Whitepaper
Safeguarding Your Most Valuable Data: Five Key Criteria to A...
This whitepaper focuses on defining the key security-focused selection criteria to help your company choose a secure platform for current and future cloud projects.
Market Compass
Cloud Access Security Brokers
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers CASB (Cloud Access Security Broke...
Executive View
SentinelOne Singularity Platform
Die integrierte Sicherheitsplattform von SentinelOne kombiniert Präventions-, Erkennungs-, Analyse- und Mitigierungsfunktionen mit dem autonomen KI-Agenten und ermöglicht so tiefe...
Whitepaper
Single Sign-On and Managed Access to all Applications from t...
With more and more organizations following a “cloud first” strategy, IT infrastructure and security services also must shift to the cloud, where increasingly more of the critical w...
Executive View
R&S®Trusted Gate von Rohde & Schwarz Cybersecurity
Transparente, datenzentrische Sicherheit in nicht vertrauenswürdigen Infrastrukturen. Zuverlässige Kontrolle und Überwachung von sensiblen Informationen, die in öffentlichen Clouds...
Executive View
R&S®Trusted Gate by Rohde & Schwarz Cybersecurity
Transparent, data-centric security for untrusted infrastructures. Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (e.g. Mic...
Executive View
Google's Cloud Identity
Identity as a Service (IDaaS) is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud based IAM services to support the grow...
Executive View
Saviynt Security Manager for Enterprise IGA
Saviynt offers a comprehensive compliance-as-a-service platform providing Identity Governance and Management, Application Risk and Governance, Cloud Security, and Cloud PAM functio...
Executive View
AWS Security Analytics Solutions
AWS provides a comprehensive suite of services to monitor for threats, misconfigurations and compliance violations across its portfolio, with all security alerts aggregated, organi...
Advisory Note
Future of Identity Management
Digital identities are at the core of Digital Transformation, Information Security and Privacy, and therefore it has never been more important for enterprises to ensure they have t...
Architecture Blueprint
Identity and Access Management
IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. Th...
Leadership Compass
Infrastructure as a Service – Global Providers
The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment. This Leadership Compass focusses on Infras...
Executive View
Curity Identity Server
Curity AB delivers a software-based API-driven identity server for businesses that need help connecting identity infrastructure, digital services, and cloud applications. Their sol...
Executive View
AWS Control Tower
Managing access to applications, systems and resources is a key task for any organization and the hybrid IT deployment model has made this even more complex. One area of concern i...
Advisory Note
How to Assure Cloud Services
This report is one of a series of documents around the use of cloud services. It identifies how standards as well as, independent certifications and attestations can be used to as...
Executive View
Akamai Zero Trust Security
Akamai’s Intelligent Edge Platform offers a broad range of access management, threat protection, and application security services that will support you in your journey to Zero Tru...
Executive View
Oracle Identity Cloud Service
Most organizations now have a hybrid IT environment with a cloud first approach to choosing new applications. While this provides many benefits it also creates challenges around s...
Whitepaper
Oracle Identity Cloud Service: Identity for Business Applica...
Today, most businesses are using hybrid IT, with a mix on-premises and cloud applications and services. And hybrid IT is here to stay, given that many of the legacy applications ar...
Advisory Note
Protect Your Cloud Against Hacks and Industrial Espionage
Hacks against on-premises and cloud infrastructure happen every day. Corporate espionage is not just the stuff of spy novels. Unethical corporate competitors and even government in...
Executive View
R&S®Trusted Gate von Rohde & Schwarz Cybersecurity
Verlässliche Kontrolle und Monitoring sensibler Informationen, die in öffentlichen Clouds und Kollaborationstools (Microsoft SharePoint, Office 365) gespeichert sind, durch Virtual...
Executive View
CyberArk Privileged Session Manager for Cloud
Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally...
Executive View
Digital Shadows SearchLight™
Digital Risk Protection as a Service. A combination of data loss protection, the securing of brands and reputation online and the reduction of the overall attack surface by identif...
Executive View
Amazon GuardDuty
Amazon GuardDuty is a fully managed, simple, and affordable security monitoring and threat detection service that combines machine learning and anomaly detection to enable quick an...
Architecture Blueprint
Hybrid Cloud Security
Organizations now commonly use multiple cloud services as well as on-premises IT. This KuppingerCole Architecture Blueprint provides a set of building blocks needed to design, imp...
Advisory Note
Maturity Level Matrix for Cyber Security
KuppingerCole Maturity Level Matrixes for the major market segments within cyber security. These provide the foundation for rating the current state of your cyber security projects...
Executive View
R&S®Trusted Gate von Rohde & Schwarz Cybersecurity
Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (SharePoint, Office 365) through virtualization, encryption and fragmentati...
Whitepaper
Next-Generation Enterprise Security Delivered from the Cloud...
As businesses embrace the Digital Transformation and become increasingly cloud-native, mobile and interconnected, the corporate network perimeter is gradually disappearing, exposin...
Leadership Compass
Cloud Access Security Brokers
How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the m...
Executive View
Securonix Cloud SIEM and UEBA
Securonix Cloud is a next-generation security intelligence platform that provides comprehensive security information and event management, as well as user and entity behavior analy...
Executive View
Zscaler Security-as-a-Service Platform
Zscaler is the world’s largest multi-tenant distributed cloud security platform that delivers a broad range of services without any on-premises hardware or software agents, includi...
Executive View
CipherCloud CASB+
Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use...
Executive View
Cayosoft Administrator v5
Cayosoft Administrator is an integrated platform for management and automation of Active Directory and Office 365 environments, including hybrid deployments. The latest release add...
Executive View
Oracle Database Security Assessment
This report provides an executive summary of Oracle’s Database Security capabilities based on recently published KuppingerCole research. It covers both the company’s traditional da...
Advisory Note
Security Organization, Governance, and the Cloud
The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost. This document provides an overvi...
Advisory Note
Cloud Services and Security
This report provides a review of the major security risks from the use of cloud services, how responsibility for security is divided between Cloud Service Provider and customer and...
Executive View
Oracle Autonomous Database
Oracle Autonomous Database is the world’s first fully automated cloud database platform powered by machine learning. By eliminating human factor from database management, it provid...
Executive View
Symantec CloudSOC™
Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use...
Executive View
CensorNet Cloud Security Platform
Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use...
Executive View
Skyhigh Cloud Security Platform
Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use...