Research

Whitepaper

KuppingerCole’s Whitepaper is a report written by one of KC’s analysts that informs readers about a specific, usually complex issue. A whitepaper is meant to help readers understand an issue, solve a problem, or make a decision.
Going Beyond Traditional Penetration Testing
Whitepaper
Going Beyond Traditional Penetration Testing
Penetration testing is an essential methodology used to discover and remediate vulnerabilities and reduce risks from cyber-attacks and cybercrime. Regular penetration testing is recommended and, in...
Cloud Access Governance
Whitepaper
Cloud Access Governance
Across the globe there has been a significant increase in the adoption of cloud and multi-cloud environments, as businesses scramble to take advantage of digital transformation. With more clouds...
Automating the SOC
Whitepaper
Automating the SOC
SOAR, Security Orchestration, Automation and Response, is the latest in a line of security buzzwords to hit the market; and while SOAR may have only emerged in the last few years, it is fast...
Secure Software Supply Chains
Whitepaper
Secure Software Supply Chains
Major cyber-attacks such as the SolarWinds and Kaseya incidents demonstrate the need to focus significantly more on software supply chain security as well as traditional cyber defense areas....
Accelerating Your Digital Business with Customer Identity
Whitepaper
Accelerating Your Digital Business with Customer Identity
The role of Consumer Identity and Access Management (CIAM) is still massively undervalued by many organizations. Both drop-off and churn rates are heavily impacted by cumbersome registration and...
How to Build the Modern CIAM: For Customers, Consumers, and Citizens
Whitepaper
How to Build the Modern CIAM: For Customers, Consumers, and Citizens
In the digital age, the “C identities” of customers, consumers, citizens, and all the other types of external identities, such as tourists, are at the forefront of every digital business and...
A New Era for Digital Identity in Germany
Whitepaper
A New Era for Digital Identity in Germany
The journey towards digital identity in Germany has been fraught with optimism, failure, and continued persistence. It is currently at a crossroads – consumer and private sector behavior indicate a...
Considerations for Reducing the Risk of Ransomware
Whitepaper
Considerations for Reducing the Risk of Ransomware
In this paper, we will expand our view of ransomware and demonstrate how treating it as an isolated security challenge is not a sustainable approach. We will show why prevention is the best...
Understanding and Managing Privileged Access to Databases and Other Data Resources
Whitepaper
Understanding and Managing Privileged Access to Databases and Other Data Resources
This Whitepaper analyses the issues surrounding access management, privacy, security and compliance when identities access compute and storage resources, with a special focus on database...
Modernizing Legacy IAM Systems
Whitepaper
Modernizing Legacy IAM Systems
Legacy IAM systems can no longer meet the requirements of Digital Transformation. They often have a negative impact on business efficiency and customer experience. Such systems are too costly to...
1 2 3 4 5 6 7 Next