Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Search Results

Federal Regulations on Cybersecurity

Advisory Note

Federal Regulations on Cybersecurity

Federal Regulations on cybersecurity are regularly published at the national level. However, these national regulations also impact federal regulations in other countries. Therefore, looking at...

IT-GRC Tools

Market Compass

IT-GRC Tools

The KuppingerCole Market Compass provides an overview of the product or service offerings in the IT-GRC Tools market. As organizations continue to embrace digital technologies, an IT GRC solution...

Micro Focus® Data Protector

Executive View

Micro Focus® Data Protector

Ensuring the continuity of IT services is an essential component of business continuity planning. Organizations typically use data protection solutions that take copies of the IT service data which...

Cybersecurity for Industrial Control Systems

Market Compass

Cybersecurity for Industrial Control Systems

Focus on Operation Technology (OT) is increasing for two reasons: firstly, governments worldwide have, or are threatening to, intervene in cases of compromise of OT infrastructure and secondly,...

Policy Based Access Management

Market Compass

Policy Based Access Management

Access control is recognized as the most important component of an organization's cybersecurity protection. For too long access control has been based on static entitlements, but this is changing....

Identity Fabrics

Leadership Compass

Identity Fabrics

This report provides an overview of the market for Identity Fabrics, which are comprehensive IAM solutions built on a modern, modular architecture. It provides you with a compass to help you to...

Success in the Digital Age: Put Identity & Access at the Forefront

Whitepaper

Success in the Digital Age: Put Identity & Access at the Forefront

Success in the Digital Age depends on many factors. Bringing the right digital services to the market on time is the foundation for differentiating in today’s volatile competitive landscape....

Software Supply Chain Security: Don’t Get Your Code Tampered

Whitepaper

Software Supply Chain Security: Don’t Get Your Code Tampered

Recent events such as the SolarWinds and Kaseya incidents have demonstrated the need to focus significantly more on software supply chain security. Thus, avoiding code tampering by external...

KRIs and KPI for Cyber Security

Advisory Note

KRIs and KPI for Cyber Security

This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks...

Hybrid Cloud Backup and Disaster Recovery

Buyer's Compass

Hybrid Cloud Backup and Disaster Recovery

This Buyer's Compass covers solutions that provide backup and restoration of IT service data into the cloud in the context of the hybrid IT service delivery environment that is now commonly found...

Related Content

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00