Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Zero Trust Network Access
Leadership Compass
Zero Trust Network Access
This report is an overview of the market for Zero Trust Network Access (ZTNA) solutions and provides you with a compass to help you to find the solution that best meets your needs. We examine the...
ZertID from Sysintegra
Executive View
ZertID from Sysintegra
Sysintegra ZertID is an IGA solution that is built on top of the ServiceNow platform. It integrates natively with ServiceNow features such as the CMDB and Security Incident handling. By utilizing...
EU NIS2 Directive
Leadership Brief
EU NIS2 Directive
Every organization needs to take steps to ensure their cyber resilience and this updated directive provides a useful framework for this. This report provides a summary of the technical obligations...
Arcserve Unified Data Resilience
Executive View
Arcserve Unified Data Resilience
Data resilience solutions are an essential element of business continuity plans and, as organizations go through digital transformation and become more dependent upon their IT services, the need...
Microsoft Entra Permissions Management
Executive View
Microsoft Entra Permissions Management
As organizations adopt multi cloud infrastructures to support business workflows involving user and workload identities it's increasingly difficult to know who has access to what data across which...
Identity & Security: Addressing the Modern Threat Landscape
Whitepaper
Identity & Security: Addressing the Modern Threat Landscape
Identity and Access Management (IAM) and Cybersecurity have for too long been separate disciplines with distinct solutions that have not interoperated optimally. This has put defenders at a...
Web Application Firewalls
Leadership Compass
Web Application Firewalls
This report provides an overview of the Web Application Firewall (WAF) market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market...
ARCON Endpoint Privilege Management
Executive View
ARCON Endpoint Privilege Management
The number of privileged requests made from endpoints has increased significantly in recent years, and more so since the pandemic. Those with traditional privileged access may now be working from...
Vorsprung vor den Cyberkriminellen: Die externen Bedrohungen verstehen
Whitepaper
Vorsprung vor den Cyberkriminellen: Die externen Bedrohungen verstehen
Verantwortliche für Cybersicherheit sehen sich mit wachsenden Herausforderungen konfrontiert, da die Cyberkriminellen immer kreativer werden und mit einem anscheinend unendlichen Arsenal an...
Einfachere und stärkere Authentifizierung mit passwortloser Desktop-MFA
Whitepaper
Einfachere und stärkere Authentifizierung mit passwortloser Desktop-MFA
Wenn ein Passwort wie ein Hausschlüssel ist, dann sollte die Grundlage der Sicherheit der IT-Systeme eines Unternehmens eine sicher verschlossene Eingangstür sein. Wenn die Eingangstür bestmöglich...
IAM Projects Done Right: Everything as a Service
Whitepaper
IAM Projects Done Right: Everything as a Service
Delivering on IAM is not always easy. Many organizations have experienced IAM projects stalling. An approach for one-stop-shopping can help, where the implementation, the IDaaS style deployment...
Cyber Hygiene: The Foundation for Cyber Resilience
Leadership Brief
Cyber Hygiene: The Foundation for Cyber Resilience
Most cyber incidents result from poor cyber hygiene. To avoid these, organizations must make sure that all the routine tasks needed to keep their systems, data, and applications safe are performed...
Previous
8 9 10 11 12 13 14 Next