Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Microsoft Azure Blockchain Services
Executive View
Microsoft Azure Blockchain Services
Azure’s Blockchain-as-a-Service (BaaS) operates both as Infrastructure-as-a-Service and a Platform-as-a-Service. With its large number of strategic partnerships and template library of...
HYPR Passwordless and Phishing-resistant Authentication
Executive View
HYPR Passwordless and Phishing-resistant Authentication
Passwordless authentication is becoming the new normal, bypassing the need for users to maintain passwords, and thus bypassing the inherent security challenges of passwords. In the broad range of...
Delegated Administration as a Solution for B2B Use Cases
Whitepaper
Delegated Administration as a Solution for B2B Use Cases
In an emerging digital world, cross-company collaboration is part of day-to-day business. Partner networks are growing at a dramatic pace, making antiquated approaches to managing partner...
Simplifying and Strengthening Authentication with Passwordless Desktop MFA
Whitepaper
Simplifying and Strengthening Authentication with Passwordless Desktop MFA
If a password is like a house key, the security foundation of an organization's IT systems should have a securely locked front door. Make the front door as secure as possible, and you may as well...
Keeper Enterprise
Executive View
Keeper Enterprise
Password Management remains a key requirement for users and organizations, with passwords still being ubiquitous, and thus imposing a major security risk to organizations. Modern Enterprise...
Policy Based Access Management
Market Compass
Policy Based Access Management
Access control is recognized as the most important component of an organization's cybersecurity protection. For too long access control has been based on static entitlements, but this is changing....
Universal SSH Key Manager
Executive View
Universal SSH Key Manager
Universal SSH Key Manager from SSH Communications Security Corporation is an enterprise-grade solution for centralized automated management of SSH keys across multiple platforms and network devices.
Implementing SASE
Advisory Note
Implementing SASE
Secure Access Service Edge (SASE) architectures promise to prevent multiple types of cyber-attacks, but deciding whether SASE is right for your organization will require understanding whether SASE...
Blockchains and Cybersecurity:  Augmenting Trust with Algorithms
Advisory Note
Blockchains and Cybersecurity: Augmenting Trust with Algorithms
From trusted third parties to algorithmic consensus: new cybersecurity opportunities and challenges with blockchains. Blockchains can provide distributed and decentralised improvements to the...
PAM for Managed Service Providers as an Added Value and Security Option
Whitepaper
PAM for Managed Service Providers as an Added Value and Security Option
Privileged Access Management (PAM) is an essential component in protecting organizations against cyber-attacks, ransomware, malware, phishing, and data leaks. No longer a tool for protecting admin...
1Kosmos BlockID
Executive View
1Kosmos BlockID
1Kosmos BlockID is one of the first commercial implementations of a blockchain-based identity solution that works for both consumers and employees. It is well-thought-out and implements the...
Cloud-delivered Security
Market Compass
Cloud-delivered Security
The KuppingerCole Market Compass provides an overview of the broad market of cybersecurity solutions delivered from the cloud, focusing primarily on Zero Trust and Secure Access Service Edge (SASE)...