Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Cybersecurity for Industrial Control Systems
Market Compass
Cybersecurity for Industrial Control Systems
Focus on Operation Technology (OT) is increasing for two reasons: firstly, governments worldwide have, or are threatening to, intervene in cases of compromise of OT infrastructure and secondly,...
Claroty – Visibility into Vulnerability
Whitepaper
Claroty – Visibility into Vulnerability
Organizations are facing a brave new world in which governments are taking a proactive role in constraining cybersecurity risks. Companies with operational infrastructure that is deemed ‘critical’...
Emerging Technologies Fostering Digital Business Innovation: Healthcare
Advisory Note
Emerging Technologies Fostering Digital Business Innovation: Healthcare
The healthcare landscape has experienced unprecedented pressure and change, and there is a greater need than ever for the industry to make its full digital transformation. Technologies like...
Customer Data Platforms
Leadership Compass
Customer Data Platforms
This report provides an overview of the market for customer data platforms (CDPs). Such solutions help businesses to build customer profiles and customer segments based on input from various data...
Integrated Risk Management Platforms
Market Compass
Integrated Risk Management Platforms
The KuppingerCole Market Compass Integrated Risk Management (IRM) focuses on platforms designed to manage risk within an organization including IT assets, business, vendor, and compliance-based risk.
Exostar Supplier Risk Management
Executive View
Exostar Supplier Risk Management
Exostar Supplier Risk Management delivers advanced capabilities for identifying and managing risk and compliance with cybersecurity and other best practices and standards, along the entire supply...
Modernizing Legacy IAM Systems
Whitepaper
Modernizing Legacy IAM Systems
Legacy IAM systems can no longer meet the requirements of Digital Transformation. They often have a negative impact on business efficiency and customer experience. Such systems are too costly to...
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Advisory Note
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Vulnerability Management (VM) is a security practice that focuses on the process by which organizations identify, analyze, manage, and prevent the exploitation of IT vulnerabilities. If implemented...
Delegated Administration as a Solution for B2B Use Cases
Whitepaper
Delegated Administration as a Solution for B2B Use Cases
In an emerging digital world, cross-company collaboration is part of day-to-day business. Partner networks are growing at a dramatic pace, making antiquated approaches to managing partner...
Fraud Reduction Intelligence Platforms
Leadership Compass
Fraud Reduction Intelligence Platforms
This report provides an overview of the market for Fraud Reduction Intelligence Platforms and provides you with a compass to help you to find the solution that best meets your needs. We examine the...
Previous
2 3 4 5 6 7 8 Next