Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Search Results

Guide to Implementing Decentralized ID

Leadership Brief

Guide to Implementing Decentralized ID

Because the Identity Fabric describes a set of connected enabling IT components that work together as a single entity rather than a concrete tool, there are infinite possible implementations of an...

Orca Cloud Security Platform

Executive View

Orca Cloud Security Platform

Poorly managed security controls within a cloud services tenant's resources are increasingly the cause of security incidents and compliance failures. Today's dynamic infrastructure and development...

Verifiable Credentials for Secure Digital Identity

Whitepaper

Verifiable Credentials for Secure Digital Identity

Verified, digital identity is a key foundation to digital transformation. Verifiable Credentials is an up-and-coming method to establish digital, verified identity in a highly secure way....

Identity Governance & Administration 2021

Leadership Compass

Identity Governance & Administration 2021

Der Markt für Identity Governance und Administration (IGA) entwickelt sich durch tiefer integrierte Lösungen für Identity Lifecycle Management und Access Governance stetig weiter, die nun zunehmend...

Identity Governance & Administration 2021

Leadership Compass

Identity Governance & Administration 2021

The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Lifecycle Management and Access Governance solutions that are now increasingly aided...

Software Supply Chain Security: Don’t Get Your Code Tampered

Whitepaper

Software Supply Chain Security: Don’t Get Your Code Tampered

Recent events such as the SolarWinds and Kaseya incidents have demonstrated the need to focus significantly more on software supply chain security. Thus, avoiding code tampering by external...

Policy Based Access Management

Market Compass

Policy Based Access Management

Access control is recognized as the most important component of an organization's cybersecurity protection. For too long access control has been based on static entitlements, but this is changing....

Identity as a Service (IDaaS) - IGA

Leadership Compass

Identity as a Service (IDaaS) - IGA

An emerging market, IDaaS IGA, is characterized mainly by cloud-based delivery of Identity Provisioning and Access Governance capabilities for business irrespective of the application and service...

Cloud Access Security Brokers

Market Compass

Cloud Access Security Brokers

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers CASB (Cloud Access Security Broker) solutions that...

Unified Endpoint Management (UEM) 2021

Leadership Compass

Unified Endpoint Management (UEM) 2021

This report provides an updated overview of the market for Unified Endpoint Management (UEM) and provides you with a compass to help you to find the solution that best meets your needs. We examine...

Related Content

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00