Research

Advisory Note

KuppingerCole’s Advisory Notes are short reports that present information about a specific topic, company, or product. Advisory Notes are published on a regular basis and are aimed at the management of a company. An Advisory Note gives usage recommendations and helps decision makers solve specific problems.
How Enterprises Will Learn to Love Decentralized IDs: The Roles of Distributed and Sovereign Identities in Our Private Metaverse
Advisory Note
How Enterprises Will Learn to Love Decentralized IDs: The Roles of Distributed and Sovereign Identities in Our Private Metaverse
Recently, Meta CEO Mark Zuckerberg demonstrated in captivating detail a working beta version of photorealistic—or rather, video realistic—avatars in the metaverse. Zuckerberg also claims that this...
Architecting Your SOC to Defend Against Today's Attack Vectors
Advisory Note
Architecting Your SOC to Defend Against Today's Attack Vectors
Organizations must prioritize architecting a modern Security Operations Center (SOC) as it is becoming more critical for strengthening their cybersecurity defenses against sophisticated cyber...
EU Digital Operational Resilience Act (DORA)
Advisory Note
EU Digital Operational Resilience Act (DORA)
Operational resilience is essential for every organization embracing digital transformation to ensure that all business IT systems are able to resist and recover from any type of disruption,...
Cyber Risks from China: How Contract Negotiations Can Mitigate IT Risks
Advisory Note
Cyber Risks from China: How Contract Negotiations Can Mitigate IT Risks
China is an important economic partner for most enterprises, but doing business in and with China introduces its own set of risks. This report provides an overview of the major cyber related risks...
Cybersecurity Resilience with Generative AI
Advisory Note
Cybersecurity Resilience with Generative AI
Cyberattacks have intensified in recent years. The evolving threat landscape is exemplified by the persistent threat of cyberattacks, driven by cybercriminals' exploration of new tools and...
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Advisory Note
Vulnerability Management (How Do I Do It Right, Where Do I Start)
Vulnerability Management (VM) is a security practice that focuses on the process by which organizations identify, analyze, manage, and prevent the exploitation of IT vulnerabilities. If implemented...
2022 IAM Reference Architecture
Advisory Note
2022 IAM Reference Architecture
IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. The challenges for...
Maturity Level Matrix for IAM
Advisory Note
Maturity Level Matrix for IAM
KuppingerCole Maturity Level Matrices for the major market segments within IAM (Identity, and Access Management), IGA (Identity Governance and Administration) and CIAM (Consumer Identity and Access...
Implementing SASE
Advisory Note
Implementing SASE
Secure Access Service Edge (SASE) architectures promise to prevent multiple types of cyber-attacks, but deciding whether SASE is right for your organization will require understanding whether SASE...
Federal Regulations on Cybersecurity
Advisory Note
Federal Regulations on Cybersecurity
Federal Regulations on cybersecurity are regularly published at the national level. However, these national regulations also impact federal regulations in other countries. Therefore, looking at...
1 2 3 4 5 6 Next