Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Introduction to the Information Protection Life Cycle and Framework
Leadership Brief
Introduction to the Information Protection Life Cycle and Framework
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...
Safeguarding Your Most Valuable Data: Five Key Criteria to Assess Cloud Provider Security
Whitepaper
Safeguarding Your Most Valuable Data: Five Key Criteria to Assess Cloud Provider Security
This whitepaper focuses on defining the key security-focused selection criteria to help your company choose a secure platform for current and future cloud projects.
Cleafy Advanced Threat Detection & Protection
Executive View
Cleafy Advanced Threat Detection & Protection
Cleafy is a real-time clientless application risk assessment, threat detection and prevention platform for online services in highly regulated industries. Providing protection against advanced...
Database and Big Data Security
Leadership Compass
Database and Big Data Security
This Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection and...
California Consumer Privacy Act: The Need for Data-Centric Security
Whitepaper
California Consumer Privacy Act: The Need for Data-Centric Security
CCPA is the latest in a series of global privacy regulations. It comes with new requirements for dealing with personal data and is accompanied by severe penalties. Thus, businesses must take...
Micro Focus® Data Protector
Executive View
Micro Focus® Data Protector
Ensuring the continuity of IT services is an essential component of business continuity planning. Organizations typically use data protection solutions that take copies of the IT service data which...
Informatica Data Privacy Management
Executive View
Informatica Data Privacy Management
Informatica Data Privacy Management is an AI-enhanced unified data security platform for identifying, analyzing, quantifying and mitigating risk related to sensitive data to enable businesses to...
Informatica Cloud Data Governance and Catalog
Executive View
Informatica Cloud Data Governance and Catalog
Informatica Cloud Data Governance and Catalog is a comprehensive solution for managing data and its metadata in a SaaS solution, providing the data catalog and data governance across all corporate...
Ping Identity Data Governance
Executive View
Ping Identity Data Governance
In the increasingly data-driven world today, it is essential to protect against unauthorized data access to prevent exposure and breaches, meet consumer expectations, and comply with the growing...
Oracle Data Safe
Executive View
Oracle Data Safe
Oracle Data Safe is a cloud-based service that improves Oracle database security by identifying risky configuration, users and sensitive data, which allows customers to closely monitor user...
VeriClouds Identity Threat Protection Platform
Executive View
VeriClouds Identity Threat Protection Platform
Securely authenticating users remains a difficult problem. VeriClouds offers an Identity Threat Protection Platform that can provide a useful additional level of assurance against the reuse of...
Exploring the Microsoft Azure Information Protection Landscape
Executive View
Exploring the Microsoft Azure Information Protection Landscape
Microsoft Azure Information Protection creates a viable user experience for data classification and labeling of Office documents and emails. It enables sensitive data discovery; integrates data...
Previous
1 2 3 4 5 6 7 Next