Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Search Results

Privacy and Consent Management

Buyer's Compass

Privacy and Consent Management

Privacy and Consent Management solutions deliver the administrative and governance capabilities for data privacy within the organization. This document breaks down the most important capabilities...

Enterprise Information Protection

Leadership Brief

Enterprise Information Protection

The perimeter of the corporation has transformed into a much more fluid and permeable boundary than it once was. Sensitive information is now routinely accessed with personal and business devices...

The Information Protection Life Cycle and Framework: Contain and Recover

Leadership Brief

The Information Protection Life Cycle and Framework: Contain and Recover

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...

The Information Protection Life Cycle and Framework: Monitor and Detect

Leadership Brief

The Information Protection Life Cycle and Framework: Monitor and Detect

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...

The Information Protection Life Cycle and Framework: Control Access

Leadership Brief

The Information Protection Life Cycle and Framework: Control Access

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...

Endpoint Protection

Buyer's Compass

Endpoint Protection

Malware remains a global cybersecurity threat. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful...

Future of Identity Management

Advisory Note

Future of Identity Management

Digital identities are at the core of Digital Transformation, Information Security and Privacy, and therefore it has never been more important for enterprises to ensure they have the capability to...

R&S®Trusted Gate - Secure Glocalization von  Rohde & Schwarz Cybersecurity

Executive View

R&S®Trusted Gate - Secure Glocalization von Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity ermöglicht eine zuverlässige Verarbeitung regulierter und sensibler Informationen für die Zusammenarbeit und zum Dateiaustausch in gemeinsamen SharePoint-Plattformen...

The Information Protection Life Cycle and Framework: Deceive

Leadership Brief

The Information Protection Life Cycle and Framework: Deceive

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...

Meeting GDPR Challenges with Delphix

Whitepaper

Meeting GDPR Challenges with Delphix

GDPR introduces stringent controls over the processing of PII relating to people resident in the EU with high penalties for non-compliance. Compliance requires costly controls that can be...

Related Content

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00