Research

Research Library

As a core element of KuppingerCole’s research, the company offers different types of reports with thought leadership and a vendor-neutral view on the status of the markets, products, and vendors. KuppingerCole’s qualified analysts continuously update this online research library, and perform manufacturer-independent advisory services.
How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive Authentication and Fine-Grained Authorization
Whitepaper
How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive Authentication and Fine-Grained Authorization
Every organization, regardless of size or industry, needs an agile and modern Identity and Access Management (IAM) platform. As the cybersecurity threat landscape continues to evolve, so do the...
Cloud Infrastructure Entitlement Management (CIEM)
Leadership Compass
Cloud Infrastructure Entitlement Management (CIEM)
This Leadership Compass provides an overview and insights into the Cloud Infrastructure Entitlement Management (CIEM) market, with the aim of helping your organization find the right products and...
How Enterprises Will Learn to Love Decentralized IDs: The Roles of Distributed and Sovereign Identities in Our Private Metaverse
Advisory Note
How Enterprises Will Learn to Love Decentralized IDs: The Roles of Distributed and Sovereign Identities in Our Private Metaverse
Recently, Meta CEO Mark Zuckerberg demonstrated in captivating detail a working beta version of photorealistic—or rather, video realistic—avatars in the metaverse. Zuckerberg also claims that this...
ReliaQuest GreyMatter
Executive View
ReliaQuest GreyMatter
Dieser Executive View Report von KuppingerCole befasst sich mit den Herausforderungen im Bereich der Cybersicherheit und den Optionen, die den Sicherheitsverantwortlichen für Managed Security...
API Security & Management
Leadership Compass
API Security & Management
This Leadership Compass provides an overview of the market for API security and management solutions, along with recommendations and guidance for finding the products which address your...
Invisily Zero Trust Network Access
Executive View
Invisily Zero Trust Network Access
Invisily is a Zero Trust Network Access platform that supports a broad range of deployment scenarios without the technical debt of existing competing solutions. It offers several unique...
ForgeRock Workforce Identity Governance
Executive View
ForgeRock Workforce Identity Governance
This KuppingerCole Executive View report looks at the ForgeRock Workforce Identity Governance solution, which combines enterprise identity governance with access management to manage the complete...
cidaas CIAM
Executive View
cidaas CIAM
cidaas offers a complete customer identity and access management solution (CIAM) with many standard and advanced features. The cidaas solution is based on a micro-services architecture which...
ARCON Security Compliance Management
Executive View
ARCON Security Compliance Management
This KuppingerCole Executive View Report looks at some of the options available to IT leaders and security strategists to manage security compliance across their IT estate. A technical review of...
Architecting Your SOC to Defend Against Today's Attack Vectors
Advisory Note
Architecting Your SOC to Defend Against Today's Attack Vectors
Organizations must prioritize architecting a modern Security Operations Center (SOC) as it is becoming more critical for strengthening their cybersecurity defenses against sophisticated cyber...
1 2 3 4 5 6 7 Next