Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Future of Identity Management
Advisory Note
Future of Identity Management
Digital identities are at the core of Digital Transformation, Information Security and Privacy, and therefore it has never been more important for enterprises to ensure they have the capability to...
TrueFort Fortress XDR
Executive View
TrueFort Fortress XDR
TrueFort Fortress XDR is an application detection and response platform offering integrated application behavior analysis and security for real-time visibility into critical business applications,...
Responding to Cyber Incidents
Leadership Brief
Responding to Cyber Incidents
The overwhelming majority of organizations now depend upon online services to support their business and this exposes them to cyber security risks. While most have security protection technologies...
Top Cyber Threats
Leadership Brief
Top Cyber Threats
The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using hybrid scenarios...
Do I Need Endpoint Detection & Response (EDR)?
Leadership Brief
Do I Need Endpoint Detection & Response (EDR)?
EDR products are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? If so, do you have the expertise in-house to properly deploy, operate,...
Radiant Logic and the Identity Integration Imperative
Whitepaper
Radiant Logic and the Identity Integration Imperative
Digital transformation and the need for business agility are creating an explosion in the volume, variety and velocity of identity data that enterprises have to manage efficiently. And now...
Identity Governance. The Value of Leveraging IGA Functions from the Cloud
Whitepaper
Identity Governance. The Value of Leveraging IGA Functions from the Cloud
With IT functions gradually shifting to the cloud, it is time to rethink the way supporting infrastructure and platform services such as IGA (Identity Governance and Administration) are...
Darktrace Enterprise Immune System
Executive View
Darktrace Enterprise Immune System
Darktrace Enterprise Immune System is a cyber-defense platform that utilizes a self-learning AI-based technology to detect, investigate and neutralize various cyber-threats in real time, across the...
VeriClouds Identity Threat Protection Platform
Executive View
VeriClouds Identity Threat Protection Platform
Securely authenticating users remains a difficult problem. VeriClouds offers an Identity Threat Protection Platform that can provide a useful additional level of assurance against the reuse of...
Governance for all data: Get a grip on unstructured data
Whitepaper
Governance for all data: Get a grip on unstructured data
While many businesses have solutions for managing and reviewing access at a coarse-grain, cross-system level in place as part of their Identity & Access Governance solutions, they lack an...
GRC Reference Architecture
Advisory Note
GRC Reference Architecture
GRC covers the areas of Governance, Risk and Compliance and this report refers to GRC in the context of delivering IT services to meet organizational goals. GRC is concerned with setting...
ObserveIT Insider Threat Management
Executive View
ObserveIT Insider Threat Management
ObserveIT Insider Threat Management is a platform that combines the functionality of traditional User Behavior Analytics (UBA) and Data Loss Prevention (DLP) products in a lightweight and...
Previous
8 9 10 11 12 13 14 Next