Research

Advisory Note

KuppingerCole’s Advisory Notes are short reports that present information about a specific topic, company, or product. Advisory Notes are published on a regular basis and are aimed at the management of a company. An Advisory Note gives usage recommendations and helps decision makers solve specific problems.
Implementing SASE
Advisory Note
Implementing SASE
Secure Access Service Edge (SASE) architectures promise to prevent multiple types of cyber-attacks, but deciding whether SASE is right for your organization will require understanding whether SASE...
Federal Regulations on Cybersecurity
Advisory Note
Federal Regulations on Cybersecurity
Federal Regulations on cybersecurity are regularly published at the national level. However, these national regulations also impact federal regulations in other countries. Therefore, looking at...
Trends in Privileged Access Management for the Digital Enterprise
Advisory Note
Trends in Privileged Access Management for the Digital Enterprise
Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to...
Business Continuity in the age of Cyber Attacks
Advisory Note
Business Continuity in the age of Cyber Attacks
Business continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organizations to alter their approach....
The Role of APIs for Business
Advisory Note
The Role of APIs for Business
An Application Programming Interface (API) is an intermediary that allows two applications to talk to each other. Without APIs, the digital experiences consumers have grown accustomed to, such as...
Aligning Access Governance and Privilege Management
Advisory Note
Aligning Access Governance and Privilege Management
Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established governance silos...
Firewalls Are Dead - How to Build a Resilient, Defendable Network
Advisory Note
Firewalls Are Dead - How to Build a Resilient, Defendable Network
The firewall is dead – long live the firewall.... In today’s modern business the traditional firewall model, sitting at the corporate perimeter, has little value, and more often than not hinders...
Identity and Access Management
Advisory Note
Identity and Access Management
IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. The challenges for...
Plant Automation Security
Advisory Note
Plant Automation Security
Industrial Computer Systems (ICS) are increasingly coming under attack as hackers are realizing the economic and reputational benefit of a successful operations technology system compromise....
Hybrid Cloud Security
Advisory Note
Hybrid Cloud Security
Organizations now commonly use multiple cloud services as well as on-premises IT. This KuppingerCole Architecture Blueprint provides a set of building blocks needed to design, implement and...
Understanding and Countering Ransomware
Advisory Note
Understanding and Countering Ransomware
Ransomware is a top security threat and continuously on the rise. Financial organizations, healthcare institutions, and manufacturing industries are the most vulnerable groups; however, individual...
Blockchain and Risk
Advisory Note
Blockchain and Risk
A blockchain is a data structure, originally used by bitcoin, that maintains a growing list of transaction records in a way that is extremely resistant to tampering. This technology is seen by many...