by external...
Radiant Logic and the Identity Integration Imperative
Whitepaper
Radiant Logic and the Identity Integration Imperative
Digital transformation and the need for business agility are creating an explosion in the volume, variety and velocity of identity data that enterprises have to manage efficiently. And now...
1 2 Next