Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Search Results

Orca Cloud Security Platform

Executive View

Orca Cloud Security Platform

Poorly managed security controls within a cloud services tenant's resources are increasingly the cause of security incidents and compliance failures. Today's dynamic infrastructure and development...

Grundlagen des Privileged Access Managements

Whitepaper

Grundlagen des Privileged Access Managements

Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Datensicherheit für jedes Unternehmen. Privilegierte Konten werden traditionell an...

Understanding Privileged Access Management

Whitepaper

Understanding Privileged Access Management

Privileged Access Management (PAM) is one of the most important areas of risk management and data security in any organization. Privileged accounts have traditionally been given to administrators...

The Differences Between Endpoint Protection (EPP) and Endpoint Detection & Response (EDR)

Leadership Brief

The Differences Between Endpoint Protection (EPP) and Endpoint Detection & Response (EDR)

Endpoint Detection & Response products are capturing a lot of mindshare in cybersecurity. But how do they differ from the more standard Endpoint Protection products? We’ll look at key features of...

Getting Ahead of the Cybercriminals: Understanding the External Threat Landscape

Whitepaper

Getting Ahead of the Cybercriminals: Understanding the External Threat Landscape

Security leaders face an uphill task as cybercriminals become increasingly creative and armed with an arsenal of seemingly unlimited resources. Rapid digitalization to re-capture post-pandemic...

Cloud Access Security Brokers

Market Compass

Cloud Access Security Brokers

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers CASB (Cloud Access Security Broker) solutions that...

Business Continuity in the age of Cyber Attacks

Advisory Note

Business Continuity in the age of Cyber Attacks

Business continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organizations to alter their approach....

Cyber Risk – Choosing the Right Framework

Advisory Note

Cyber Risk – Choosing the Right Framework

As organizations undergo Digital Transformation the business impact of cyber risks increases. It is essential that organizations manage these risks. There are several frameworks that...

Trends in Privileged Access Management for the Digital Enterprise

Advisory Note

Trends in Privileged Access Management for the Digital Enterprise

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to...

KRIs and KPI for Cyber Security

Advisory Note

KRIs and KPI for Cyber Security

This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks...

Related Content

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00