Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
PingOne Authorize
Executive View
PingOne Authorize
Due to its value and sensitivity, customer identity and data must be protected with strong access management systems. Key use cases include managing usage of customer data and its availability both...
Cyber Hygiene: The Foundation for Cyber Resilience
Leadership Brief
Cyber Hygiene: The Foundation for Cyber Resilience
Most cyber incidents result from poor cyber hygiene. To avoid these, organizations must make sure that all the routine tasks needed to keep their systems, data, and applications safe are performed...
Simplifying and Strengthening Authentication with Passwordless Desktop MFA
Whitepaper
Simplifying and Strengthening Authentication with Passwordless Desktop MFA
If a password is like a house key, the security foundation of an organization's IT systems should have a securely locked front door. Make the front door as secure as possible, and you may as well...
Managing RDP Security Risks to Block Ransomware Attacks
Leadership Brief
Managing RDP Security Risks to Block Ransomware Attacks
Remote working is becoming widespread for social and economic reasons, and one of the key enablers is the Remote Desktop Protocol (RDP). However, RDP is one of the most popular initial cyber-attack...
Access Management 2022
Leadership Compass
Access Management 2022
This Leadership Compass provides up to date insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your compass...
IGA auf Basis von IDaaS: Jetzt ein besseres IAM, für jede Art von Unternehmen
Whitepaper
IGA auf Basis von IDaaS: Jetzt ein besseres IAM, für jede Art von Unternehmen
In den letzten Jahren ist IDaaS (Identity as a Service) zunehmend zu einer neuen Normalität geworden. Es bietet einen standardisierten, schnell umsetzbaren Ansatz für IAM (Identity and Access...
IDaaS-based IGA: The Better IAM Now, for Every Type of Business
Whitepaper
IDaaS-based IGA: The Better IAM Now, for Every Type of Business
In the past years, IDaaS (Identity as a Service) has increasingly become the new normal. It provides a standardized, rapid-to-deploy approach on IAM (Identity and Access Management). It enables...
Keeper Enterprise
Executive View
Keeper Enterprise
Die Verwaltung von Passwörtern ist und bleibt eine wichtige Anforderung für Benutzer und Unternehmen, da Passwörter immer noch allgegenwärtig sind und damit weiterhin ein großes Sicherheitsrisiko...
Implementing SASE
Advisory Note
Implementing SASE
Secure Access Service Edge (SASE) architectures promise to prevent multiple types of cyber-attacks, but deciding whether SASE is right for your organization will require understanding whether SASE...
Secure Collaboration
Market Compass
Secure Collaboration
This KuppingerCole Market Compass provides an overview of the products or service offerings in a certain market segment. This Market Compass covers Secure Collaboration solutions, focusing on...
Previous
1 2 3 4 5 6 7 Next