Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Cloud-delivered Security
Market Compass
Cloud-delivered Security
The KuppingerCole Market Compass provides an overview of the broad market of cybersecurity solutions delivered from the cloud, focusing primarily on Zero Trust and Secure Access Service Edge (SASE)...
Cyber Hygiene: The Foundation for Cyber Resilience
Leadership Brief
Cyber Hygiene: The Foundation for Cyber Resilience
Most cyber incidents result from poor cyber hygiene. To avoid these, organizations must make sure that all the routine tasks needed to keep their systems, data, and applications safe are performed...
Managed Detection and Response (MDR)
Leadership Compass
Managed Detection and Response (MDR)
This KuppingerCole Leadership Compass provides an overview of the market for Managed Detection & Response services that manage a collection of cybersecurity technologies for a client organization...
Secure Software Supply Chains
Whitepaper
Secure Software Supply Chains
Major cyber-attacks such as the SolarWinds and Kaseya incidents demonstrate the need to focus significantly more on software supply chain security as well as traditional cyber defense areas....
Access Management 2022
Leadership Compass
Access Management 2022
This Leadership Compass provides up to date insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your compass...
Success in the Digital Age: Put Identity & Access at the Forefront
Whitepaper
Success in the Digital Age: Put Identity & Access at the Forefront
Success in the Digital Age depends on many factors. Bringing the right digital services to the market on time is the foundation for differentiating in today’s volatile competitive landscape....
IGA auf Basis von IDaaS: Jetzt ein besseres IAM, für jede Art von Unternehmen
Whitepaper
IGA auf Basis von IDaaS: Jetzt ein besseres IAM, für jede Art von Unternehmen
In den letzten Jahren ist IDaaS (Identity as a Service) zunehmend zu einer neuen Normalität geworden. Es bietet einen standardisierten, schnell umsetzbaren Ansatz für IAM (Identity and Access...
IDaaS-based IGA: The Better IAM Now, for Every Type of Business
Whitepaper
IDaaS-based IGA: The Better IAM Now, for Every Type of Business
In the past years, IDaaS (Identity as a Service) has increasingly become the new normal. It provides a standardized, rapid-to-deploy approach on IAM (Identity and Access Management). It enables...
Maturity Level Matrix for IAM
Advisory Note
Maturity Level Matrix for IAM
KuppingerCole Maturity Level Matrices for the major market segments within IAM (Identity, and Access Management), IGA (Identity Governance and Administration) and CIAM (Consumer Identity and Access...
Beyond Identity Secure DevOps
Executive View
Beyond Identity Secure DevOps
Organizations that fail to secure access to resources are at risk of suffering from cyberattacks, data loss or compliance failure. As the market grows and business demands become more acute,...
CYFIRMA DeCYFIR
Executive View
CYFIRMA DeCYFIR
Reactive security measures respond to cyberattacks that have already happened. While cybersecurity spending is increasing, cyberattacks are also becoming more frequent. To mitigate risks and...
CYFIRMA DeCYFIR
Executive View
CYFIRMA DeCYFIR
Reaktive Sicherheitsmaßnahmen wirken auf Cyberangriffe, die bereits stattgefunden haben. Während die Ausgaben für die Cybersicherheit steigen, werden auch Cyberangriffe immer zahlreicher. Um...
Previous
3 4 5 6 7 8 9 Next