Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Beyond Identity Secure Customers
Executive View
Beyond Identity Secure Customers
Password authentication is not only insecure, but it leads to poor consumer experiences and is costly for organizations to maintain. As far as customer authentication is concerned, there are three...
2022 IAM Reference Architecture
Advisory Note
2022 IAM Reference Architecture
IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. The challenges for...
Cloud Access Governance
Whitepaper
Cloud Access Governance
Across the globe there has been a significant increase in the adoption of cloud and multi-cloud environments, as businesses scramble to take advantage of digital transformation. With more clouds...
Secure Collaboration
Market Compass
Secure Collaboration
This KuppingerCole Market Compass provides an overview of the products or service offerings in a certain market segment. This Market Compass covers Secure Collaboration solutions, focusing on...
PingOne Authorize
Executive View
PingOne Authorize
Due to its value and sensitivity, customer identity and data must be protected with strong access management systems. Key use cases include managing usage of customer data and its availability both...
Identity Fabrics
Leadership Compass
Identity Fabrics
This report provides an overview of the market for Identity Fabrics, which are comprehensive IAM solutions built on a modern, modular architecture. It provides you with a compass to help you to...
The Future is Passwordless. If you do it right.
Whitepaper
The Future is Passwordless. If you do it right.
Passwordless authentication has become a popular topic. Given the security risks and inconvenience of using passwords, many organizations are looking to completely eliminate and replace passwords...
How to Do Identity Right When Developing Digital Services
Whitepaper
How to Do Identity Right When Developing Digital Services
In the digital age, digital experience heavily impacts the success of businesses. A main element of digital experience is the registration, authentication and authorization flow. Instead of...
The Role of Identity for Zero Trust
Whitepaper
The Role of Identity for Zero Trust
Identity is central to Zero Trust. Zero Trust as the established leading principle for cybersecurity is about continuous verification instead of trust into a one-time proof by a singular system....
Cybersecurity for Industrial Control Systems
Market Compass
Cybersecurity for Industrial Control Systems
Focus on Operation Technology (OT) is increasing for two reasons: firstly, governments worldwide have, or are threatening to, intervene in cases of compromise of OT infrastructure and secondly,...
NRI SecureTechnologies Uni-ID Libra 2.6
Executive View
NRI SecureTechnologies Uni-ID Libra 2.6
Consumer Identity and Access Management (CIAM) continues to be a growing market, offering a better user experience for the consumer and new challenges for the organization. Focusing on the Japanese...
Cloud Security Posture Management
Leadership Compass
Cloud Security Posture Management
This report provides an overview of the CSPM (Cloud Security Posture Management) market and a compass to help you find a solution that best meets your needs. It examines solutions that provide a...
Previous
5 6 7 8 9 10 11 Next