Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Secure Software Supply Chains
Whitepaper
Secure Software Supply Chains
Major cyber-attacks such as the SolarWinds and Kaseya incidents demonstrate the need to focus significantly more on software supply chain security as well as traditional cyber defense areas....
A New Era for Digital Identity in Germany
Whitepaper
A New Era for Digital Identity in Germany
The journey towards digital identity in Germany has been fraught with optimism, failure, and continued persistence. It is currently at a crossroads – consumer and private sector behavior indicate a...
CIEM & Dynamic Resource Entitlement & Access Management (DREAM) platforms
Leadership Compass
CIEM & Dynamic Resource Entitlement & Access Management (DREAM) platforms
This report provides an overview of the market for platforms that support CIEM and DREAM environments and provides you with a compass to help find the solution(s) that best meets your needs. We...
Beyond Identity Secure DevOps
Executive View
Beyond Identity Secure DevOps
Organizations that fail to secure access to resources are at risk of suffering from cyberattacks, data loss or compliance failure. As the market grows and business demands become more acute,...
NETAND HIWARE Privileged Session Management (PSM)
Executive View
NETAND HIWARE Privileged Session Management (PSM)
As organizations modernize IT and adopt multi-cloud infrastructures to support evolving business processes involving thousands of users and workloads, it’s difficult to know who has access to what...
Understanding and Managing Privileged Access to Databases and Other Data Resources
Whitepaper
Understanding and Managing Privileged Access to Databases and Other Data Resources
This Whitepaper analyses the issues surrounding access management, privacy, security and compliance when identities access compute and storage resources, with a special focus on database...
Zero Trust Network Access
Leadership Compass
Zero Trust Network Access
This report is an overview of the market for Zero Trust Network Access (ZTNA) solutions and provides you with a compass to help you to find the solution that best meets your needs. We examine the...
A Passwordless Future Begins with Credential Management
Whitepaper
A Passwordless Future Begins with Credential Management
Although it enables a Zero Trust security approach, the journey to passwordless is often challenging and may require an organization to use multiple authentication methods to meet their varied use...
Access Management 2022
Leadership Compass
Access Management 2022
This Leadership Compass provides up to date insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your compass...
Identity & Security: Addressing the Modern Threat Landscape
Whitepaper
Identity & Security: Addressing the Modern Threat Landscape
Identity and Access Management (IAM) and Cybersecurity have for too long been separate disciplines with distinct solutions that have not interoperated optimally. This has put defenders at a...
Cymmetri Identity Platform
Executive View
Cymmetri Identity Platform
Cymmetri is a converged cloud-based IAM solution that facilitates verification, authentication, and authorization for employees, partners, contractors, and customers. The modern platform also makes...
ExeonTrace NDR
Executive View
ExeonTrace NDR
Network monitoring is a foundational element of security architecture. Sophisticated attackers may deliberately delete logs on servers and endpoints to cover up their tracks. This means that the...
Previous
4 5 6 7 8 9 10 Next