Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Tata Communications MDR
Executive View
Tata Communications MDR
This KuppingerCole Executive View report looks at the managed detection and response (MDR) market and at how solutions address key challenges, with a review of the MDR service and related...
IBM Security and Compliance Center
Executive View
IBM Security and Compliance Center
IBM Security and Compliance Center represents a fresh approach toward the very notion of security and compliance in multi-cloud environments. With this product that unifies a full-featured CNAPP...
Email Security
Leadership Compass
Email Security
This report provides an overview of the Email Security market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor...
IAM System Integrators - EU
Leadership Compass
IAM System Integrators - EU
This Leadership Compass evaluates and provides insight into the capabilities of IAM system integrators serving customers in the European region. We examine market segments, provider service...
Maturity Level Matrix for Cyber Security
Advisory Note
Maturity Level Matrix for Cyber Security
KuppingerCole Maturity Level Matrices cover the major market segments within cyber security. This matrix aligns with the processes essential to good cyber hygiene as well as the NIST cybersecurity...
Evolveum MidPoint 4.8 Release
Executive View
Evolveum MidPoint 4.8 Release
This KuppingerCole Executive View looks at the new features in release 4.8 of Evolveum’s midPoint IGA platform. Evolveum continues to innovate midPoint by introducing new features around advanced...
How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive Authentication and Fine-Grained Authorization
Whitepaper
How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive Authentication and Fine-Grained Authorization
Every organization, regardless of size or industry, needs an agile and modern Identity and Access Management (IAM) platform. As the cybersecurity threat landscape continues to evolve, so do the...
Cloud Infrastructure Entitlement Management (CIEM)
Leadership Compass
Cloud Infrastructure Entitlement Management (CIEM)
This Leadership Compass provides an overview and insights into the Cloud Infrastructure Entitlement Management (CIEM) market, with the aim of helping your organization find the right products and...
How Enterprises Will Learn to Love Decentralized IDs: The Roles of Distributed and Sovereign Identities in Our Private Metaverse
Advisory Note
How Enterprises Will Learn to Love Decentralized IDs: The Roles of Distributed and Sovereign Identities in Our Private Metaverse
Recently, Meta CEO Mark Zuckerberg demonstrated in captivating detail a working beta version of photorealistic—or rather, video realistic—avatars in the metaverse. Zuckerberg also claims that this...
ReliaQuest GreyMatter
Executive View
ReliaQuest GreyMatter
Dieser Executive View Report von KuppingerCole befasst sich mit den Herausforderungen im Bereich der Cybersicherheit und den Optionen, die den Sicherheitsverantwortlichen für Managed Security...
API Security & Management
Leadership Compass
API Security & Management
This Leadership Compass provides an overview of the market for API security and management solutions, along with recommendations and guidance for finding the products which address your...
Invisily Zero Trust Network Access
Executive View
Invisily Zero Trust Network Access
Invisily is a Zero Trust Network Access platform that supports a broad range of deployment scenarios without the technical debt of existing competing solutions. It offers several unique...
Previous
1 2 3 4 5 6 7 Next