Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Search Results

ESET Endpoint Security

Executive View

ESET Endpoint Security

ESET Endpoint Security cover the widest variety of endpoint operating systems. This endpoint protection product consistently rates very highly in terms of detection in independent malware detection...

Hybrid Cloud Backup and Disaster Recovery

Buyer's Compass

Hybrid Cloud Backup and Disaster Recovery

This Buyer's Compass covers solutions that provide backup and restoration of IT service data into the cloud in the context of the hybrid IT service delivery environment that is now commonly found...

Kaspersky Endpoint Security for Business

Executive View

Kaspersky Endpoint Security for Business

Kaspersky offers a full-featured Endpoint Security suite which includes one of the most advanced multi-mode anti-malware detection engines in the market, which is powered by their Global Research...

BehavioSec

Executive View

BehavioSec

BehavioSec is a fraud risk analysis and authentication solution provider whose products leverage advanced behavioral biometrics and Artificial Intelligence / Machine Learning detection technology...

Customer authentication with zero-friction passwordless authentication

Whitepaper

Customer authentication with zero-friction passwordless authentication

To increase security and convenience, businesses and organizations need to adopt and implement a modern authentication system that does not rely on customers remembering usernames and passwords....

Prepare and Protect against Software Vulnerabilities

Leadership Brief

Prepare and Protect against Software Vulnerabilities

All software contains vulnerabilities that can be exploited by adversaries to attack the IT systems and data that organizations depend upon. It is essential that organizations have a vulnerability...

Privileged Access Management

Leadership Compass

Privileged Access Management

Privileged Access Management (PAM) is an essential component in protecting organizations against cyber-attacks, ransomware, malware, phishing, and data leaks. No longer only for protecting admin...

Federal Regulations on Cybersecurity

Advisory Note

Federal Regulations on Cybersecurity

Federal Regulations on cybersecurity are regularly published at the national level. However, these national regulations also impact federal regulations in other countries. Therefore, looking at...

The Information Protection Life Cycle and Framework: Contain and Recover

Leadership Brief

The Information Protection Life Cycle and Framework: Contain and Recover

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...

Security Orchestration, Automation and Response (SOAR)

Buyer's Compass

Security Orchestration, Automation and Response (SOAR)

Security Orchestration, Automation & Response (SOAR) refers to comprehensive solutions with capabilities that support a range of security tools and data sources. This KuppingerCole Buyer’s Compass...

Related Content

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00