Research

Leadership Brief

KuppingerCole’s Leadership Brief provides condensed research and advice for executives and decision makers in organizations. These two-page documents cover business challenges and advise on how to address them, focusing on the key issues and allowing decision makers to quickly identify the right solutions.
Defending Against Ransomware
Leadership Brief
Defending Against Ransomware
Ransomware is an epidemic and continues to evolve. More than half of all companies and other organizations have been attacked with one form or ransomware or another. A multi-layered defense is the...
Top Cyber Threats
Leadership Brief
Top Cyber Threats
The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using hybrid scenarios...
How to get a Grip on OT Cybersecurity
Leadership Brief
How to get a Grip on OT Cybersecurity
With the increasing demand for more connectivity, Operational Technology (OT) organizations will need to become more interconnected with IT over time. The convergence of IT and OT is inevitable, so...
5G Impact on Organizations and Security
Leadership Brief
5G Impact on Organizations and Security
5G is the next generation of cellular mobile communications. It will provide the capacity and connectivity required to industrialize IoT, Smart Cities and Smart Manufacturing. This report explains...
How to Get Rid of Passwords - Today
Leadership Brief
How to Get Rid of Passwords - Today
The IT security community has long recognized that passwords are a problem because they are easily cracked or compromised and are ultimately susceptible to human failings. This leadership brief...
Do I Need Endpoint Detection & Response (EDR)?
Leadership Brief
Do I Need Endpoint Detection & Response (EDR)?
EDR products are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? If so, do you have the expertise in-house to properly deploy, operate,...
Access Reviews Done Right
Leadership Brief
Access Reviews Done Right
Access reviews are considered important risk management controls in many organizations. They are intended to ensure that each user, process and system has always only the minimum amount of access...
Artificial Intelligence in Cybersecurity
Leadership Brief
Artificial Intelligence in Cybersecurity
Artificial Intelligence remains the hottest buzzword in almost every segment of the IT industry nowadays, and not without reason. The very idea of teaching a machine to mimic the way humans think...
Information Rights Management – Ready for Prime Time?
Leadership Brief
Information Rights Management – Ready for Prime Time?
Information Rights Management (IRM) is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source - the single file....
A Practical Approach to Enterprise Security Architecture (ESA)
Leadership Brief
A Practical Approach to Enterprise Security Architecture (ESA)
An enterprise security architecture (ESA) is a critical component to an enterprise architecture (EA) that describes how IT services, processes, and technologies should be protected given a...
Why Adaptive Authentication Is A Must
Leadership Brief
Why Adaptive Authentication Is A Must
Adaptive Authentication, or the practice of varying authentication methods based on runtime evaluation of risk factors, is a requirement for accessing applications, resources, devices, networks,...
Defending against ransomware
Leadership Brief
Defending against ransomware
Ransomware is an epidemic. Prevention is the best strategy. Don’t give up and pay the ransom.