Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Cloud-delivered Security
Market Compass
Cloud-delivered Security
The KuppingerCole Market Compass provides an overview of the broad market of cybersecurity solutions delivered from the cloud, focusing primarily on Zero Trust and Secure Access Service Edge (SASE)...
Security Operations in the Age of Zero Trust
Whitepaper
Security Operations in the Age of Zero Trust
How must security operations transform to effectively deliver the comprehensive and integrated value of zero trust implementations? Security operations for Zero Trust must take a comprehensive...
Security Operations Center as a Service (SOCaaS)
Buyer's Compass
Security Operations Center as a Service (SOCaaS)
The Security Operations Center-as-a-Service (SOCaaS) market continues to develop in response to demand for security monitoring, analysis, detection, response, and improvement recommendations either...
Advanced IT security solutions for OT environments
Leadership Brief
Advanced IT security solutions for OT environments
Industrial Control Systems operators are increasingly targeted by Advanced Persistent Threat (APT) actors and cybercriminals as digital transformation accelerates. Many hitherto isolated systems...
Cloud Services and Security
Advisory Note
Cloud Services and Security
This report provides a review of the major security risks from the use of cloud services, how responsibility for security is divided between Cloud Service Provider and customer and the key controls...
5G Impact on Organizations and Security
Leadership Brief
5G Impact on Organizations and Security
5G is the next generation of cellular mobile communications. It will provide the capacity and connectivity required to industrialize IoT, Smart Cities and Smart Manufacturing. This report explains...
The Disruptive Potential of Blockchains in IoT Security
Advisory Note
The Disruptive Potential of Blockchains in IoT Security
Blockchains have the ability offer many solutions regarding the security concerns currently limiting the growth of the Internet of Things (IoT). Blockchains, combined with other decentralised,...
Safeguarding Your Most Valuable Data: Five Key Criteria to Assess Cloud Provider Security
Whitepaper
Safeguarding Your Most Valuable Data: Five Key Criteria to Assess Cloud Provider Security
This whitepaper focuses on defining the key security-focused selection criteria to help your company choose a secure platform for current and future cloud projects.
Rising to the Security Challenge of Heavy Cloud Adoption
Advisory Note
Rising to the Security Challenge of Heavy Cloud Adoption
Many enterprises have decided on a “cloud first” strategy, or have seen heavy cloud adoption evolve spontaneously as their business units embrace cloud for cost savings, agility or other...
Plant Automation Security
Advisory Note
Plant Automation Security
Industrial Computer Systems (ICS) are increasingly coming under attack as hackers are realizing the economic and reputational benefit of a successful operations technology system compromise....
Previous
1 2 3 4 5 6 7 Next