Research

Leadership Brief

KuppingerCole’s Leadership Brief provides condensed research and advice for executives and decision makers in organizations. These two-page documents cover business challenges and advise on how to address them, focusing on the key issues and allowing decision makers to quickly identify the right solutions.
Cloud Provider Codes of Conduct and GDPR
Leadership Brief
Cloud Provider Codes of Conduct and GDPR
Codes of Conduct can help organizations choose between suppliers. This report compares two recently announced codes for cloud service providers and how these relate to GDPR.
5 Steps to Consumer Identity and Access Management
Leadership Brief
5 Steps to Consumer Identity and Access Management
Enterprises deploying Consumer Identity and Access Management (CIAM) solutions are realizing the benefits, which range from increased brand loyalty and sales to enhanced regulatory compliance.
Mobile Connect
Leadership Brief
Mobile Connect
Strong authentication via smartphones is available today in many countries. GSMA’s Mobile Connect specification can improve security and help banks and third party providers comply with the EU’s...
How to close the skill gap in your Cyber Defense Center
Leadership Brief
How to close the skill gap in your Cyber Defense Center
Getting sufficient and sufficiently skilled people for your Cyber Defense Center (or your IT Security department) is tough. The answer to the skill gaps consists of three elements: Education....
Defending against ransomware
Leadership Brief
Defending against ransomware
Ransomware is an epidemic. Prevention is the best strategy. Don’t give up and pay the ransom.
Transforming IAM – not Panicking
Leadership Brief
Transforming IAM – not Panicking
Many organizations are responding to incidents and audit failures by panicking and buying more point solutions. They need to take a more strategic approach to transform their IAM.
Cloud SSO is not sufficient: What else do you need?
Leadership Brief
Cloud SSO is not sufficient: What else do you need?
Cloud-based identity services have come a long way in the past several years, make sure you’re keeping up with what’s available and what you need.
The 5 Biggest IAM Myths
Leadership Brief
The 5 Biggest IAM Myths
Identity and Access Management (IAM) have been with us long enough to develop a strong history, but also a strong mythos, that is, a set of beliefs or assumptions which might or might not be...
Information Rights Management – Ready for Prime Time?
Leadership Brief
Information Rights Management – Ready for Prime Time?
Information Rights Management (IRM) is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source - the single file....
Prioritäten in der SAP-Sicherheit
Leadership Brief
Prioritäten in der SAP-Sicherheit
Die Sicherheit aller wichtigen geschäftsunterstützenden Systeme und Prozesse wird durch den Wandel der Unternehmensinfrastrukturen und den grundlegend steigenden Bedro-hungsgrad beeinflusst....
Join the dots: Operational Technology and Informational Technology
Leadership Brief
Join the dots: Operational Technology and Informational Technology
One area of information technology that is typically ignored by IT departments and consultants is industrial control systems. This is unfortunate because these “operational technology” systems have...
Previous
1 2 3 4 5 6 7 8