Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Latest Publications

Leadership Compass on Passwordless Authentication

Leadership Compass

Leadership Compass on Passwordless Authentication

This report provides an overview of the market for Passwordless Authentication products and services and presents you with a compass to help you to find the Passwordless Authentication product or...

Modernizing Legacy IAM Systems

Whitepaper

Modernizing Legacy IAM Systems

Legacy IAM systems can no longer meet the requirements of Digital Transformation. They often have a negative impact on business efficiency and customer experience. Such systems are too costly to...

Noname API Security Platform

Executive View

Noname API Security Platform

The Noname API Security Platform is a unified API security solution that combines proactive API discovery and classification, runtime protection, and API security testing to ensure consistent...

CIAM Platforms

Leadership Compass

CIAM Platforms

This report provides an overview of the market for Consumer Identity and Access Management solutions and provides you with a compass to help you to find the CIAM product or service that best meets...

IndyKite Knowledge-Based Access Control (KBAC)

Executive View

IndyKite Knowledge-Based Access Control (KBAC)

Given the growing ecosystem of digital identities that extend beyond humans to bots, devices, and machines in a modern world, there is also a corresponding need to manage the increasing complexity...

CYFIRMA DeCYFIR

Executive View

CYFIRMA DeCYFIR

Reaktive Sicherheitsmaßnahmen wirken auf Cyberangriffe, die bereits stattgefunden haben. Während die Ausgaben für die Cybersicherheit steigen, werden auch Cyberangriffe immer zahlreicher. Um...

Providers of Verified Identity 2022

Leadership Compass

Providers of Verified Identity 2022

This Leadership Compass provides an overview up-to-date insights on the leaders in innovation, product features, and market reach for full-services Providers of Verified Identity. These vendors...

CYFIRMA DeCYFIR

Executive View

CYFIRMA DeCYFIR

Reactive security measures respond to cyberattacks that have already happened. While cybersecurity spending is increasing, cyberattacks are also becoming more frequent. To mitigate risks and...

Managing RDP Security Risks to Block Ransomware Attacks

Leadership Brief

Managing RDP Security Risks to Block Ransomware Attacks

Remote working is becoming widespread for social and economic reasons, and one of the key enablers is the Remote Desktop Protocol (RDP). However, RDP is one of the most popular initial cyber-attack...

Malwarebytes Nebula and Incident Response

Executive View

Malwarebytes Nebula and Incident Response

Organizations and individuals are constantly under threat by malware. Malware variants evolve and proliferate daily, making it increasingly difficult to prevent infections, compromises, and...

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00