Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Noname API Security Platform
Executive View
Noname API Security Platform
The Noname API Security Platform is a unified API security solution that combines proactive API discovery and classification, runtime protection, and API security testing to ensure consistent...
CIAM Platforms
Leadership Compass
CIAM Platforms
This report provides an overview of the market for Consumer Identity and Access Management solutions and provides you with a compass to help you to find the CIAM product or service that best meets...
IndyKite Knowledge-Based Access Control (KBAC)
Executive View
IndyKite Knowledge-Based Access Control (KBAC)
Given the growing ecosystem of digital identities that extend beyond humans to bots, devices, and machines in a modern world, there is also a corresponding need to manage the increasing complexity...
CYFIRMA DeCYFIR
Executive View
CYFIRMA DeCYFIR
Reaktive Sicherheitsmaßnahmen wirken auf Cyberangriffe, die bereits stattgefunden haben. Während die Ausgaben für die Cybersicherheit steigen, werden auch Cyberangriffe immer zahlreicher. Um...
Providers of Verified Identity 2022
Leadership Compass
Providers of Verified Identity 2022
This Leadership Compass provides an overview up-to-date insights on the leaders in innovation, product features, and market reach for full-services Providers of Verified Identity. These vendors...
CYFIRMA DeCYFIR
Executive View
CYFIRMA DeCYFIR
Reactive security measures respond to cyberattacks that have already happened. While cybersecurity spending is increasing, cyberattacks are also becoming more frequent. To mitigate risks and...
Managing RDP Security Risks to Block Ransomware Attacks
Leadership Brief
Managing RDP Security Risks to Block Ransomware Attacks
Remote working is becoming widespread for social and economic reasons, and one of the key enablers is the Remote Desktop Protocol (RDP). However, RDP is one of the most popular initial cyber-attack...
Malwarebytes Nebula and Incident Response
Executive View
Malwarebytes Nebula and Incident Response
Organizations and individuals are constantly under threat by malware. Malware variants evolve and proliferate daily, making it increasingly difficult to prevent infections, compromises, and...
CIEM & Dynamic Resource Entitlement & Access Management (DREAM) platforms
Leadership Compass
CIEM & Dynamic Resource Entitlement & Access Management (DREAM) platforms
This report provides an overview of the market for platforms that support CIEM and DREAM environments and provides you with a compass to help find the solution(s) that best meets your needs. We...
WSO2 Choreo
Executive View
WSO2 Choreo
WSO2 Choreo is a cloud-based fully managed integrated solution for developing, publishing, managing, monitoring, and productizing APIs. Based on a unique pro-code/low-code Ballerina programming...
Advanced IT security solutions for OT environments
Leadership Brief
Advanced IT security solutions for OT environments
Industrial Control Systems operators are increasingly targeted by Advanced Persistent Threat (APT) actors and cybercriminals as digital transformation accelerates. Many hitherto isolated systems...
Customer Data Platforms
Leadership Compass
Customer Data Platforms
This report provides an overview of the market for customer data platforms (CDPs). Such solutions help businesses to build customer profiles and customer segments based on input from various data...
Previous
7 8 9 10 11 12 13 Next