Research

Leadership Brief

KuppingerCole’s Leadership Brief provides condensed research and advice for executives and decision makers in organizations. These two-page documents cover business challenges and advise on how to address them, focusing on the key issues and allowing decision makers to quickly identify the right solutions.
Six Core Principles for Selecting Your Most Suitable IAM Implementation Partner
Leadership Brief
Six Core Principles for Selecting Your Most Suitable IAM Implementation Partner
The increasing demands of IT result in rapidly changing IT landscapes. Many companies do not have the necessary expertise and staff capacity to meet these requirements in terms of flexibility,...
Working for the Business, not the Auditors
Leadership Brief
Working for the Business, not the Auditors
Forward-thinking companies no longer see cybersecurity, governance, compliance and privacy as something they are just forced to do. Instead, a comprehensive alignment with applicable policies,...
Status and Advantages of Small Data Machine Learning Paradigms
Leadership Brief
Status and Advantages of Small Data Machine Learning Paradigms
Consider the relationship between Machine Learning (ML) and data consumption – is more always better? This Leadership Brief discusses the possible benefits of Small Data for ML, some technological...
The Role of AI in Modern Business Intelligence Platforms
Leadership Brief
The Role of AI in Modern Business Intelligence Platforms
Business intelligence (BI) platforms have become essential for enterprises with an exponential increase in data generation and usage. The next generation of BI platforms will expand on the volume...
Recommendations for aligning ITSM with IAM/IGA
Leadership Brief
Recommendations for aligning ITSM with IAM/IGA
The versatility of modern IT Service Management systems (ITSM) is leading many organizations to configure these systems to deal with all employee service requests, including those related to...
The Information Protection Life Cycle and Framework: Deceive
Leadership Brief
The Information Protection Life Cycle and Framework: Deceive
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...
Incident Response Management
Leadership Brief
Incident Response Management
The probability of becoming a victim of a data breach is now higher than ever. The hyperconnected world and the ever-increasing complexity of modern IT systems and processes pose new challenges for...
The Information Protection Life Cycle and Framework: Dispose
Leadership Brief
The Information Protection Life Cycle and Framework: Dispose
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...
Wie wir Passwörter loswerden – Noch Heute
Leadership Brief
Wie wir Passwörter loswerden – Noch Heute
Die IT-Sicherheits-Community ist sich schon lange einig, dass Passwörter ein Problem sind, weil sie einfach zu entwenden und im Endeffekt anfällig für menschliche Fehler sind. Dieser Leadership...
Security Fabric: A Methodology for Architecting a Secure Future
Leadership Brief
Security Fabric: A Methodology for Architecting a Secure Future
Work from home, bring your own device, a professional cyber-crime industry, IoT & OT. We all have to face these challenges while fullfilling a zoo of endless requirements. It is complex to keep the...
The Information Protection Life Cycle and Framework: Secure
Leadership Brief
The Information Protection Life Cycle and Framework: Secure
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...
Enterprise Information Protection
Leadership Brief
Enterprise Information Protection
The perimeter of the corporation has transformed into a much more fluid and permeable boundary than it once was. Sensitive information is now routinely accessed with personal and business devices...