Research

Whitepaper

KuppingerCole’s Whitepaper is a report written by one of KC’s analysts that informs readers about a specific, usually complex issue. A whitepaper is meant to help readers understand an issue, solve a problem, or make a decision.
Why Your Organization Needs Data-centric Security
Whitepaper
Why Your Organization Needs Data-centric Security
Data-centric security is an alternative approach towards information protection that has emerged as a direct response to the increasingly obvious failure of traditional measures focusing on...
Understanding and Managing Privileged Access to Databases and Other Data Resources
Whitepaper
Understanding and Managing Privileged Access to Databases and Other Data Resources
This Whitepaper analyses the issues surrounding access management, privacy, security and compliance when identities access compute and storage resources, with a special focus on database...
Safeguarding Your Most Valuable Data: Five Key Criteria to Assess Cloud Provider Security
Whitepaper
Safeguarding Your Most Valuable Data: Five Key Criteria to Assess Cloud Provider Security
This whitepaper focuses on defining the key security-focused selection criteria to help your company choose a secure platform for current and future cloud projects.
California Consumer Privacy Act: The Need for Data-Centric Security
Whitepaper
California Consumer Privacy Act: The Need for Data-Centric Security
CCPA is the latest in a series of global privacy regulations. It comes with new requirements for dealing with personal data and is accompanied by severe penalties. Thus, businesses must take...
Wertvolle Daten kennen, schützen und besser nutzen – die Chancen von Datenschutz und Datensicherheit
Whitepaper
Wertvolle Daten kennen, schützen und besser nutzen – die Chancen von Datenschutz und Datensicherheit
Neue Regulierungen wie die Datenschutz-Grundverordnung (DSGVO) und die stetig wachsende Gefahr durch Cyber-Attacken führen zu einem hohen Druck auf Unternehmen. Es gibt aber auch Chancen, wenn man...
Zoom Unified Communications Platform Security and Compliance
Whitepaper
Zoom Unified Communications Platform Security and Compliance
Zoom offers a cloud-based unified communications platform (UCaaS) featuring video communications. UCaaS delivers many benefits including flexibility, performance, and price. Organizations should...
Understanding the Value of Upgrading to Cloud-Based Identity Security
Whitepaper
Understanding the Value of Upgrading to Cloud-Based Identity Security
Organizations are facing ever increasing challenges maintaining and modernizing legacy identity security solutions. The shift from on-premises legacy solutions to SaaS based identity security...
Considerations for Reducing the Risk of Ransomware
Whitepaper
Considerations for Reducing the Risk of Ransomware
In this paper, we will expand our view of ransomware and demonstrate how treating it as an isolated security challenge is not a sustainable approach. We will show why prevention is the best...
Modernizing Legacy IAM Systems
Whitepaper
Modernizing Legacy IAM Systems
Legacy IAM systems can no longer meet the requirements of Digital Transformation. They often have a negative impact on business efficiency and customer experience. Such systems are too costly to...
How to Build the Modern CIAM: For Customers, Consumers, and Citizens
Whitepaper
How to Build the Modern CIAM: For Customers, Consumers, and Citizens
In the digital age, the “C identities” of customers, consumers, citizens, and all the other types of external identities, such as tourists, are at the forefront of every digital business and...
Security Operations in the Age of Zero Trust
Whitepaper
Security Operations in the Age of Zero Trust
How must security operations transform to effectively deliver the comprehensive and integrated value of zero trust implementations? Security operations for Zero Trust must take a comprehensive...
Securing your IaaS Cloud
Whitepaper
Securing your IaaS Cloud
While the major CSPs (Cloud Service Providers) go to great lengths to secure the services that they provide it is up to the client of the Cloud service provider to secure their use of these...
1 2 3 4 5 6 7 Next