Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Search Results

PAM for Managed Service Providers as an Added Value and Security Option

Whitepaper

PAM for Managed Service Providers as an Added Value and Security Option

Privileged Access Management (PAM) is an essential component in protecting organizations against cyber-attacks, ransomware, malware, phishing, and data leaks. No longer a tool for protecting admin...

KRIs and KPI for Cyber Security

Advisory Note

KRIs and KPI for Cyber Security

This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks...

Security Operations Center as a Service (SOCaaS)

Buyer's Compass

Security Operations Center as a Service (SOCaaS)

The Security Operations Center-as-a-Service (SOCaaS) market continues to develop in response to demand for security monitoring, analysis, detection, response, and improvement recommendations either...

Security Operations in the Age of Zero Trust

Whitepaper

Security Operations in the Age of Zero Trust

How must security operations transform to effectively deliver the comprehensive and integrated value of zero trust implementations? Security operations for Zero Trust must take a comprehensive...

The Disruptive Potential of Blockchains in IoT Security

Advisory Note

The Disruptive Potential of Blockchains in IoT Security

Blockchains have the ability offer many solutions regarding the security concerns currently limiting the growth of the Internet of Things (IoT). Blockchains, combined with other decentralised,...

5G Impact on Organizations and Security

Leadership Brief

5G Impact on Organizations and Security

5G is the next generation of cellular mobile communications. It will provide the capacity and connectivity required to industrialize IoT, Smart Cities and Smart Manufacturing. This report explains...

Plant Automation Security

Advisory Note

Plant Automation Security

Industrial Computer Systems (ICS) are increasingly coming under attack as hackers are realizing the economic and reputational benefit of a successful operations technology system compromise....

Mitigating Availability & Security Risks in  Centralized Digital Workplace Delivery

Leadership Brief

Mitigating Availability & Security Risks in Centralized Digital Workplace Delivery

Centralizing delivery of digital workplaces can bring cost, efficiency and productivity rewards but security and risk management must be baked in if availability is not compromised by cyber attacks...

United Security Providers Secure Entry Server

Executive View

United Security Providers Secure Entry Server

United Security Providers (USP) provides a web access management platform designed to provide a unified and efficient approach towards Web Application Firewall (WAF), Authentication, CIAM and...

Exabeam Security Management Platform

Executive View

Exabeam Security Management Platform

Exabeam is a highly modular platform for collecting, storing, managing and correlating security events across multiple IT systems, both on-premises and in the cloud, with integrated orchestration...

Related Content

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00