Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Veracode Application Security Platform
Executive View
Veracode Application Security Platform
Veracode Application Security Platform is a cloud-based application security testing platform providing unified insights into software security risks at every stage of the development lifecycle.
Big Data Security, Governance, Stewardship
Advisory Note
Big Data Security, Governance, Stewardship
An ever-increasing number of devices, sensors and people are connected to the global internet and generate data. The analysis of this data can help organizations to improve their effectiveness and...
Mitigating Availability & Security Risks in  Centralized Digital Workplace Delivery
Leadership Brief
Mitigating Availability & Security Risks in Centralized Digital Workplace Delivery
Centralizing delivery of digital workplaces can bring cost, efficiency and productivity rewards but security and risk management must be baked in if availability is not compromised by cyber attacks...
NextLabs Data Centric Security in the Hybrid Cloud
Executive View
NextLabs Data Centric Security in the Hybrid Cloud
Organizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with external parties....
Exabeam Security Management Platform
Executive View
Exabeam Security Management Platform
Exabeam is a highly modular platform for collecting, storing, managing and correlating security events across multiple IT systems, both on-premises and in the cloud, with integrated orchestration...
Security Organization, Governance, and the Cloud
Advisory Note
Security Organization, Governance, and the Cloud
The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost. This document provides an overview of the...
United Security Providers Secure Entry Server
Executive View
United Security Providers Secure Entry Server
United Security Providers (USP) provides a web access management platform designed to provide a unified and efficient approach towards Web Application Firewall (WAF), Authentication, CIAM and...
Cloud Infrastructure Entitlement Management (CIEM)
Leadership Compass
Cloud Infrastructure Entitlement Management (CIEM)
This Leadership Compass provides an overview and insights into the Cloud Infrastructure Entitlement Management (CIEM) market, with the aim of helping your organization find the right products and...
Attack Surface Management
Leadership Compass
Attack Surface Management
This report provides an overview of the Attack Surface Management market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment,...
Cyber Risks from China: How Contract Negotiations Can Mitigate IT Risks
Advisory Note
Cyber Risks from China: How Contract Negotiations Can Mitigate IT Risks
China is an important economic partner for most enterprises, but doing business in and with China introduces its own set of risks. This report provides an overview of the major cyber related risks...
Prepare and Protect against Software Vulnerabilities
Leadership Brief
Prepare and Protect against Software Vulnerabilities
All software contains vulnerabilities that can be exploited by adversaries to attack the IT systems and data that organizations depend upon. It is essential that organizations have a vulnerability...
CYFIRMA DeCYFIR
Executive View
CYFIRMA DeCYFIR
Reactive security measures respond to cyberattacks that have already happened. While cybersecurity spending is increasing, cyberattacks are also becoming more frequent. To mitigate risks and...
Previous
1 2 3 4 5 6 7 Next