Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Cymmetri Identity Platform
Executive View
Cymmetri Identity Platform
Cymmetri is a converged cloud-based IAM solution that facilitates verification, authentication, and authorization for employees, partners, contractors, and customers. The modern platform also makes...
AWS Elastic Disaster Recovery
Executive View
AWS Elastic Disaster Recovery
Data resilience and disaster recovery solutions are an essential element of business continuity plans and, as organizations go through digital transformation and become more dependent upon their IT...
Microsoft Enterprise Mobility + Security Suite
Executive View
Microsoft Enterprise Mobility + Security Suite
A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment,...
WSO2 Choreo
Executive View
WSO2 Choreo
WSO2 Choreo is a cloud-based fully managed integrated solution for developing, publishing, managing, monitoring, and productizing APIs. Based on a unique pro-code/low-code Ballerina programming...
ARCON Endpoint Privilege Management
Executive View
ARCON Endpoint Privilege Management
The number of privileged requests made from endpoints has increased significantly in recent years, and more so since the pandemic. Those with traditional privileged access may now be working from...
Vorsprung vor den Cyberkriminellen: Die externen Bedrohungen verstehen
Whitepaper
Vorsprung vor den Cyberkriminellen: Die externen Bedrohungen verstehen
Verantwortliche für Cybersicherheit sehen sich mit wachsenden Herausforderungen konfrontiert, da die Cyberkriminellen immer kreativer werden und mit einem anscheinend unendlichen Arsenal an...
Why Your Organization Needs Data-centric Security
Whitepaper
Why Your Organization Needs Data-centric Security
Data-centric security is an alternative approach towards information protection that has emerged as a direct response to the increasingly obvious failure of traditional measures focusing on...
Customer authentication with zero-friction passwordless authentication
Whitepaper
Customer authentication with zero-friction passwordless authentication
To increase security and convenience, businesses and organizations need to adopt and implement a modern authentication system that does not rely on customers remembering usernames and passwords....
Getting Ahead of the Cybercriminals: Understanding the External Threat Landscape
Whitepaper
Getting Ahead of the Cybercriminals: Understanding the External Threat Landscape
Security leaders face an uphill task as cybercriminals become increasingly creative and armed with an arsenal of seemingly unlimited resources. Rapid digitalization to re-capture post-pandemic...
HYPR Passwordless and Phishing-resistant Authentication
Executive View
HYPR Passwordless and Phishing-resistant Authentication
Die passwortlose Authentifizierung wird zum neuen Standard. Benutzer müssen keine lästigen Passwörter mehr verwenden und die mit Passwörtern verbundenen Sicherheitsrisiken werden umgangen....
Data Privacy Laws in the UAE
Leadership Brief
Data Privacy Laws in the UAE
The United Arab Emirates has passed its first federal data privacy law, in force as of January 2, 2022. Aligning well with global privacy regulation best practice, the Personal Data Protection Law...
Container Security
Leadership Compass
Container Security
This report is an overview of the market for Container Security solutions and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment,...
Previous
7 8 9 10 11 12 13 Next