Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
R&S®Trusted Application Factory by Rohde & Schwarz Cybersecurity
Executive View
R&S®Trusted Application Factory by Rohde & Schwarz Cybersecurity
Application security is of increasing concern to organizations, particularly following the series of software supply chain attacks in recent years. With the shift to microservices architectures and...
OneWelcome Customer Identity and B2B identity
Executive View
OneWelcome Customer Identity and B2B identity
OneWelcome is the combined brand after the merger of iWelcome and Onegini, two leading Identity as a Service providers that are based in the Netherlands. OneWelcome offers a full-featured IDaaS for...
ShardSecure Microshard Technology
Executive View
ShardSecure Microshard Technology
Organizations find themselves at the crossroads of data sovereignty and data privacy, resulting from cloud adoption. This has led to compliance with cross-border data protection laws and...
Cloud Access Governance
Whitepaper
Cloud Access Governance
Across the globe there has been a significant increase in the adoption of cloud and multi-cloud environments, as businesses scramble to take advantage of digital transformation. With more clouds...
The Role of Identity for Zero Trust
Whitepaper
The Role of Identity for Zero Trust
Identity is central to Zero Trust. Zero Trust as the established leading principle for cybersecurity is about continuous verification instead of trust into a one-time proof by a singular system....
Cyber Hygiene: The Foundation for Cyber Resilience
Leadership Brief
Cyber Hygiene: The Foundation for Cyber Resilience
Most cyber incidents result from poor cyber hygiene. To avoid these, organizations must make sure that all the routine tasks needed to keep their systems, data, and applications safe are performed...
Access Management 2022
Leadership Compass
Access Management 2022
This Leadership Compass provides up to date insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your compass...
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Advisory Note
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Vulnerability Management (VM) is a security practice that focuses on the process by which organizations identify, analyze, manage, and prevent the exploitation of IT vulnerabilities. If implemented...
Business Continuity in the age of Cyber Attacks
Advisory Note
Business Continuity in the age of Cyber Attacks
Business continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organizations to alter their approach....
The Impact of Blockchains on Business Process Management and Optimisation
Advisory Note
The Impact of Blockchains on Business Process Management and Optimisation
Distributed and decentralised ledger technology with Smart Contracts and the Internet of Things (IoT) can enhance BPM (Business Process Management) and BPO (Business Process Optimisation) processes...
Hype vs. Reality in AI & ML: Where are the Concrete Business Benefits?
Leadership Brief
Hype vs. Reality in AI & ML: Where are the Concrete Business Benefits?
The conversation on artificial intelligence and machine learning is still largely driven by hype. But concrete business benefits exist for narrow AI solutions, and it is time to separate hype from...
ARCON PAM SaaS
Executive View
ARCON PAM SaaS
Privileged Access Management (PAM) must evolve if it is to meet the demands of different types of organizations and IT architecture. A one size fits all approach does not work in a world where...
Previous
5 6 7 8 9 10 11 Next