Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Identity and Access Management
Advisory Note
Identity and Access Management
IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. The challenges for...
Oracle Identity Cloud Service
Executive View
Oracle Identity Cloud Service
Most organizations now have a hybrid IT environment with a cloud first approach to choosing new applications. While this provides many benefits it also creates challenges around security and...
BeyondTrust Password Safe
Executive View
BeyondTrust Password Safe
BeyondTrust’s portfolio of products provides a well-integrated Privileged Access Management (PAM) suite with a range of capabilities for detection and mitigation of security threats caused by abuse...
IAM for Healthcare: It’s time to act
Whitepaper
IAM for Healthcare: It’s time to act
Healthcare organizations deal with highly sensitive information. They face challenges in complying with ever-tightening regulations, combating ever-increasing cyber risks, and adapting to Digital...
R&S®Trusted Gate von Rohde & Schwarz Cybersecurity
Executive View
R&S®Trusted Gate von Rohde & Schwarz Cybersecurity
Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (SharePoint, Office 365) through virtualization, encryption and fragmentation of data while...
The Dark Side of the API Economy
Whitepaper
The Dark Side of the API Economy
Application Programming Interfaces (API) have become a crucial factor in delivering operational efficiency, scalability, and profitability for most businesses. Nowadays, everything is API-enabled:...
Identity Governance. The Value of Leveraging IGA Functions from the Cloud
Whitepaper
Identity Governance. The Value of Leveraging IGA Functions from the Cloud
With IT functions gradually shifting to the cloud, it is time to rethink the way supporting infrastructure and platform services such as IGA (Identity Governance and Administration) are...
Safe-T Software Defined Access
Executive View
Safe-T Software Defined Access
Safe-T Software Defined Access delivers a software-based solution that provides data protection by controlling both access and usage of corporate data, services, and applications, protection is...
Hybrid Cloud Security
Advisory Note
Hybrid Cloud Security
Organizations now commonly use multiple cloud services as well as on-premises IT. This KuppingerCole Architecture Blueprint provides a set of building blocks needed to design, implement and...
Oracle Autonomous Database
Executive View
Oracle Autonomous Database
Oracle Autonomous Database is the world’s first fully automated cloud database platform powered by machine learning. By eliminating human factor from database management, it provides unprecedented...
Cisco Advanced Malware Protection
Executive View
Cisco Advanced Malware Protection
Cisco Advanced Malware Protection (AMP) is an integrated enterprise security intelligence and malware protection solution. By combining global threat intelligence with dynamic malware analysis and...
Blockchains and Cybersecurity:  Augmenting Trust with Algorithms
Advisory Note
Blockchains and Cybersecurity: Augmenting Trust with Algorithms
From trusted third parties to algorithmic consensus: new cybersecurity opportunities and challenges with blockchains. Blockchains can provide distributed and decentralised improvements to the...
Previous
4 5 6 7 8 9 10 Next