Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
API Management and Security
Leadership Compass
API Management and Security
This Leadership Compass provides an overview of the market for API management and security solutions along with recommendations and guidance for finding the products which address your requirements...
Cyber Risk – Choosing the Right Framework
Advisory Note
Cyber Risk – Choosing the Right Framework
As organizations undergo Digital Transformation the business impact of cyber risks increases. It is essential that organizations manage these risks. There are several frameworks that...
Core Features of Privacy and Consent Management Solutions
Buyer's Compass
Core Features of Privacy and Consent Management Solutions
Building a trust-filled and transparent relationship with end-users depends now more than ever on Privacy and Consent Management solutions. These services accomplish many tasks such as helping...
KRIs and KPI for Cyber Security
Advisory Note
KRIs and KPI for Cyber Security
This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks...
IaaS Tenant Security Controls
Buyer's Compass
IaaS Tenant Security Controls
IT Organizations now commonly use multiple cloud services as well as on premises IT. This KuppingerCole Buyer's Compass focusses on the capabilities IaaS services provide to manage the common...
Architecting your Security Operations Centre
Advisory Note
Architecting your Security Operations Centre
A security operations centre (SOC) is a dedicated team, usually operating 24x365, to detect and respond to cybersecurity incidents within your organisation that potentially affect your people and...
Archer Integrated Risk Management
Executive View
Archer Integrated Risk Management
Today’s GRC solutions offer better alignment with corporate objectives, increased transparency, superior information risk management and more cost-effective compliance. This paper looks at the...
What strategic role should Azure AD play in your org?
Leadership Brief
What strategic role should Azure AD play in your org?
As access management and governance becomes more important for security and compliance reasons, businesses are looking for a single solution to manage both on-prem and cloud access. This Leadership...
KRITIS – Understanding and Protecting Critical Infrastructure
Whitepaper
KRITIS – Understanding and Protecting Critical Infrastructure
Organizations or institutions that are essential for the public are called Critical Infrastructure (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict...
Microsoft Azure Active Directory
Executive View
Microsoft Azure Active Directory
From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly delivered as...
How to Assure Cloud Services
Advisory Note
How to Assure Cloud Services
This report is one of a series of documents around the use of cloud services. It identifies how standards as well as, independent certifications and attestations can be used to assure the security...
Incident Response Management
Leadership Brief
Incident Response Management
The probability of becoming a victim of a data breach is now higher than ever. The hyperconnected world and the ever-increasing complexity of modern IT systems and processes pose new challenges for...
Previous
11 12 13 14 15 16 17 Next