Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Trends in Privileged Access Management for the Digital Enterprise
Advisory Note
Trends in Privileged Access Management for the Digital Enterprise
Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to...
KRIs and KPI for Cyber Security
Advisory Note
KRIs and KPI for Cyber Security
This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks...
Optimizing your Cybersecurity Spending
Leadership Brief
Optimizing your Cybersecurity Spending
Prioritizing cybersecurity portfolio expenditures can be a very complex process. At best, the investments should be as low as needed but high enough to be prepared for future attacks and data...
Orca Cloud Security Platform
Executive View
Orca Cloud Security Platform
Unzureichend verwaltete Sicherheitskontrollen innerhalb der Ressourcen eines Mandanten von Cloud-Diensten sind zunehmend die Ursache von Sicherheitsvorfällen und Compliance-verletzungen. Die...
ReliaQuest GreyMatter
Executive View
ReliaQuest GreyMatter
Dieser Executive View Report von KuppingerCole befasst sich mit den Herausforderungen im Bereich der Cybersicherheit und den Optionen, die den Sicherheitsverantwortlichen für Managed Security...
Orca Cloud Security Platform
Executive View
Orca Cloud Security Platform
Poorly managed security controls within a cloud services tenant's resources are increasingly the cause of security incidents and compliance failures. Today's dynamic infrastructure and development...
Invisily Zero Trust Network Access
Executive View
Invisily Zero Trust Network Access
Invisily is a Zero Trust Network Access platform that supports a broad range of deployment scenarios without the technical debt of existing competing solutions. It offers several unique...
Semperis Directory Services Protector for Active Directory
Executive View
Semperis Directory Services Protector for Active Directory
Active Directory provides critical identify infrastructure for the enterprise. Semperis offers Active Directory change monitoring and forest recovery products. The Semperis DS-Protector product...
StealthDEFEND®
Executive View
StealthDEFEND®
Cyber-attacks often involve a complex process, including an insider threat element, which exploits compromised or illicit user credentials to gain access to data. StealthDEFEND is the real time...
Global IaaS Providers Tenant Security Controls
Market Compass
Global IaaS Providers Tenant Security Controls
The KuppingerCole Market Compass reports provide an overview of vendors and their product or service offerings in a certain market segment. This Market Compass focusses on Infrastructure as a...
STEALTHbits® Products Overview
Executive View
STEALTHbits® Products Overview
Securely governing access is increasingly important to ensure compliance as well as to defend against cyber-crime. STEALTHbits’ products provide a comprehensive set of solutions to address IT...
Network Detection & Response (NDR)
Buyer's Compass
Network Detection & Response (NDR)
Network Detection & Response (NDR) is the term for the tools that monitor networks for suspicious activities and threats and provide capabilities for alerting, intercepting, and preventing damage....
Previous
4 5 6 7 8 9 10 Next