Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Fraud Reduction Intelligence Platforms
Leadership Compass
Fraud Reduction Intelligence Platforms
This report provides an overview of the market for Fraud Reduction Intelligence Platforms and provides you with a compass to help you to find the solution that best meets your needs. We examine the...
Modernizing Legacy IAM Systems
Whitepaper
Modernizing Legacy IAM Systems
Legacy IAM systems can no longer meet the requirements of Digital Transformation. They often have a negative impact on business efficiency and customer experience. Such systems are too costly to...
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Advisory Note
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Vulnerability Management (VM) is a security practice that focuses on the process by which organizations identify, analyze, manage, and prevent the exploitation of IT vulnerabilities. If implemented...
Modern B2B Identity Management
Whitepaper
Modern B2B Identity Management
With Business-to-Business (B2B) transformation comes digital initiatives to better connect B2B customer systems and supply chain services, and in doing so, Identity and Access Management (IAM)...
The Role of Identity for Zero Trust
Whitepaper
The Role of Identity for Zero Trust
Identity is central to Zero Trust. Zero Trust as the established leading principle for cybersecurity is about continuous verification instead of trust into a one-time proof by a singular system....
Cyber Hygiene: The Foundation for Cyber Resilience
Leadership Brief
Cyber Hygiene: The Foundation for Cyber Resilience
Most cyber incidents result from poor cyber hygiene. To avoid these, organizations must make sure that all the routine tasks needed to keep their systems, data, and applications safe are performed...
OneWelcome Customer Identity and B2B identity
Executive View
OneWelcome Customer Identity and B2B identity
OneWelcome is the combined brand after the merger of iWelcome and Onegini, two leading Identity as a Service providers that are based in the Netherlands. OneWelcome offers a full-featured IDaaS for...
Archer Integrated Risk Management
Executive View
Archer Integrated Risk Management
Today’s GRC solutions offer better alignment with corporate objectives, increased transparency, superior information risk management and more cost-effective compliance. This paper looks at the...
R&S®Trusted Application Factory by Rohde & Schwarz Cybersecurity
Executive View
R&S®Trusted Application Factory by Rohde & Schwarz Cybersecurity
Application security is of increasing concern to organizations, particularly following the series of software supply chain attacks in recent years. With the shift to microservices architectures and...
The Future of IAM Lies in the Cloud and as a Service
Whitepaper
The Future of IAM Lies in the Cloud and as a Service
IAM software and tools have traditionally been installed and run on-premises by the organization itself. In recent years, the growth in identities operating across cloud and digital services has...
Previous
3 4 5 6 7 8 9 Next