Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Unified Endpoint Management (UEM)
Leadership Compass
Unified Endpoint Management (UEM)
This report provides an overview of the market for Unified Endpoint Management (UEM) and provides you with a compass to help you to find the solution that best meets your needs. We examine the...
TrueFort Fortress XDR
Executive View
TrueFort Fortress XDR
TrueFort Fortress XDR is an application detection and response platform offering integrated application behavior analysis and security for real-time visibility into critical business applications,...
Introduction to the Information Protection Life Cycle and Framework
Leadership Brief
Introduction to the Information Protection Life Cycle and Framework
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information...
Beyond Identity Secure Work
Executive View
Beyond Identity Secure Work
Secure Work is a passwordless authentication solution that aims to enable zero trust and enforce device trust (i.e., ensuring the trustworthiness of a device for being authorized to access...
Enterprise Endpoint Security: Anti-Malware Solutions
Leadership Compass
Enterprise Endpoint Security: Anti-Malware Solutions
This report provides an overview of the market for Enterprise Endpoint Security: Anti-Malware Solutions and provides you with a compass to help you to find the Anti-Malware product that best meets...
Architecting your Security Operations Centre
Advisory Note
Architecting your Security Operations Centre
A security operations centre (SOC) is a dedicated team, usually operating 24x365, to detect and respond to cybersecurity incidents within your organisation that potentially affect your people and...
Cleafy Advanced Threat Detection & Protection
Executive View
Cleafy Advanced Threat Detection & Protection
Cleafy is a real-time clientless application risk assessment, threat detection and prevention platform for online services in highly regulated industries. Providing protection against advanced...
Do I need Network Threat Detection & Response (NTDR)?
Leadership Brief
Do I need Network Threat Detection & Response (NTDR)?
NTDR products/services are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? We’ll look at what NTDR products do, reasons to consider...
Oracle Data Safe
Executive View
Oracle Data Safe
Oracle Data Safe is a cloud-based service that improves the security of Oracle databases on-premises and in the cloud by identifying risky configuration, users, and sensitive data, which allows...
Incident Response Management
Leadership Brief
Incident Response Management
The probability of becoming a victim of a data breach is now higher than ever. The hyperconnected world and the ever-increasing complexity of modern IT systems and processes pose new challenges for...
Symantec Advanced Threat Protection
Executive View
Symantec Advanced Threat Protection
Symantec Advanced Threat Protection is a unified platform for uncovering and remediating advanced cyber-attacks across endpoints, network and email, which augments existing Symantec endpoint...
Fraud Reduction Intelligence Platforms
Leadership Compass
Fraud Reduction Intelligence Platforms
This report provides an overview of the market for Fraud Reduction Intelligence Platforms and provides you with a compass to help you to find the solution that best meets your needs. We examine the...