Article No. / Date
Articles
ab72550

Architecture Blueprint

Identity and Access Management

IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. Th...

lc80035

Leadership Compass

Infrastructure as a Service – Global Providers

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment. This Leadership Compass focusses on Infras...

ev80159

Executive View

Curity Identity Server

Curity AB delivers a software-based API-driven identity server for businesses that need help connecting identity infrastructure, digital services, and cloud applications. Their sol...

ev80219

Executive View

AWS Control Tower

Managing access to applications, systems and resources is a key task for any organization and the hybrid IT deployment model has made this even more complex. One area of concern i...

an72563

Advisory Note

How to Assure Cloud Services

This report is one of a series of documents around the use of cloud services. It identifies how standards as well as, independent certifications and attestations can be used to as...

ev80054

Executive View

Akamai Zero Trust Security

Akamai’s Intelligent Edge Platform offers a broad range of access management, threat protection, and application security services that will support you in your journey to Zero Tru...

ev80156

Executive View

Oracle Identity Cloud Service

Most organizations now have a hybrid IT environment with a cloud first approach to choosing new applications. While this provides many benefits it also creates challenges around s...

wp80155

Whitepaper

Oracle Identity Cloud Service: Identity for Business Applica...

Today, most businesses are using hybrid IT, with a mix on-premises and cloud applications and services. And hybrid IT is here to stay, given that many of the legacy applications ar...

an72570

Advisory Note

Protect Your Cloud Against Hacks and Industrial Espionage

Hacks against on-premises and cloud infrastructure happen every day. Corporate espionage is not just the stuff of spy novels. Unethical corporate competitors and even government in...

ev80036de

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Verlässliche Kontrolle und Monitoring sensibler Informationen, die in öffentlichen Clouds und Kollaborationstools (Microsoft SharePoint, Office 365) gespeichert sind, durch Virtual...

ev79034

Executive View

CyberArk Privileged Session Manager for Cloud

Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally...

ev79041

Executive View

Digital Shadows SearchLight™

Digital Risk Protection as a Service. A combination of data loss protection, the securing of brands and reputation online and the reduction of the overall attack surface by identif...

ev80005

Executive View

Amazon GuardDuty

Amazon GuardDuty is a fully managed, simple, and affordable security monitoring and threat detection service that combines machine learning and anomaly detection to enable quick an...

an72552

Architecture Blueprint

Hybrid Cloud Security

Organizations now commonly use multiple cloud services as well as on-premises IT. This KuppingerCole Architecture Blueprint provides a set of building blocks needed to design, imp...

an72555

Advisory Note

Maturity Level Matrix for Cyber Security

KuppingerCole Maturity Level Matrixes for the major market segments within cyber security. These provide the foundation for rating the current state of your cyber security projects...

ev80036

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (SharePoint, Office 365) through virtualization, encryption and fragmentati...

wp80017

Whitepaper

Next-Generation Enterprise Security Delivered from the Cloud...

As businesses embrace the Digital Transformation and become increasingly cloud-native, mobile and interconnected, the corporate network perimeter is gradually disappearing, exposin...

lc70614

Leadership Compass

Cloud Access Security Brokers

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the m...

ev79035

Executive View

Securonix Cloud SIEM and UEBA

Securonix Cloud is a next-generation security intelligence platform that provides comprehensive security information and event management, as well as user and entity behavior analy...

ev72505

Executive View

Zscaler Security-as-a-Service Platform

Zscaler is the world’s largest multi-tenant distributed cloud security platform that delivers a broad range of services without any on-premises hardware or software agents, includi...

ev79037

Executive View

CipherCloud CASB+

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use...

ev79000

Executive View

Cayosoft Administrator v5

Cayosoft Administrator is an integrated platform for management and automation of Active Directory and Office 365 environments, including hybrid deployments. The latest release add...

ev70965

Executive View

Oracle Database Security Assessment

This report provides an executive summary of Oracle’s Database Security capabilities based on recently published KuppingerCole research. It covers both the company’s traditional da...

an72564

Advisory Note

Security Organization, Governance, and the Cloud

The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost. This document provides an overvi...

an72561

Advisory Note

Cloud Services and Security

This report provides a review of the major security risks from the use of cloud services, how responsibility for security is divided between Cloud Service Provider and customer and...

ev70964

Executive View

Oracle Autonomous Database

Oracle Autonomous Database is the world’s first fully automated cloud database platform powered by machine learning. By eliminating human factor from database management, it provid...

ev70615

Executive View

Symantec CloudSOC™

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use...

top