Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Security Orchestration, Automation and Response (SOAR)
Buyer's Compass
Security Orchestration, Automation and Response (SOAR)
Security Orchestration, Automation & Response (SOAR) refers to comprehensive solutions with capabilities that support a range of security tools and data sources. This KuppingerCole Buyer’s Compass...
BehavioSec
Executive View
BehavioSec
BehavioSec is a fraud risk analysis and authentication solution provider whose products leverage advanced behavioral biometrics and Artificial Intelligence / Machine Learning detection technology...
Commvault Complete™ Data Protection
Executive View
Commvault Complete™ Data Protection
Business continuity planning is essential to the digital transformation process. This requires the use of data backup products and disaster recovery services which must support today’s multi-cloud...
Prepare and Protect against Software Vulnerabilities
Leadership Brief
Prepare and Protect against Software Vulnerabilities
All software contains vulnerabilities that can be exploited by adversaries to attack the IT systems and data that organizations depend upon. It is essential that organizations have a vulnerability...
Incident Response Management
Leadership Brief
Incident Response Management
The probability of becoming a victim of a data breach is now higher than ever. The hyperconnected world and the ever-increasing complexity of modern IT systems and processes pose new challenges for...
ExeonTrace NDR
Executive View
ExeonTrace NDR
Network monitoring is a foundational element of security architecture. Sophisticated attackers may deliberately delete logs on servers and endpoints to cover up their tracks. This means that the...
Federal Regulations on Cybersecurity
Advisory Note
Federal Regulations on Cybersecurity
Federal Regulations on cybersecurity are regularly published at the national level. However, these national regulations also impact federal regulations in other countries. Therefore, looking at...
Vectra Cognito
Executive View
Vectra Cognito
Vectra Cognito is a Network Detection and Response (NDR) platform supported by threat research and Artificial Intelligence (AI) in the form machine learning (ML) and Deep Learning for analyzing...
Securing your IaaS Cloud
Whitepaper
Securing your IaaS Cloud
While the major CSPs (Cloud Service Providers) go to great lengths to secure the services that they provide it is up to the client of the Cloud service provider to secure their use of these...
Distributed Deception Platforms (DDPs)
Leadership Compass
Distributed Deception Platforms (DDPs)
This report provides an overview of the market for Distributed Deception Platforms (DDPs) and provides you with a compass to help you to find the solution that best meets your needs. We examine the...
Grundlagen des Privileged Access Managements
Whitepaper
Grundlagen des Privileged Access Managements
Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Datensicherheit für jedes Unternehmen. Privilegierte Konten werden traditionell an...
Understanding Privileged Access Management
Whitepaper
Understanding Privileged Access Management
Privileged Access Management (PAM) is one of the most important areas of risk management and data security in any organization. Privileged accounts have traditionally been given to administrators...
Previous
2 3 4 5 6 7 8 Next