Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Exploring the Microsoft Azure Information Protection Landscape
Executive View
Exploring the Microsoft Azure Information Protection Landscape
Microsoft Azure Information Protection creates a viable user experience for data classification and labeling of Office documents and emails. It enables sensitive data discovery; integrates data...
Symantec Advanced Threat Protection
Executive View
Symantec Advanced Threat Protection
Symantec Advanced Threat Protection is a unified platform for uncovering and remediating advanced cyber-attacks across endpoints, network and email, which augments existing Symantec endpoint...
Big Data Security, Governance, Stewardship
Advisory Note
Big Data Security, Governance, Stewardship
An ever-increasing number of devices, sensors and people are connected to the global internet and generate data. The analysis of this data can help organizations to improve their effectiveness and...
MinerEye Data Tracker
Executive View
MinerEye Data Tracker
MinerEye DataTracker is an AI-based application that identifies, classifies, and tracks unstructured information. It creates cluster of similar content across data sources and analyzes information...
Delphix Dynamic Data Platform
Executive View
Delphix Dynamic Data Platform
Delphix Dynamic Data Platform is an integrated platform for managing, securing and replicating data across on-premises, cloud and hybrid environments. Combining high-performance virtualization,...
Axiomatics Data Security
Executive View
Axiomatics Data Security
Axiomatics provides a number of solutions for dynamic policy-driven data masking and access filtering for relational databases and Big Data stores. This suite applies an Attribute Based Access...
NextLabs Data Centric Security in the Hybrid Cloud
Executive View
NextLabs Data Centric Security in the Hybrid Cloud
Organizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with external parties....
Vaultive Cloud Data Security Platform
Executive View
Vaultive Cloud Data Security Platform
The data held in office productivity suites like Office 365 spans the whole operation of an organization from the board to the shop floor. This makes it imperative that it is protected against...
SAP Customer Data Cloud
Executive View
SAP Customer Data Cloud
SAP Customer Data Cloud provides a complete solution for Consumer Identity and Access Management. Entirely cloud-based, SAP Customer Data Cloud delivers advanced customer identity, consent,...
Wertvolle Daten kennen, schützen und besser nutzen – die Chancen von Datenschutz und Datensicherheit
Whitepaper
Wertvolle Daten kennen, schützen und besser nutzen – die Chancen von Datenschutz und Datensicherheit
Neue Regulierungen wie die Datenschutz-Grundverordnung (DSGVO) und die stetig wachsende Gefahr durch Cyber-Attacken führen zu einem hohen Druck auf Unternehmen. Es gibt aber auch Chancen, wenn man...
Data Classification – Boldon James Solution
Executive View
Data Classification – Boldon James Solution
Data classification is a requirement of every security framework. More importantly it should be a key part of any organization’s control framework, by clearly informing the person (or system)...
Cequence Security Unified API Protection
Executive View
Cequence Security Unified API Protection
Cequence Security’s Unified API Protection (UAP) brings together discovery, compliance, and protection across all internal and external APIs to defend against fraud, business logic attacks,...
Previous
1 2 3 4 5 6 7 Next