Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Protect Your Cloud Against Hacks and Industrial Espionage
Advisory Note
Protect Your Cloud Against Hacks and Industrial Espionage
Hacks against on-premises and cloud infrastructure happen every day. Corporate espionage is not just the stuff of spy novels. Unethical corporate competitors and even government intelligence...
Securing Non-Human Identities
Whitepaper
Securing Non-Human Identities
This KuppingerCole Whitepaper looks at issues IT managers and security strategists face trying to manage identity and access in complex multi-cloud IT infrastructures. It focuses on the challenges...
Next-Generation Enterprise Security Delivered from the Cloud: Addressing Modern Cyber Threats with Cisco Umbrella
Whitepaper
Next-Generation Enterprise Security Delivered from the Cloud: Addressing Modern Cyber Threats with Cisco Umbrella
As businesses embrace the Digital Transformation and become increasingly cloud-native, mobile and interconnected, the corporate network perimeter is gradually disappearing, exposing users to...
Die Automatisierung des SOC
Whitepaper
Die Automatisierung des SOC
SOAR, Security Orchestration, Automation and Response, ist das jüngste in einer Reihe von mit Security verbundenen Modewörtern, die sich auf dem Markt verbreiten. Obwohl SOAR erst in den letzten...
Zoom Unified Communications Platform Security and Compliance
Whitepaper
Zoom Unified Communications Platform Security and Compliance
Zoom offers a cloud-based unified communications platform (UCaaS) featuring video communications. UCaaS delivers many benefits including flexibility, performance, and price. Organizations should...
Cloud Access Security Brokers
Leadership Compass
Cloud Access Security Brokers
How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud...
SASE Integration Suites
Leadership Compass
SASE Integration Suites
This report provides an overview of the market for Secure Access Service Edge (SASE) Integration Suites. In this Leadership Compass, we examine the market segment, vendor service functionality,...
Automating the SOC
Whitepaper
Automating the SOC
SOAR, Security Orchestration, Automation and Response, is the latest in a line of security buzzwords to hit the market; and while SOAR may have only emerged in the last few years, it is fast...
StealthINTERCEPT®
Executive View
StealthINTERCEPT®
Cyber criminals regularly exploit vulnerabilities and poor practices around Microsoft Active Directory to obtain credentials that allow them to infiltrate organizational systems, cause damage and...
Deep Secure Content Threat Removal Platform
Executive View
Deep Secure Content Threat Removal Platform
The Content Threat Removal Platform by Deep Secure operates at the network boundary, intercepts and analyzes incoming data, extracts only the useful business information while eliminating malicious...
Privileged Access Management
Leadership Compass
Privileged Access Management
This KuppingerCole Leadership Compass provides an overview of insights on the leaders in innovation, product features, and market reach for Privileged Access Management (PAM). These vendors use a...
Wertvolle Daten kennen, schützen und besser nutzen – die Chancen von Datenschutz und Datensicherheit
Whitepaper
Wertvolle Daten kennen, schützen und besser nutzen – die Chancen von Datenschutz und Datensicherheit
Neue Regulierungen wie die Datenschutz-Grundverordnung (DSGVO) und die stetig wachsende Gefahr durch Cyber-Attacken führen zu einem hohen Druck auf Unternehmen. Es gibt aber auch Chancen, wenn man...
Previous
6 7 8 9 10 11 12 Next