Research

Whitepaper

KuppingerCole’s Whitepaper is a report written by one of KC’s analysts that informs readers about a specific, usually complex issue. A whitepaper is meant to help readers understand an issue, solve a problem, or make a decision.
Orchestrated Identity for Meeting IAM & CIAM Requirements
Whitepaper
Orchestrated Identity for Meeting IAM & CIAM Requirements
Identity and Access Management (IAM) for employees and partners is a foundational element in all digital environments today. Consumer Identity and Access Management (CIAM) systems and services...
Meeting GDPR Challenges with Delphix
Whitepaper
Meeting GDPR Challenges with Delphix
GDPR introduces stringent controls over the processing of PII relating to people resident in the EU with high penalties for non-compliance. Compliance requires costly controls that can be...
GDPR Herausforderungen mit Delphix meistern
Whitepaper
GDPR Herausforderungen mit Delphix meistern
Mit der neuen Datenschutz-Grundverordnung (GDPR) führt die EU strenge Kontrollen bezüglich der Verarbeitung personenbezogener Daten von EU-Bürgern sowie hohe Geldstrafen bei Nicht-Einhaltung eben...
Meeting PSD2 Challenges with Ergon Airlock Suite
Whitepaper
Meeting PSD2 Challenges with Ergon Airlock Suite
The Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe. Banks and other financial service providers must quickly...
Datenschutz-Grundverordnung (DSGVO): Mehr als nur Consent Management!
Whitepaper
Datenschutz-Grundverordnung (DSGVO): Mehr als nur Consent Management!
Die DSGVO oder EU GDPR (General Data Protection Regulation), die ab dem 28. Mai 2018 voll wirksam ist, wird derzeit vor allem mit den Zustimmungsregeln zur Nutzung personenbezogener Daten (Consent)...
The Effect of GDPR on Customer Relations
Whitepaper
The Effect of GDPR on Customer Relations
The upcoming EU GDPR will have significant impact on how business can collect PII of their customers and consumers. Business are well-advised to thoroughly review these changes and prepare....
Protecting the keys to your kingdom against cyber-attacks and insider threats
Whitepaper
Protecting the keys to your kingdom against cyber-attacks and insider threats
All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due to their...
Moving towards a holistic Cyber Risk Governance approach
Whitepaper
Moving towards a holistic Cyber Risk Governance approach
The ongoing task of maintaining cyber security and risk governance, while providing evidence and communicating efficiently with corporate stakeholders is getting increasingly more important for...
Unified management and control of the digital workspace
Whitepaper
Unified management and control of the digital workspace
Identity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governance in these...
Ping Identity solutions for Customer Identity and Access Management
Whitepaper
Ping Identity solutions for Customer Identity and Access Management
Customer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing Ping Identity’s solutions for CIAM...
Manage privileged access from everyone & everywhere. Understand your risks. Become compliant.
Whitepaper
Manage privileged access from everyone & everywhere. Understand your risks. Become compliant.
Privileged Accounts are the high-risk accounts – and they are the target of attackers, both internals and externals. SOCs must implement modern Privilege Management as part of their overall...
Previous
4 5 6 7 8 9 10