Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Search Results

Software Supply Chain Security: Don’t Get Your Code Tampered

Whitepaper

Software Supply Chain Security: Don’t Get Your Code Tampered

Recent events such as the SolarWinds and Kaseya incidents have demonstrated the need to focus significantly more on software supply chain security. Thus, avoiding code tampering by external...

Cloud-delivered Security

Market Compass

Cloud-delivered Security

The KuppingerCole Market Compass provides an overview of the broad market of cybersecurity solutions delivered from the cloud, focusing primarily on Zero Trust and Secure Access Service Edge (SASE)...

Cloud Services and Security

Advisory Note

Cloud Services and Security

This report provides a review of the major security risks from the use of cloud services, how responsibility for security is divided between Cloud Service Provider and customer and the key controls...

Safeguarding Your Most Valuable Data: Five Key Criteria to Assess Cloud Provider Security

Whitepaper

Safeguarding Your Most Valuable Data: Five Key Criteria to Assess Cloud Provider Security

This whitepaper focuses on defining the key security-focused selection criteria to help your company choose a secure platform for current and future cloud projects.

Rising to the Security Challenge of Heavy Cloud Adoption

Advisory Note

Rising to the Security Challenge of Heavy Cloud Adoption

Many enterprises have decided on a “cloud first” strategy, or have seen heavy cloud adoption evolve spontaneously as their business units embrace cloud for cost savings, agility or other...

Veracode Application Security Platform

Executive View

Veracode Application Security Platform

Veracode Application Security Platform is a cloud-based application security testing platform providing unified insights into software security risks at every stage of the development lifecycle.

Big Data Security, Governance, Stewardship

Advisory Note

Big Data Security, Governance, Stewardship

An ever-increasing number of devices, sensors and people are connected to the global internet and generate data. The analysis of this data can help organizations to improve their effectiveness and...

NextLabs Data Centric Security in the Hybrid Cloud

Executive View

NextLabs Data Centric Security in the Hybrid Cloud

Organizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with external parties....

Security Operations in the Age of Zero Trust

Whitepaper

Security Operations in the Age of Zero Trust

How must security operations transform to effectively deliver the comprehensive and integrated value of zero trust implementations? Security operations for Zero Trust must take a comprehensive...

Assuring Cloud Security and Compliance

Whitepaper

Assuring Cloud Security and Compliance

Digital transformation is changing the way that they do business through the use of cloud services and cloud-based applications. The Coronavirus epidemic has accelerated this process. The use of...

Related Content

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00