Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Maturity Level for Zero Trust: A Comprehensive Analysis
Advisory Note
Maturity Level for Zero Trust: A Comprehensive Analysis
This Advisory Note explores the fundamental principles of Zero Trust, emphasizing its significance in modern cybersecurity. It discusses the Department of Defense (DoD) Zero Trust Strategy and...
Zero Trust Network Access
Leadership Compass
Zero Trust Network Access
Zero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats. Unlike traditional...
How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive Authentication and Fine-Grained Authorization
Whitepaper
How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive Authentication and Fine-Grained Authorization
Every organization, regardless of size or industry, needs an agile and modern Identity and Access Management (IAM) platform. As the cybersecurity threat landscape continues to evolve, so do the...
Invisily Zero Trust Network Access
Executive View
Invisily Zero Trust Network Access
Invisily is a Zero Trust Network Access platform that supports a broad range of deployment scenarios without the technical debt of existing competing solutions. It offers several unique...
Speeding up Zero Trust Delivery using Managed Services
Whitepaper
Speeding up Zero Trust Delivery using Managed Services
Zero Trust is important as a fundamental and essential paradigm for a stronger cybersecurity posture. Zero Trust, on the other hand, is complex to put in practice. For succeeding with the Zero...
Zero Trust Network Access for OT Environments
Whitepaper
Zero Trust Network Access for OT Environments
Operational Technology (OT) environments are often quite different from regular enterprise IT environments in terms of hardware and software deployed. However, both OT and IT need rigorous security...
Zero Trust Network Access
Leadership Compass
Zero Trust Network Access
This report is an overview of the market for Zero Trust Network Access (ZTNA) solutions and provides you with a compass to help you to find the solution that best meets your needs. We examine the...
The Role of Identity for Zero Trust
Whitepaper
The Role of Identity for Zero Trust
Identity is central to Zero Trust. Zero Trust as the established leading principle for cybersecurity is about continuous verification instead of trust into a one-time proof by a singular system....
Security Operations in the Age of Zero Trust
Whitepaper
Security Operations in the Age of Zero Trust
How must security operations transform to effectively deliver the comprehensive and integrated value of zero trust implementations? Security operations for Zero Trust must take a comprehensive...
RadiantOne: Identity Integration for Zero-Trust and Digital Transformation
Whitepaper
RadiantOne: Identity Integration for Zero-Trust and Digital Transformation
Transition to a fully distributed and agile digital enterprise is increasingly seen as a matter of organizational survival. The COVID-19 pandemic overwhelmed any lingering doubt about its urgency....
Cisco Zero Trust Security
Executive View
Cisco Zero Trust Security
Cisco’s approach towards Zero Trust combines several foundational access policy solutions for securing your workforce, workloads and workspace with a broad range of additional security products to...
Akamai Zero Trust Security
Executive View
Akamai Zero Trust Security
Akamai’s Intelligent Edge Platform offers a broad range of access management, threat protection, and application security services that will support you in your journey to Zero Trust, making it...
1 2 3 4 5 6 7 Next