Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
Software Supply Chain Security: Don’t Get Your Code Tampered
Whitepaper
Software Supply Chain Security: Don’t Get Your Code Tampered
Recent events such as the SolarWinds and Kaseya incidents have demonstrated the need to focus significantly more on software supply chain security. Thus, avoiding code tampering by external...
Secure Software Supply Chains
Whitepaper
Secure Software Supply Chains
Major cyber-attacks such as the SolarWinds and Kaseya incidents demonstrate the need to focus significantly more on software supply chain security as well as traditional cyber defense areas....
Container Security
Leadership Compass
Container Security
This report is an overview of the market for Container Security solutions and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment,...
Security Operations Center as a Service (SOCaaS) for the UAE
Market Compass
Security Operations Center as a Service (SOCaaS) for the UAE
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the Security Operations Center-as-a-Service...
Zoom Unified Communications Platform Security and Compliance
Whitepaper
Zoom Unified Communications Platform Security and Compliance
Zoom offers a cloud-based unified communications platform (UCaaS) featuring video communications. UCaaS delivers many benefits including flexibility, performance, and price. Organizations should...
Identity & Security: Addressing the Modern Threat Landscape
Whitepaper
Identity & Security: Addressing the Modern Threat Landscape
Identity and Access Management (IAM) and Cybersecurity have for too long been separate disciplines with distinct solutions that have not interoperated optimally. This has put defenders at a...
Security Orchestration Automation and Response (SOAR)
Leadership Compass
Security Orchestration Automation and Response (SOAR)
This report provides an overview of the SOAR market and a compass to help you find a solution that best meets your needs. We examine the SOAR market segment, product/service functionality, relative...
Assuring Cloud Security and Compliance
Whitepaper
Assuring Cloud Security and Compliance
Digital transformation is changing the way that they do business through the use of cloud services and cloud-based applications. The Coronavirus epidemic has accelerated this process. The use of...
PAM for Managed Service Providers as an Added Value and Security Option
Whitepaper
PAM for Managed Service Providers as an Added Value and Security Option
Privileged Access Management (PAM) is an essential component in protecting organizations against cyber-attacks, ransomware, malware, phishing, and data leaks. No longer a tool for protecting admin...
KRIs and KPI for Cyber Security
Advisory Note
KRIs and KPI for Cyber Security
This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks...
1 2 3 4 5 6 7 Next