Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Search Results

Optimizing your Cybersecurity Spending

Leadership Brief

Optimizing your Cybersecurity Spending

Prioritizing cybersecurity portfolio expenditures can be a very complex process. At best, the investments should be as low as needed but high enough to be prepared for future attacks and data...

Endpoint Detection & Response (EDR)

Buyer's Compass

Endpoint Detection & Response (EDR)

Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help detect and...

HYPR Passwordless and Phishing-resistant Authentication

Executive View

HYPR Passwordless and Phishing-resistant Authentication

Die passwortlose Authentifizierung wird zum neuen Standard. Benutzer müssen keine lästigen Passwörter mehr verwenden und die mit Passwörtern verbundenen Sicherheitsrisiken werden umgangen....

Global IaaS Providers Tenant Security Controls

Market Compass

Global IaaS Providers Tenant Security Controls

The KuppingerCole Market Compass reports provide an overview of vendors and their product or service offerings in a certain market segment. This Market Compass focusses on Infrastructure as a...

Data Privacy Laws in the UAE

Leadership Brief

Data Privacy Laws in the UAE

The United Arab Emirates has passed its first federal data privacy law, in force as of January 2, 2022. Aligning well with global privacy regulation best practice, the Personal Data Protection Law...

Network Detection & Response (NDR)

Buyer's Compass

Network Detection & Response (NDR)

Network Detection & Response (NDR) is the term for the tools that monitor networks for suspicious activities and threats and provide capabilities for alerting, intercepting, and preventing damage....

Microsoft Cloud App Security

Executive View

Microsoft Cloud App Security

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to...

WALLIX Bastion

Executive View

WALLIX Bastion

WALLIX Bastion is a PAM solution that offers the fundamentals of session management, password management and access management as well as more advanced features such as PEDM and privileged...

Unified Endpoint Management

Buyer's Compass

Unified Endpoint Management

Unified Endpoint Management refers to comprehensive solutions with capabilities that support a range of endpoint types. This KuppingerCole Buyer’s Compass will provide you with questions to ask...

Semperis Directory Services Protector for Active Directory

Executive View

Semperis Directory Services Protector for Active Directory

Active Directory provides critical identify infrastructure for the enterprise. Semperis offers Active Directory change monitoring and forest recovery products. The Semperis DS-Protector product...

Related Content

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00