Research

Advisory Note

KuppingerCole’s Advisory Notes are short reports that present information about a specific topic, company, or product. Advisory Notes are published on a regular basis and are aimed at the management of a company. An Advisory Note gives usage recommendations and helps decision makers solve specific problems.
Maturity Level Matrix for GDPR Readiness
Advisory Note
Maturity Level Matrix for GDPR Readiness
KuppingerCole Maturity Level Matrix for the degree of readiness for implementing EU GDPR (General Data Protection Regulation) requirements. Foundation for assessing the current status and...
KRIs and KPI for Access Governance
Advisory Note
KRIs and KPI for Access Governance
This report provides selected Key Risk Indicators (KRI) for the area of Access Governance. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks...
Understanding and Countering Ransomware
Advisory Note
Understanding and Countering Ransomware
Ransomware is a top security threat and continuously on the rise. Financial organizations, healthcare institutions, and manufacturing industries are the most vulnerable groups; however, individual...
Identity in IoT
Advisory Note
Identity in IoT
The Internet of Things (IoT) is a computing concept that describes a future where everyday physical objects are connected to the Internet and communicate with other devices and human users. Adding...
Unifying RBAC and ABAC in a Dynamic Authorization Framework
Advisory Note
Unifying RBAC and ABAC in a Dynamic Authorization Framework
Mastering authorization is critical for modern organizations with multiple user constituencies, applications, and data types. Groups are necessary but not sufficient in complex environments. Roles...
Firewalls Are Dead - How to Build a Resilient, Defendable Network
Advisory Note
Firewalls Are Dead - How to Build a Resilient, Defendable Network
The firewall is dead – long live the firewall.... In today’s modern business the traditional firewall model, sitting at the corporate perimeter, has little value, and more often than not hinders...
Mobile Biometrics for Authentication and Authorization
Advisory Note
Mobile Biometrics for Authentication and Authorization
Many new biometric technologies and products have emerged in the last few years. Biometrics have improved considerably, and are now increasingly integrated into smartphones. Mobile biometric...
Plant Automation Security
Advisory Note
Plant Automation Security
Industrial Computer Systems (ICS) are increasingly coming under attack as hackers are realizing the economic and reputational benefit of a successful operations technology system compromise....
Enterprise role management done right
Advisory Note
Enterprise role management done right
Role-based access control (RBAC) has become an important part of Access Management and Access Governance. However, defining, implementing and maintaining an enterprise role model remains a...
Sustainable Infrastructures through IT Compliance
Advisory Note
Sustainable Infrastructures through IT Compliance
Well-designed, state-of-the-art compliance programs help in maintaining an adequate IT architecture and its underlying processes. Forward-thinking organisations understand compliance as a strategic...