Research

Advisory Note

KuppingerCole’s Advisory Notes are short reports that present information about a specific topic, company, or product. Advisory Notes are published on a regular basis and are aimed at the management of a company. An Advisory Note gives usage recommendations and helps decision makers solve specific problems.
Big Data Security, Governance, Stewardship
Advisory Note
Big Data Security, Governance, Stewardship
An ever-increasing number of devices, sensors and people are connected to the global internet and generate data. The analysis of this data can help organizations to improve their effectiveness and...
Aligning Access Governance and Privilege Management
Advisory Note
Aligning Access Governance and Privilege Management
Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established governance silos...
Security Organization, Governance, and the Cloud
Advisory Note
Security Organization, Governance, and the Cloud
The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost. This document provides an overview of the...
Cloud Services and Security
Advisory Note
Cloud Services and Security
This report provides a review of the major security risks from the use of cloud services, how responsibility for security is divided between Cloud Service Provider and customer and the key controls...
Maturity Level Matrix for GDPR Readiness
Advisory Note
Maturity Level Matrix for GDPR Readiness
KuppingerCole Maturity Level Matrix for the degree of readiness for implementing EU GDPR (General Data Protection Regulation) requirements. Foundation for assessing the current status and...
KRIs and KPI for Access Governance
Advisory Note
KRIs and KPI for Access Governance
This report provides selected Key Risk Indicators (KRI) for the area of Access Governance. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks...
Understanding and Countering Ransomware
Advisory Note
Understanding and Countering Ransomware
Ransomware is a top security threat and continuously on the rise. Financial organizations, healthcare institutions, and manufacturing industries are the most vulnerable groups; however, individual...
Identity in IoT
Advisory Note
Identity in IoT
The Internet of Things (IoT) is a computing concept that describes a future where everyday physical objects are connected to the Internet and communicate with other devices and human users. Adding...
Unifying RBAC and ABAC in a Dynamic Authorization Framework
Advisory Note
Unifying RBAC and ABAC in a Dynamic Authorization Framework
Mastering authorization is critical for modern organizations with multiple user constituencies, applications, and data types. Groups are necessary but not sufficient in complex environments. Roles...
Firewalls Are Dead - How to Build a Resilient, Defendable Network
Advisory Note
Firewalls Are Dead - How to Build a Resilient, Defendable Network
The firewall is dead – long live the firewall.... In today’s modern business the traditional firewall model, sitting at the corporate perimeter, has little value, and more often than not hinders...
Mobile Biometrics for Authentication and Authorization
Advisory Note
Mobile Biometrics for Authentication and Authorization
Many new biometric technologies and products have emerged in the last few years. Biometrics have improved considerably, and are now increasingly integrated into smartphones. Mobile biometric...
Plant Automation Security
Advisory Note
Plant Automation Security
Industrial Computer Systems (ICS) are increasingly coming under attack as hackers are realizing the economic and reputational benefit of a successful operations technology system compromise....