Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Maturity Level Matrix for IAM
Advisory Note
Maturity Level Matrix for IAM
KuppingerCole Maturity Level Matrices for the major market segments within IAM (Identity, and Access Management), IGA (Identity Governance and Administration) and CIAM (Consumer Identity and Access...
Enterprise Authentication Solutions
Leadership Compass
Enterprise Authentication Solutions
This report provides an overview of the Enterprise Authentication Solutions market and provides you with a compass to help you to find the solution that best meets your needs. We examine the...
Keyless Biometric Authentication
Executive View
Keyless Biometric Authentication
Keyless specializes in advanced authentication technologies to help customers increase authentication assurance and decrease risks of data leakage. Keyless delivers passwordless authentication...
Access Management
Leadership Compass
Access Management
This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your compass for finding...
CIAM Platforms
Leadership Compass
CIAM Platforms
This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product...
Indeed Certificate Manager
Executive View
Indeed Certificate Manager
Indeed Certificate Manager is a platform for centralized management of enterprise public key infrastructures. Its modular, hardware-agnostic architecture and innovative remote management...
IndyKite Knowledge-Based Access Control (KBAC)
Executive View
IndyKite Knowledge-Based Access Control (KBAC)
Given the growing ecosystem of digital identities that extend beyond humans to bots, devices, and machines in a modern world, there is also a corresponding need to manage the increasing complexity...
Policy Based Access Management
Leadership Compass
Policy Based Access Management
Efficient, effective management of access controls from infrastructure to applications remains an aspiration for enterprises. The main drivers of this goal include the need for strengthening the...
Zero Trust Network Access
Leadership Compass
Zero Trust Network Access
Zero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats. Unlike traditional...
A Passwordless Future Begins with Credential Management
Whitepaper
A Passwordless Future Begins with Credential Management
Although it enables a Zero Trust security approach, the journey to passwordless is often challenging and may require an organization to use multiple authentication methods to meet their varied use...
Access Governance
Leadership Compass
Access Governance
The Access Governance (AG) market is continuing to evolve through more intelligent solutions. This Leadership Compass will give an overview and insights into the IGA market, providing you a compass...
Demystifying the Blockchain: What Makes a Blockchain Useful to a Firm?
Advisory Note
Demystifying the Blockchain: What Makes a Blockchain Useful to a Firm?
Blockchain technology – as the hype advertises – can be a value-adding solution for businesses and individuals. However, it is necessary to separate blockchain’s functionality from its fame before...