Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Search Results

Modular Decentralized Identity Architecture

Whitepaper

Modular Decentralized Identity Architecture

A trend compelling IGA modernization is the need for an Identity driven security model; due to identity silos created by rapid cloud adoption. As organizations rethink their IAM/IGA systems, they...

Access Management

Leadership Compass

Access Management

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your compass for finding...

Data Governance Platforms

Market Compass

Data Governance Platforms

The KuppingerCole Market Compass Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues...

Privileged Access Management

Leadership Compass

Privileged Access Management

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the...

Safe-T Software Defined Access

Executive View

Safe-T Software Defined Access

Safe-T Software Defined Access delivers a software-based solution that provides data protection by controlling both access and usage of corporate data, services, and applications, protection is...

Future of Identity Management

Advisory Note

Future of Identity Management

Digital identities are at the core of Digital Transformation, Information Security and Privacy, and therefore it has never been more important for enterprises to ensure they have the capability to...

Indeed Privileged Access Manager

Executive View

Indeed Privileged Access Manager

Indeed Identity is an Identity & Access Management (IAM) vendor founded in 2011. In recent years it has expanded into the Privileged Access Management (PAM) market with an entry level platform that...

Protect Your Cloud Against Hacks and Industrial Espionage

Advisory Note

Protect Your Cloud Against Hacks and Industrial Espionage

Hacks against on-premises and cloud infrastructure happen every day. Corporate espionage is not just the stuff of spy novels. Unethical corporate competitors and even government intelligence...

Business Continuity in the age of Cyber Attacks

Advisory Note

Business Continuity in the age of Cyber Attacks

Business continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organizations to alter their approach....

PAM for Managed Service Providers as an Added Value and Security Option

Whitepaper

PAM for Managed Service Providers as an Added Value and Security Option

Privileged Access Management (PAM) is an essential component in protecting organizations against cyber-attacks, ransomware, malware, phishing, and data leaks. No longer a tool for protecting admin...

Related Content

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00