Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Cloud-Native Application Protection Platforms
Buyer's Compass
Cloud-Native Application Protection Platforms
Cloud IaaS is used extensively to develop, deliver new applications, and reengineer existing ones. This is often because cloud services provide an environment for accelerated development without...
Cloud-Native Application Protection Platforms (CNAPP)
Leadership Compass
Cloud-Native Application Protection Platforms (CNAPP)
This report provides an overview of the Cloud-Native Application Protection Platforms (CNAPP) market and a compass to help you find a solution that best meets your needs. It examines solutions that...
Attack Surface Management
Leadership Compass
Attack Surface Management
This report provides an overview of the Attack Surface Management market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment,...
Identity Fabrics
Leadership Compass
Identity Fabrics
This report provides an overview of the market of providers of technology for building Identity Fabrics, which are comprehensive IAM solutions built on a modern, modular architecture. It provides a...
Data Governance
Leadership Compass
Data Governance
This KuppingerCole Leadership Compass on Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and...
Cyber Risks from China: How Contract Negotiations Can Mitigate IT Risks
Advisory Note
Cyber Risks from China: How Contract Negotiations Can Mitigate IT Risks
China is an important economic partner for most enterprises, but doing business in and with China introduces its own set of risks. This report provides an overview of the major cyber related risks...
Cloud Infrastructure Entitlement Management (CIEM)
Leadership Compass
Cloud Infrastructure Entitlement Management (CIEM)
This Leadership Compass provides an overview and insights into the Cloud Infrastructure Entitlement Management (CIEM) market, with the aim of helping your organization find the right products and...
Prepare and Protect against Software Vulnerabilities
Leadership Brief
Prepare and Protect against Software Vulnerabilities
All software contains vulnerabilities that can be exploited by adversaries to attack the IT systems and data that organizations depend upon. It is essential that organizations have a vulnerability...
CYFIRMA DeCYFIR
Executive View
CYFIRMA DeCYFIR
Reactive security measures respond to cyberattacks that have already happened. While cybersecurity spending is increasing, cyberattacks are also becoming more frequent. To mitigate risks and...
CIEM & Dynamic Resource Entitlement & Access Management (DREAM) platforms
Leadership Compass
CIEM & Dynamic Resource Entitlement & Access Management (DREAM) platforms
This report provides an overview of the market for platforms that support CIEM and DREAM environments and provides you with a compass to help find the solution(s) that best meets your needs. We...
Federal Regulations on Cybersecurity
Advisory Note
Federal Regulations on Cybersecurity
Federal Regulations on cybersecurity are regularly published at the national level. However, these national regulations also impact federal regulations in other countries. Therefore, looking at...
EU NIS2 Directive
Leadership Brief
EU NIS2 Directive
Every organization needs to take steps to ensure their cyber resilience and this updated directive provides a useful framework for this. This report provides a summary of the technical obligations...
Previous
1 2 3 4 5 6 7 Next