Research

Whitepaper

KuppingerCole’s Whitepaper is a report written by one of KC’s analysts that informs readers about a specific, usually complex issue. A whitepaper is meant to help readers understand an issue, solve a problem, or make a decision.
Zoom Unified Communications Platform Security and Compliance
Whitepaper
Zoom Unified Communications Platform Security and Compliance
Zoom offers a cloud-based unified communications platform (UCaaS) featuring video communications. UCaaS delivers many benefits including flexibility, performance, and price. Organizations should...
Going Beyond Traditional Penetration Testing
Whitepaper
Going Beyond Traditional Penetration Testing
Penetration testing is an essential methodology used to discover and remediate vulnerabilities and reduce risks from cyber-attacks and cybercrime. Regular penetration testing is recommended and, in...
Cloud Access Governance
Whitepaper
Cloud Access Governance
Across the globe there has been a significant increase in the adoption of cloud and multi-cloud environments, as businesses scramble to take advantage of digital transformation. With more clouds...
Automating the SOC
Whitepaper
Automating the SOC
SOAR, Security Orchestration, Automation and Response, is the latest in a line of security buzzwords to hit the market; and while SOAR may have only emerged in the last few years, it is fast...
Secure Software Supply Chains
Whitepaper
Secure Software Supply Chains
Major cyber-attacks such as the SolarWinds and Kaseya incidents demonstrate the need to focus significantly more on software supply chain security as well as traditional cyber defense areas....
Accelerating Your Digital Business with Customer Identity
Whitepaper
Accelerating Your Digital Business with Customer Identity
The role of Consumer Identity and Access Management (CIAM) is still massively undervalued by many organizations. Both drop-off and churn rates are heavily impacted by cumbersome registration and...
How to Build the Modern CIAM: For Customers, Consumers, and Citizens
Whitepaper
How to Build the Modern CIAM: For Customers, Consumers, and Citizens
In the digital age, the “C identities” of customers, consumers, citizens, and all the other types of external identities, such as tourists, are at the forefront of every digital business and...
A New Era for Digital Identity in Germany
Whitepaper
A New Era for Digital Identity in Germany
The journey towards digital identity in Germany has been fraught with optimism, failure, and continued persistence. It is currently at a crossroads – consumer and private sector behavior indicate a...
Considerations for Reducing the Risk of Ransomware
Whitepaper
Considerations for Reducing the Risk of Ransomware
In this paper, we will expand our view of ransomware and demonstrate how treating it as an isolated security challenge is not a sustainable approach. We will show why prevention is the best...
Understanding and Managing Privileged Access to Databases and Other Data Resources
Whitepaper
Understanding and Managing Privileged Access to Databases and Other Data Resources
This Whitepaper analyses the issues surrounding access management, privacy, security and compliance when identities access compute and storage resources, with a special focus on database...
Modernizing Legacy IAM Systems
Whitepaper
Modernizing Legacy IAM Systems
Legacy IAM systems can no longer meet the requirements of Digital Transformation. They often have a negative impact on business efficiency and customer experience. Such systems are too costly to...
Identity & Security: Addressing the Modern Threat Landscape
Whitepaper
Identity & Security: Addressing the Modern Threat Landscape
Identity and Access Management (IAM) and Cybersecurity have for too long been separate disciplines with distinct solutions that have not interoperated optimally. This has put defenders at a...
Previous
1 2 3 4 5 6 7 Next