Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Integrated Risk Management Platforms
Market Compass
Integrated Risk Management Platforms
The KuppingerCole Market Compass Integrated Risk Management (IRM) focuses on platforms designed to manage risk within an organization including IT assets, business, vendor, and compliance-based risk.
SentinelOne Singularity Platform
Executive View
SentinelOne Singularity Platform
SentinelOne Singularity Platform is a security analytics platform for unified protection, detection, response, and remediation across heterogeneous IT environments powered by an autonomous AI...
Privacy and Consent Management 2022
Leadership Compass
Privacy and Consent Management 2022
This report provides an overview of the market for Privacy and Consent Management solutions and provides you with a compass to help you find the solution that best meets your needs. We examine the...
Deduce Customer Alerts and Identity Insights
Executive View
Deduce Customer Alerts and Identity Insights
Fraud is a pervasive and growing problem in most online businesses today. Fraud is eroding profits and decreasing consumer confidence across retail, finance, travel, healthcare, and many...
Delegated Administration as a Solution for B2B Use Cases
Whitepaper
Delegated Administration as a Solution for B2B Use Cases
In an emerging digital world, cross-company collaboration is part of day-to-day business. Partner networks are growing at a dramatic pace, making antiquated approaches to managing partner...
Orca Cloud Security Platform
Executive View
Orca Cloud Security Platform
Poorly managed security controls within a cloud services tenant's resources are increasingly the cause of security incidents and compliance failures. Today's dynamic infrastructure and development...
Security Operations in the Age of Zero Trust
Whitepaper
Security Operations in the Age of Zero Trust
How must security operations transform to effectively deliver the comprehensive and integrated value of zero trust implementations? Security operations for Zero Trust must take a comprehensive...
The Business Value of Decentralized Identity
Leadership Brief
The Business Value of Decentralized Identity
Decentralized identity and self-sovereign identity (SSI) are some of the most promising solutions using blockchain technology. The value for individual users is clear, bringing them privacy and...
Authlete API Authorization
Executive View
Authlete API Authorization
Authlete is a set of APIs for service providers to implement the standard protocols OAuth and OIDC (OpenID Connect). It enables developers of digital services to offload protocol operations and...
Unified Endpoint Management (UEM) 2021
Leadership Compass
Unified Endpoint Management (UEM) 2021
This report provides an updated overview of the market for Unified Endpoint Management (UEM) and provides you with a compass to help you to find the solution that best meets your needs. We examine...
Implementing SASE
Advisory Note
Implementing SASE
Secure Access Service Edge (SASE) architectures promise to prevent multiple types of cyber-attacks, but deciding whether SASE is right for your organization will require understanding whether SASE...
Atos DirX Access
Executive View
Atos DirX Access
Atos DirX Access is a mature solution for Access Management, covering the full range of targets from legacy web applications to modern SaaS services, and also supporting IoT environments. It comes...
Previous
14 15 16 17 18 19 20 Next