Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
ARCON Endpoint Privilege Management
Executive View
ARCON Endpoint Privilege Management
The number of privileged requests made from endpoints has increased significantly in recent years, and more so since the pandemic. Those with traditional privileged access may now be working from...
Vorsprung vor den Cyberkriminellen: Die externen Bedrohungen verstehen
Whitepaper
Vorsprung vor den Cyberkriminellen: Die externen Bedrohungen verstehen
Verantwortliche für Cybersicherheit sehen sich mit wachsenden Herausforderungen konfrontiert, da die Cyberkriminellen immer kreativer werden und mit einem anscheinend unendlichen Arsenal an...
Why Your Organization Needs Data-centric Security
Whitepaper
Why Your Organization Needs Data-centric Security
Data-centric security is an alternative approach towards information protection that has emerged as a direct response to the increasingly obvious failure of traditional measures focusing on...
Customer authentication with zero-friction passwordless authentication
Whitepaper
Customer authentication with zero-friction passwordless authentication
To increase security and convenience, businesses and organizations need to adopt and implement a modern authentication system that does not rely on customers remembering usernames and passwords....
Getting Ahead of the Cybercriminals: Understanding the External Threat Landscape
Whitepaper
Getting Ahead of the Cybercriminals: Understanding the External Threat Landscape
Security leaders face an uphill task as cybercriminals become increasingly creative and armed with an arsenal of seemingly unlimited resources. Rapid digitalization to re-capture post-pandemic...
HYPR Passwordless and Phishing-resistant Authentication
Executive View
HYPR Passwordless and Phishing-resistant Authentication
Die passwortlose Authentifizierung wird zum neuen Standard. Benutzer müssen keine lästigen Passwörter mehr verwenden und die mit Passwörtern verbundenen Sicherheitsrisiken werden umgangen....
Data Privacy Laws in the UAE
Leadership Brief
Data Privacy Laws in the UAE
The United Arab Emirates has passed its first federal data privacy law, in force as of January 2, 2022. Aligning well with global privacy regulation best practice, the Personal Data Protection Law...
Container Security
Leadership Compass
Container Security
This report is an overview of the market for Container Security solutions and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment,...
Hitachi ID Bravura Privilege
Executive View
Hitachi ID Bravura Privilege
Hitachi ID is a global IAM software provider, based in Canada. It offers Hitachi ID Bravura Privilege as its primary offering to the PAM market, along with the complementary Hitachi ID Bravura...
Claroty – Visibility into Vulnerability
Whitepaper
Claroty – Visibility into Vulnerability
Organizations are facing a brave new world in which governments are taking a proactive role in constraining cybersecurity risks. Companies with operational infrastructure that is deemed ‘critical’...
Maturity Level Matrix for IAM
Advisory Note
Maturity Level Matrix for IAM
KuppingerCole Maturity Level Matrices for the major market segments within IAM (Identity, and Access Management), IGA (Identity Governance and Administration) and CIAM (Consumer Identity and Access...
Unified Endpoint Management (UEM) 2021
Leadership Compass
Unified Endpoint Management (UEM) 2021
This report provides an updated overview of the market for Unified Endpoint Management (UEM) and provides you with a compass to help you to find the solution that best meets your needs. We examine...
Previous
7 8 9 10 11 12 13 Next