Research Library

Empower Yourself to Make Informed Decisions for Your Future Digital Enterprise


I'm interested in:

Search Results

Zero Trust Network Access

Leadership Compass

Zero Trust Network Access

This report is an overview of the market for Zero Trust Network Access (ZTNA) solutions and provides you with a compass to help you to find the solution that best meets your needs. We examine the...

The Role of Identity for Zero Trust

Whitepaper

The Role of Identity for Zero Trust

Identity is central to Zero Trust. Zero Trust as the established leading principle for cybersecurity is about continuous verification instead of trust into a one-time proof by a singular system....

Security Operations in the Age of Zero Trust

Whitepaper

Security Operations in the Age of Zero Trust

How must security operations transform to effectively deliver the comprehensive and integrated value of zero trust implementations? Security operations for Zero Trust must take a comprehensive...

RadiantOne: Identity Integration for Zero-Trust and Digital Transformation

Whitepaper

RadiantOne: Identity Integration for Zero-Trust and Digital Transformation

Transition to a fully distributed and agile digital enterprise is increasingly seen as a matter of organizational survival. The COVID-19 pandemic overwhelmed any lingering doubt about its urgency....

Cisco Zero Trust Security

Executive View

Cisco Zero Trust Security

Cisco’s approach towards Zero Trust combines several foundational access policy solutions for securing your workforce, workloads and workspace with a broad range of additional security products to...

Akamai Zero Trust Security

Executive View

Akamai Zero Trust Security

Akamai’s Intelligent Edge Platform offers a broad range of access management, threat protection, and application security services that will support you in your journey to Zero Trust, making it...

Customer authentication with zero-friction passwordless authentication

Whitepaper

Customer authentication with zero-friction passwordless authentication

To increase security and convenience, businesses and organizations need to adopt and implement a modern authentication system that does not rely on customers remembering usernames and passwords....

A Passwordless Future Begins with Credential Management

Whitepaper

A Passwordless Future Begins with Credential Management

Although it enables a Zero Trust security approach, the journey to passwordless is often challenging and may require an organization to use multiple authentication methods to meet their varied use...

Implementing SASE

Advisory Note

Implementing SASE

Secure Access Service Edge (SASE) architectures promise to prevent multiple types of cyber-attacks, but deciding whether SASE is right for your organization will require understanding whether SASE...

PortSys Total Access Control

Executive View

PortSys Total Access Control

Zero Trust Architecture requires proper authentication and authorization for each access request in the digital domain. Access management tools must serve ever more complex environments ranging...

Related Content

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00