Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Search Results

Security Organization, Governance, and the Cloud

Advisory Note

Security Organization, Governance, and the Cloud

The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost. This document provides an overview of the...

Prepare and Protect against Software Vulnerabilities

Leadership Brief

Prepare and Protect against Software Vulnerabilities

All software contains vulnerabilities that can be exploited by adversaries to attack the IT systems and data that organizations depend upon. It is essential that organizations have a vulnerability...

Exostar Supplier Risk Management

Executive View

Exostar Supplier Risk Management

Exostar Supplier Risk Management delivers advanced capabilities for identifying and managing risk and compliance with cybersecurity and other best practices and standards, along the entire supply...

Federal Regulations on Cybersecurity

Advisory Note

Federal Regulations on Cybersecurity

Federal Regulations on cybersecurity are regularly published at the national level. However, these national regulations also impact federal regulations in other countries. Therefore, looking at...

Demystifying the Blockchain: What Makes a Blockchain Useful to a Firm?

Advisory Note

Demystifying the Blockchain: What Makes a Blockchain Useful to a Firm?

Blockchain technology – as the hype advertises – can be a value-adding solution for businesses and individuals. However, it is necessary to separate blockchain’s functionality from its fame before...

Protect Your Cloud Against Hacks and Industrial Espionage

Advisory Note

Protect Your Cloud Against Hacks and Industrial Espionage

Hacks against on-premises and cloud infrastructure happen every day. Corporate espionage is not just the stuff of spy novels. Unethical corporate competitors and even government intelligence...

How to Assure Cloud Services

Advisory Note

How to Assure Cloud Services

This report is one of a series of documents around the use of cloud services. It identifies how standards as well as, independent certifications and attestations can be used to assure the security...

R&S®Trusted Gate by Rohde & Schwarz Cybersecurity

Executive View

R&S®Trusted Gate by Rohde & Schwarz Cybersecurity

Transparent, data-centric security for untrusted infrastructures. Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (e.g. Microsoft Office...

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (SharePoint, Office 365) through virtualization, encryption and fragmentation of data while...

Cybersecurity for Industrial Control Systems

Market Compass

Cybersecurity for Industrial Control Systems

Focus on Operation Technology (OT) is increasing for two reasons: firstly, governments worldwide have, or are threatening to, intervene in cases of compromise of OT infrastructure and secondly,...

Related Content

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00