Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Latest Publications

Beyond Identity Secure DevOps

Executive View

Beyond Identity Secure DevOps

Organizations that fail to secure access to resources are at risk of suffering from cyberattacks, data loss or compliance failure. As the market grows and business demands become more acute,...

Identity Governance and Administration 2022

Leadership Compass

Identity Governance and Administration 2022

The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Lifecycle Management and Access Governance solutions that are now increasingly aided...

Cymmetri Identity Platform

Executive View

Cymmetri Identity Platform

Cymmetri is a converged cloud-based IAM solution that facilitates verification, authentication, and authorization for employees, partners, contractors, and customers. The modern platform also makes...

A New Era for Digital Identity in Germany

Whitepaper

A New Era for Digital Identity in Germany

The journey towards digital identity in Germany has been fraught with optimism, failure, and continued persistence. It is currently at a crossroads – consumer and private sector behavior indicate a...

AWS Elastic Disaster Recovery

Executive View

AWS Elastic Disaster Recovery

Data resilience and disaster recovery solutions are an essential element of business continuity plans and, as organizations go through digital transformation and become more dependent upon their IT...

Vulnerability Management (How Do I Do It Right, Where Do I Start)

Advisory Note

Vulnerability Management (How Do I Do It Right, Where Do I Start)

Vulnerability Management (VM) is a security practice that focuses on the process by which organizations identify, analyze, manage, and prevent the exploitation of IT vulnerabilities. If implemented...

Why Vulnerability Management Is a Strategic Investment

Leadership Brief

Why Vulnerability Management Is a Strategic Investment

Considering that the threat landscape is constantly changing, it is important to maintain a strong cybersecurity foundation. Organizations need security hygiene standards to increase security and...

Considerations for Reducing the Risk of Ransomware

Whitepaper

Considerations for Reducing the Risk of Ransomware

In this paper, we will expand our view of ransomware and demonstrate how treating it as an isolated security challenge is not a sustainable approach. We will show why prevention is the best...

PingOne Authorize

Executive View

PingOne Authorize

Due to its value and sensitivity, customer identity and data must be protected with strong access management systems. Key use cases include managing usage of customer data and its availability both...

Understanding and Managing Privileged Access to Databases and Other Data Resources

Whitepaper

Understanding and Managing Privileged Access to Databases and Other Data Resources

This Whitepaper analyses the issues surrounding access management, privacy, security and compliance when identities access compute and storage resources, with a special focus on database...

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00