Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Search Results

Security Operations in the Age of Zero Trust

Whitepaper

Security Operations in the Age of Zero Trust

How must security operations transform to effectively deliver the comprehensive and integrated value of zero trust implementations? Security operations for Zero Trust must take a comprehensive...

RadiantOne: Identity Integration for Zero-Trust and Digital Transformation

Whitepaper

RadiantOne: Identity Integration for Zero-Trust and Digital Transformation

Transition to a fully distributed and agile digital enterprise is increasingly seen as a matter of organizational survival. The COVID-19 pandemic overwhelmed any lingering doubt about its urgency....

Cisco Zero Trust Security

Executive View

Cisco Zero Trust Security

Cisco’s approach towards Zero Trust combines several foundational access policy solutions for securing your workforce, workloads and workspace with a broad range of additional security products to...

Akamai Zero Trust Security

Executive View

Akamai Zero Trust Security

Akamai’s Intelligent Edge Platform offers a broad range of access management, threat protection, and application security services that will support you in your journey to Zero Trust, making it...

Implementing SASE

Advisory Note

Implementing SASE

Secure Access Service Edge (SASE) architectures promise to prevent multiple types of cyber-attacks, but deciding whether SASE is right for your organization will require understanding whether SASE...

PortSys Total Access Control

Executive View

PortSys Total Access Control

Zero Trust Architecture requires proper authentication and authorization for each access request in the digital domain. Access management tools must serve ever more complex environments ranging...

Maturity Level Matrix for IAM

Advisory Note

Maturity Level Matrix for IAM

KuppingerCole Maturity Level Matrices for the major market segments within IAM (Identity, and Access Management), IGA (Identity Governance and Administration) and CIAM (Consumer Identity and Access...

Software Supply Chain Security: Don’t Get Your Code Tampered

Whitepaper

Software Supply Chain Security: Don’t Get Your Code Tampered

Recent events such as the SolarWinds and Kaseya incidents have demonstrated the need to focus significantly more on software supply chain security. Thus, avoiding code tampering by external...

Orca Cloud Security Platform

Executive View

Orca Cloud Security Platform

Poorly managed security controls within a cloud services tenant's resources are increasingly the cause of security incidents and compliance failures. Today's dynamic infrastructure and development...

A World with Validated Identities

Whitepaper

A World with Validated Identities

Digital identity is a core element of business, more essential than ever before as the workforce becomes increasingly more mobile. The key to enable more efficient work is to remove barriers to...

Related Content

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00