Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Customer authentication with zero-friction passwordless authentication
Whitepaper
Customer authentication with zero-friction passwordless authentication
To increase security and convenience, businesses and organizations need to adopt and implement a modern authentication system that does not rely on customers remembering usernames and passwords....
R&S®Trusted Application Factory by Rohde & Schwarz Cybersecurity
Executive View
R&S®Trusted Application Factory by Rohde & Schwarz Cybersecurity
Application security is of increasing concern to organizations, particularly following the series of software supply chain attacks in recent years. With the shift to microservices architectures and...
Identity Threat Detection and Response (ITDR): IAM Meets the SOC
Leadership Compass
Identity Threat Detection and Response (ITDR): IAM Meets the SOC
The nascent identity threat detection and response (ITDR) market is gaining tremendous momentum in 2024. Cisco and Delinea recently jumped into the market with their recent acquisitions of Oort and...
Security Service Edge
Buyer's Compass
Security Service Edge
Digital transformation and cloud-delivered services have led to a tectonic shift in how applications and users are distributed. Protecting sensitive resources of the increasingly distributed...
Web Application Firewalls
Leadership Compass
Web Application Firewalls
This report provides up-to-date insights into the Web Application Firewall (WAF) market. We examine the market segment, vendor service functionality, relative market share, and innovation to help...
Cyber Risk Frameworks in 2024
Advisory Note
Cyber Risk Frameworks in 2024
The landscape of cybersecurity is continually evolving, with new threats and technologies reshaping the way organizations protect their digital assets. In order to understand the significance of...
Policy Based Access Management
Leadership Compass
Policy Based Access Management
Efficient, effective management of access controls from infrastructure to applications remains an aspiration for enterprises. The main drivers of this goal include the need for strengthening the...
Cloud-Native Application Protection Platforms
Buyer's Compass
Cloud-Native Application Protection Platforms
Cloud IaaS is used extensively to develop, deliver new applications, and reengineer existing ones. This is often because cloud services provide an environment for accelerated development without...
Cloud-Native Application Protection Platforms (CNAPP)
Leadership Compass
Cloud-Native Application Protection Platforms (CNAPP)
This report provides an overview of the Cloud-Native Application Protection Platforms (CNAPP) market and a compass to help you find a solution that best meets your needs. It examines solutions that...
Identity Fabrics
Leadership Compass
Identity Fabrics
This report provides an overview of the market of providers of technology for building Identity Fabrics, which are comprehensive IAM solutions built on a modern, modular architecture. It provides a...
Cybersecurity & IAM:​ 2023 in Numbers
Survey
Cybersecurity & IAM:​ 2023 in Numbers
Significant advancements happened in identity and access management (IAM) and cybersecurity in 2023. For most organizations, it has become more and more important to strengthen cybersecurity and...
Maturity Level Matrix for Cyber Security
Advisory Note
Maturity Level Matrix for Cyber Security
KuppingerCole Maturity Level Matrices cover the major market segments within cyber security. This matrix aligns with the processes essential to good cyber hygiene as well as the NIST cybersecurity...
Previous
1 2 3 4 5 6 7 Next