Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
SentinelOne Singularity Platform
Executive View
SentinelOne Singularity Platform
SentinelOne’s integrated security platform combines prevention, detection, analysis, and mitigation capabilities with the autonomous AI agent to enable deep visibility and consistent endpoint...
ESET Enterprise Inspector
Executive View
ESET Enterprise Inspector
Enterprise Inspector is ESET’s Endpoint Detection & Response (EDR) solution. It currently runs on Windows and MacOS. ESET Enterprise Inspector collects and analyzes information to help security...
Unified Endpoint Management
Buyer's Compass
Unified Endpoint Management
Unified Endpoint Management refers to comprehensive solutions with capabilities that support a range of endpoint types. This KuppingerCole Buyer’s Compass will provide you with questions to ask...
F-Secure Rapid Detection & Response
Executive View
F-Secure Rapid Detection & Response
Rapid Detection & Response is F-Secure’s Endpoint Detection & Response (EDR) solution. It runs on Windows and Mac clients, collecting and analyzing information to help security analysts determine...
Privileged Access Management
Leadership Compass
Privileged Access Management
Privileged Access Management (PAM) is an essential component in protecting organizations against cyber-attacks, ransomware, malware, phishing, and data leaks. No longer only for protecting admin...
Palo Alto Networks XSOAR
Executive View
Palo Alto Networks XSOAR
Security Orchestration, Automation and Response (SOAR) platforms are becoming essential components of security architectures in many organizations around the world. SOAR platforms are designed to...
Vectra Cognito
Executive View
Vectra Cognito
Vectra Cognito is a Network Detection and Response (NDR) platform supported by threat research and Artificial Intelligence (AI) in the form machine learning (ML) and Deep Learning for analyzing...
Implementing SASE
Advisory Note
Implementing SASE
Secure Access Service Edge (SASE) architectures promise to prevent multiple types of cyber-attacks, but deciding whether SASE is right for your organization will require understanding whether SASE...
Protect Your Cloud Against Hacks and Industrial Espionage
Advisory Note
Protect Your Cloud Against Hacks and Industrial Espionage
Hacks against on-premises and cloud infrastructure happen every day. Corporate espionage is not just the stuff of spy novels. Unethical corporate competitors and even government intelligence...
The Information Protection Life Cycle and Framework: Contain and Recover
Leadership Brief
The Information Protection Life Cycle and Framework: Contain and Recover
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...
ManageEngine Log360
Executive View
ManageEngine Log360
Log360 from ManageEngine is a tightly integrated suite of log management and network security analytics tools. Complementing SIEM capabilities with EDR, DLP, and even SOAR functionality, it offers...
Elastic Security
Executive View
Elastic Security
Elastic Security is a security platform built on top of the Elastic Stack. It combines security information and event management, threat hunting, endpoint security, and cloud monitoring to help...