Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Search Results

Core Features of Privacy and Consent Management Solutions

Buyer's Compass

Core Features of Privacy and Consent Management Solutions

Building a trust-filled and transparent relationship with end-users depends now more than ever on Privacy and Consent Management solutions. These services accomplish many tasks such as helping...

Mitigating Availability & Security Risks in  Centralized Digital Workplace Delivery

Leadership Brief

Mitigating Availability & Security Risks in Centralized Digital Workplace Delivery

Centralizing delivery of digital workplaces can bring cost, efficiency and productivity rewards but security and risk management must be baked in if availability is not compromised by cyber attacks...

API Management and Security

Leadership Compass

API Management and Security

This Leadership Compass provides an overview of the market for API management and security solutions along with recommendations and guidance for finding the products which address your requirements...

KRIs and KPI for Cyber Security

Advisory Note

KRIs and KPI for Cyber Security

This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks...

Cyber Risk – Choosing the Right Framework

Advisory Note

Cyber Risk – Choosing the Right Framework

As organizations undergo Digital Transformation the business impact of cyber risks increases. It is essential that organizations manage these risks. There are several frameworks that...

What strategic role should Azure AD play in your org?

Leadership Brief

What strategic role should Azure AD play in your org?

As access management and governance becomes more important for security and compliance reasons, businesses are looking for a single solution to manage both on-prem and cloud access. This Leadership...

Incident Response Management

Leadership Brief

Incident Response Management

The probability of becoming a victim of a data breach is now higher than ever. The hyperconnected world and the ever-increasing complexity of modern IT systems and processes pose new challenges for...

KRITIS – Understanding and protecting critical infrastructure

Whitepaper

KRITIS – Understanding and protecting critical infrastructure

Organizations or institutions that are essential for the public are called Critical Infrastructure (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict...

IT Service Management

Leadership Compass

IT Service Management

This report provides an overview of the market for IT Service Management (ITSM) and provides you with a compass to help you to find the solution that best meets your needs. We examine the market...

Microsoft Azure Active Directory

Executive View

Microsoft Azure Active Directory

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly delivered as...

Stay Connected

KuppingerCole on social media

Related Content

Event Recording

Interview: Implications of Recent Court Ruling on EU-US Data Protection Umbrella Agreement

So I'd like to invite Mike Small with us. Hello, welcome. Hello, Annie. Thank you for inviting me. Well, thanks for showing up. We appreciate it. So I really appreciate you being willing to be here and share some of your thoughts on the fly. And so let's start at the beginning and give…

Webinar Recording

A Unified Approach to Modern Data Protection

But before we begin just one slide with some shameless advertising for KuppingerCole because we have some really interesting upcoming life events for you to attend, which are focusing on different aspects of identity management or cyber security, which are totally free for anyone to…

Event Recording

Dr. Matthias Artzt: Blockchain and GDPR – Tensions between Blockchain Technology and Data Protection Principles

Let's have a look at the agenda would like to talk you through a couple of, of points. Would you brief move on the next slide? Yes. So I would like to start with, with the use cases of blockchain technology and the financial sector, the now ed light on the questions, which blockchain player…

Combined Session

Quantum computers: the ultimate opponent for data protection

The development of quantum computers is rapidly advancing. The threat this technology poses to existing encryption systems is becoming more and more concrete, even catching interest with the political world: Institutions such as the American NIST or the German BSI are looking for encryption…

Event Recording

Privacy = Data Protection + X

So our panel for today is focusing on privacy equals data protection plus X. Hmm. So what could the X be? I have some thoughts, but maybe David, since you've joined us from space, the world is wide open where you are, why don't would you like to take the first thought David on privacy equals…

Webinar Recording

Assuring and Implementing Cybersecurity and Data Protection for Public Clouds

Good afternoon. Our good morning, ladies and gentlemen, welcome to this. Could a cold webinar assuring and implementing cybersecurity and data protection for public clouds. How to ensure confidential cooperation by moving from infrastructure security to data security. This webinar is…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00