Research

Whitepaper

KuppingerCole’s Whitepaper is a report written by one of KC’s analysts that informs readers about a specific, usually complex issue. A whitepaper is meant to help readers understand an issue, solve a problem, or make a decision.
Software Supply Chain Security: Don’t Get Your Code Tampered
Whitepaper
Software Supply Chain Security: Don’t Get Your Code Tampered
Recent events such as the SolarWinds and Kaseya incidents have demonstrated the need to focus significantly more on software supply chain security. Thus, avoiding code tampering by external...
Secure Software Supply Chains
Whitepaper
Secure Software Supply Chains
Major cyber-attacks such as the SolarWinds and Kaseya incidents demonstrate the need to focus significantly more on software supply chain security as well as traditional cyber defense areas....
Identity & Security: Addressing the Modern Threat Landscape
Whitepaper
Identity & Security: Addressing the Modern Threat Landscape
Identity and Access Management (IAM) and Cybersecurity have for too long been separate disciplines with distinct solutions that have not interoperated optimally. This has put defenders at a...
Assuring Cloud Security and Compliance
Whitepaper
Assuring Cloud Security and Compliance
Digital transformation is changing the way that they do business through the use of cloud services and cloud-based applications. The Coronavirus epidemic has accelerated this process. The use of...
PAM for Managed Service Providers as an Added Value and Security Option
Whitepaper
PAM for Managed Service Providers as an Added Value and Security Option
Privileged Access Management (PAM) is an essential component in protecting organizations against cyber-attacks, ransomware, malware, phishing, and data leaks. No longer a tool for protecting admin...
Zoom Unified Communications Platform Security and Compliance
Whitepaper
Zoom Unified Communications Platform Security and Compliance
Zoom offers a cloud-based unified communications platform (UCaaS) featuring video communications. UCaaS delivers many benefits including flexibility, performance, and price. Organizations should...
Security Operations in the Age of Zero Trust
Whitepaper
Security Operations in the Age of Zero Trust
How must security operations transform to effectively deliver the comprehensive and integrated value of zero trust implementations? Security operations for Zero Trust must take a comprehensive...
Safeguarding Your Most Valuable Data: Five Key Criteria to Assess Cloud Provider Security
Whitepaper
Safeguarding Your Most Valuable Data: Five Key Criteria to Assess Cloud Provider Security
This whitepaper focuses on defining the key security-focused selection criteria to help your company choose a secure platform for current and future cloud projects.
Multi-Organization Access Governance
Whitepaper
Multi-Organization Access Governance
This KuppingerCole Whitepaper explores identity access across multi-organizations and parts of their supply chains, from a single point. By using such, organizations can streamline access and...
Zero Trust Network Access for OT Environments
Whitepaper
Zero Trust Network Access for OT Environments
Operational Technology (OT) environments are often quite different from regular enterprise IT environments in terms of hardware and software deployed. However, both OT and IT need rigorous security...
Considerations for Reducing the Risk of Ransomware
Whitepaper
Considerations for Reducing the Risk of Ransomware
In this paper, we will expand our view of ransomware and demonstrate how treating it as an isolated security challenge is not a sustainable approach. We will show why prevention is the best...
Getting Ahead of the Cybercriminals: Understanding the External Threat Landscape
Whitepaper
Getting Ahead of the Cybercriminals: Understanding the External Threat Landscape
Security leaders face an uphill task as cybercriminals become increasingly creative and armed with an arsenal of seemingly unlimited resources. Rapid digitalization to re-capture post-pandemic...
1 2 3 Next