Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive Authentication and Fine-Grained Authorization
Whitepaper
How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive Authentication and Fine-Grained Authorization
Every organization, regardless of size or industry, needs an agile and modern Identity and Access Management (IAM) platform. As the cybersecurity threat landscape continues to evolve, so do the...
HID Global Authentication Platform
Executive View
HID Global Authentication Platform
In recent years, investment into cybersecurity has soared but, in most cases, these efforts have not fully addressed the reliance on passwords and the challenges they introduce. Without secure...
Passwordless Authentication
Leadership Compass
Passwordless Authentication
This report provides an overview of the market for Passwordless Authentication products and services and presents you with a compass to help you to find the Passwordless Authentication product or...
Customer authentication with zero-friction passwordless authentication
Whitepaper
Customer authentication with zero-friction passwordless authentication
To increase security and convenience, businesses and organizations need to adopt and implement a modern authentication system that does not rely on customers remembering usernames and passwords....
Simplifying and Strengthening Authentication with Passwordless Desktop MFA
Whitepaper
Simplifying and Strengthening Authentication with Passwordless Desktop MFA
If a password is like a house key, the security foundation of an organization's IT systems should have a securely locked front door. Make the front door as secure as possible, and you may as well...
HYPR Passwordless and Phishing-resistant Authentication
Executive View
HYPR Passwordless and Phishing-resistant Authentication
Passwordless authentication is becoming the new normal, bypassing the need for users to maintain passwords, and thus bypassing the inherent security challenges of passwords. In the broad range of...
Keyless Biometric Authentication
Executive View
Keyless Biometric Authentication
Keyless specializes in advanced authentication technologies to help customers increase authentication assurance and decrease risks of data leakage. Keyless delivers passwordless authentication...
Identity Authentication Standards
Advisory Note
Identity Authentication Standards
Authentication is a core component of Identity and Access Management (IAM) Solutions and central to the security and management of modern organizations. For many years, the industry has been...
Enterprise Authentication Solutions
Leadership Compass
Enterprise Authentication Solutions
This report provides an overview of the Enterprise Authentication Solutions market and provides you with a compass to help you to find the solution that best meets your needs. We examine the...
HID Global Authentication Platform
Executive View
HID Global Authentication Platform
HID Global offers robust and highly secure solutions for identity and access management, including physical access controls, smart identity card manufacturing and credential issuance, biometric...
Callsign Intelligence Driven Authentication
Executive View
Callsign Intelligence Driven Authentication
Callsign is a provider of an identity platform that integrates consumer onboarding, authentication, and fraud management in a well-thought-out manner. In contrast to other solutions, all...
HYPR Passwordless and Phishing-resistant Authentication
Executive View
HYPR Passwordless and Phishing-resistant Authentication
Die passwortlose Authentifizierung wird zum neuen Standard. Benutzer müssen keine lästigen Passwörter mehr verwenden und die mit Passwörtern verbundenen Sicherheitsrisiken werden umgangen....
1 2 3 4 5 6 7 Next