Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Search Results

Identity Governance. The Value of Leveraging IGA Functions from the Cloud

Whitepaper

Identity Governance. The Value of Leveraging IGA Functions from the Cloud

With IT functions gradually shifting to the cloud, it is time to rethink the way supporting infrastructure and platform services such as IGA (Identity Governance and Administration) are...

Identity Fabrics - Connecting Anyone to Every Service

Leadership Brief

Identity Fabrics - Connecting Anyone to Every Service

Digital technologies are now influencing and changing all areas within organizations. This is fundamentally reshaping the way communication takes place, how people work together and how value is...

Hybrid Cloud Security

Advisory Note

Hybrid Cloud Security

Organizations now commonly use multiple cloud services as well as on-premises IT. This KuppingerCole Architecture Blueprint provides a set of building blocks needed to design, implement and...

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (SharePoint, Office 365) through virtualization, encryption and fragmentation of data while...

BeyondTrust Password Safe

Executive View

BeyondTrust Password Safe

BeyondTrust’s portfolio of products provides a well-integrated Privileged Access Management (PAM) suite with a range of capabilities for detection and mitigation of security threats caused by abuse...

Oracle Autonomous Database

Executive View

Oracle Autonomous Database

Oracle Autonomous Database is the world’s first fully automated cloud database platform powered by machine learning. By eliminating human factor from database management, it provides unprecedented...

Safe-T Software Defined Access

Executive View

Safe-T Software Defined Access

Safe-T Software Defined Access delivers a software-based solution that provides data protection by controlling both access and usage of corporate data, services, and applications, protection is...

Integrating security into an agile DevOps paradigm

Advisory Note

Integrating security into an agile DevOps paradigm

Developing secure and robust applications and deploying them continuously and cost effectively? All organizations, digital or those undergoing a digital transformation, are facing these challenges...

Blockchains and Cybersecurity:  Augmenting Trust with Algorithms

Advisory Note

Blockchains and Cybersecurity: Augmenting Trust with Algorithms

From trusted third parties to algorithmic consensus: new cybersecurity opportunities and challenges with blockchains. Blockchains can provide distributed and decentralised improvements to the...

Cisco Advanced Malware Protection

Executive View

Cisco Advanced Malware Protection

Cisco Advanced Malware Protection (AMP) is an integrated enterprise security intelligence and malware protection solution. By combining global threat intelligence with dynamic malware analysis and...

Related Content

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00