Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Cymmetri Identity Platform
Executive View
Cymmetri Identity Platform
Cymmetri is a converged cloud-based IAM solution that facilitates verification, authentication, and authorization for employees, partners, contractors, and customers. The modern platform also makes...
A New Era for Digital Identity in Germany
Whitepaper
A New Era for Digital Identity in Germany
The journey towards digital identity in Germany has been fraught with optimism, failure, and continued persistence. It is currently at a crossroads – consumer and private sector behavior indicate a...
AWS Elastic Disaster Recovery
Executive View
AWS Elastic Disaster Recovery
Data resilience and disaster recovery solutions are an essential element of business continuity plans and, as organizations go through digital transformation and become more dependent upon their IT...
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Advisory Note
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Vulnerability Management (VM) is a security practice that focuses on the process by which organizations identify, analyze, manage, and prevent the exploitation of IT vulnerabilities. If implemented...
Why Vulnerability Management Is a Strategic Investment
Leadership Brief
Why Vulnerability Management Is a Strategic Investment
Considering that the threat landscape is constantly changing, it is important to maintain a strong cybersecurity foundation. Organizations need security hygiene standards to increase security and...
Considerations for Reducing the Risk of Ransomware
Whitepaper
Considerations for Reducing the Risk of Ransomware
In this paper, we will expand our view of ransomware and demonstrate how treating it as an isolated security challenge is not a sustainable approach. We will show why prevention is the best...
PingOne Authorize
Executive View
PingOne Authorize
Due to its value and sensitivity, customer identity and data must be protected with strong access management systems. Key use cases include managing usage of customer data and its availability both...
Understanding and Managing Privileged Access to Databases and Other Data Resources
Whitepaper
Understanding and Managing Privileged Access to Databases and Other Data Resources
This Whitepaper analyses the issues surrounding access management, privacy, security and compliance when identities access compute and storage resources, with a special focus on database...
Micro Focus ArcSight
Executive View
Micro Focus ArcSight
ArcSight is a modern SIEM solution that provides an advanced security analytics platform for storing, analyzing, and visualizing information from multiple sources and converting it into actionable...
NETAND HIWARE Privileged Session Management (PSM)
Executive View
NETAND HIWARE Privileged Session Management (PSM)
As organizations modernize IT and adopt multi-cloud infrastructures to support evolving business processes involving thousands of users and workloads, it’s difficult to know who has access to what...
Passwordless Authentication
Leadership Compass
Passwordless Authentication
This report provides an overview of the market for Passwordless Authentication products and services and presents you with a compass to help you to find the Passwordless Authentication product or...
Modernizing Legacy IAM Systems
Whitepaper
Modernizing Legacy IAM Systems
Legacy IAM systems can no longer meet the requirements of Digital Transformation. They often have a negative impact on business efficiency and customer experience. Such systems are too costly to...
Previous
6 7 8 9 10 11 12 Next