Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Microsoft Cloud App Security
Executive View
Microsoft Cloud App Security
Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to...
KRIs and KPI for Cyber Security
Advisory Note
KRIs and KPI for Cyber Security
This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks...
Privacy and Consent Management
Leadership Compass
Privacy and Consent Management
This report provides an overview of the market for Privacy and Consent Management platforms and provides you with a compass to help you to find the solution that best meets your needs. We examine...
Google's Cloud Identity
Executive View
Google's Cloud Identity
Identity as a Service (IDaaS) is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud based IAM services to support the growth in cloud-based...
Trends in Privileged Access Management for the Digital Enterprise
Advisory Note
Trends in Privileged Access Management for the Digital Enterprise
Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to...
Vorsprung vor den Cyberkriminellen: Die externen Bedrohungen verstehen
Whitepaper
Vorsprung vor den Cyberkriminellen: Die externen Bedrohungen verstehen
Verantwortliche für Cybersicherheit sehen sich mit wachsenden Herausforderungen konfrontiert, da die Cyberkriminellen immer kreativer werden und mit einem anscheinend unendlichen Arsenal an...
Redefining Access Governance:  A broader perspective
Advisory Note
Redefining Access Governance: A broader perspective
Traditional approaches to Access Governance are no longer fit for purpose due to the complexity of modern IT environments, increased security risk, and growing regulatory compliance requirements....
Zscaler Security-as-a-Service Platform
Executive View
Zscaler Security-as-a-Service Platform
Zscaler is the world’s largest multi-tenant distributed cloud security platform that delivers a broad range of services without any on-premises hardware or software agents, including cybersecurity,...
PAM for Managed Service Providers as an Added Value and Security Option
Whitepaper
PAM for Managed Service Providers as an Added Value and Security Option
Privileged Access Management (PAM) is an essential component in protecting organizations against cyber-attacks, ransomware, malware, phishing, and data leaks. No longer a tool for protecting admin...
Getting Ahead of the Cybercriminals: Understanding the External Threat Landscape
Whitepaper
Getting Ahead of the Cybercriminals: Understanding the External Threat Landscape
Security leaders face an uphill task as cybercriminals become increasingly creative and armed with an arsenal of seemingly unlimited resources. Rapid digitalization to re-capture post-pandemic...
Privileged Access Management
Leadership Compass
Privileged Access Management
Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to...
Policy Based Access Management
Market Compass
Policy Based Access Management
Access control is recognized as the most important component of an organization's cybersecurity protection. For too long access control has been based on static entitlements, but this is changing....
Previous
9 10 11 12 13 14 15 Next