Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
PingOne Authorize
Executive View
PingOne Authorize
Due to its value and sensitivity, customer identity and data must be protected with strong access management systems. Key use cases include managing usage of customer data and its availability both...
Managing RDP Security Risks to Block Ransomware Attacks
Leadership Brief
Managing RDP Security Risks to Block Ransomware Attacks
Remote working is becoming widespread for social and economic reasons, and one of the key enablers is the Remote Desktop Protocol (RDP). However, RDP is one of the most popular initial cyber-attack...
Access Management 2022
Leadership Compass
Access Management 2022
This Leadership Compass provides up to date insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your compass...
HID Global Authentication Platform
Executive View
HID Global Authentication Platform
In recent years, investment into cybersecurity has soared but, in most cases, these efforts have not fully addressed the reliance on passwords and the challenges they introduce. Without secure...
IGA auf Basis von IDaaS: Jetzt ein besseres IAM, für jede Art von Unternehmen
Whitepaper
IGA auf Basis von IDaaS: Jetzt ein besseres IAM, für jede Art von Unternehmen
In den letzten Jahren ist IDaaS (Identity as a Service) zunehmend zu einer neuen Normalität geworden. Es bietet einen standardisierten, schnell umsetzbaren Ansatz für IAM (Identity and Access...
Keeper Enterprise
Executive View
Keeper Enterprise
Die Verwaltung von Passwörtern ist und bleibt eine wichtige Anforderung für Benutzer und Unternehmen, da Passwörter immer noch allgegenwärtig sind und damit weiterhin ein großes Sicherheitsrisiko...
IDaaS-based IGA: The Better IAM Now, for Every Type of Business
Whitepaper
IDaaS-based IGA: The Better IAM Now, for Every Type of Business
In the past years, IDaaS (Identity as a Service) has increasingly become the new normal. It provides a standardized, rapid-to-deploy approach on IAM (Identity and Access Management). It enables...
Keeper Enterprise
Executive View
Keeper Enterprise
Password Management remains a key requirement for users and organizations, with passwords still being ubiquitous, and thus imposing a major security risk to organizations. Modern Enterprise...
Implementing SASE
Advisory Note
Implementing SASE
Secure Access Service Edge (SASE) architectures promise to prevent multiple types of cyber-attacks, but deciding whether SASE is right for your organization will require understanding whether SASE...
Success in the Digital Age: Put Identity & Access at the Forefront
Whitepaper
Success in the Digital Age: Put Identity & Access at the Forefront
Success in the Digital Age depends on many factors. Bringing the right digital services to the market on time is the foundation for differentiating in today’s volatile competitive landscape....
Previous
2 3 4 5 6 7 8 Next