Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Beyond Identity Secure Customers
Executive View
Beyond Identity Secure Customers
Password authentication is not only insecure, but it leads to poor consumer experiences and is costly for organizations to maintain. As far as customer authentication is concerned, there are three...
PortSys Total Access Control
Executive View
PortSys Total Access Control
Zero Trust Architecture requires proper authentication and authorization for each access request in the digital domain. Access management tools must serve ever more complex environments ranging...
Beyond Identity Secure Work
Executive View
Beyond Identity Secure Work
Secure Work is a passwordless authentication solution that aims to enable zero trust and enforce device trust (i.e., ensuring the trustworthiness of a device for being authorized to access...
Securing your IaaS Cloud
Whitepaper
Securing your IaaS Cloud
While the major CSPs (Cloud Service Providers) go to great lengths to secure the services that they provide it is up to the client of the Cloud service provider to secure their use of these...
Nucleon Smart Endpoint
Executive View
Nucleon Smart Endpoint
Nucleon Smart Endpoint is an Endpoint Protection Detection & Response (EPDR) solution for Windows and Linux. It takes a multi-layered Zero Trust approach to preventing malware execution and...
Privileged Access Management
Leadership Compass
Privileged Access Management
Privileged Access Management (PAM) is an essential component in protecting organizations against cyber-attacks, ransomware, malware, phishing, and data leaks. No longer only for protecting admin...
Identity Fabrics
Leadership Compass
Identity Fabrics
This report provides an overview of the market for Identity Fabrics, which are comprehensive IAM solutions built on a modern, modular architecture. It provides you with a compass to help you to...
Assuring Cloud Security and Compliance
Whitepaper
Assuring Cloud Security and Compliance
Digital transformation is changing the way that they do business through the use of cloud services and cloud-based applications. The Coronavirus epidemic has accelerated this process. The use of...
NETAND HIWARE Privileged Session Management (PSM)
Executive View
NETAND HIWARE Privileged Session Management (PSM)
As organizations modernize IT and adopt multi-cloud infrastructures to support evolving business processes involving thousands of users and workloads, it’s difficult to know who has access to what...
Orca Cloud Security Platform
Executive View
Orca Cloud Security Platform
Poorly managed security controls within a cloud services tenant's resources are increasingly the cause of security incidents and compliance failures. Today's dynamic infrastructure and development...
Previous
4 5 6 7 8 9 10 Next