Article No. / Date
Articles
ev80331

Executive View

Symantec Privileged Access Manager

Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and c...

ev80122

Executive View

CyberArk Privilege Cloud

Privileged Access Management (PAM) has evolved into a set of technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital transfor...

ev80400de

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Transparente, datenzentrische Sicherheit in nicht vertrauenswürdigen Infrastrukturen. Zuverlässige Kontrolle und Überwachung von sensiblen Informationen, die in öffentlichen Clouds...

ev80400

Executive View

R&S®Trusted Gate by Rohde & Schwarz Cybersecurity

Transparent, data-centric security for untrusted infrastructures. Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (e.g. Mic...

lb80370

Leadership Brief

Introduction to the Information Protection Life Cycle and Fr...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

lb80008

Leadership Brief

Find Your Route from SIEM to SIP and SOAR

Security Information and Event Management (SIEM) platforms have been a key part of many enterprises’ cybersecurity infrastructures for over a decade. However, facing the growing nu...

an70361

Advisory Note

Business Continuity in the age of Cyber Attacks

Business continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organizations to alter...

lb80502

Leadership Brief

Cybersecurity Trends & Challenges 2020

2019 already has been a challenging year in cybersecurity. There have (again) been many severe cyberattacks and breaches, and there is no hope that this might change in 2020. Cyber...

an80239

Advisory Note

KRIs and KPI for Cyber Security

This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the...

lb80336

Leadership Brief

Top Ten Trends in Cybersecurity

This report outlines 10 important trends and technologies in cybersecurity that KuppingerCole believes will shape security policies and solutions choice for organisations in the ye...

lb80260

Leadership Brief

Optimizing your Cybersecurity Spending

Prioritizing cybersecurity portfolio expenditures can be a very complex process. At best, the investments should be as low as needed but high enough to be prepared for future attac...

ev80172

Executive View

IBM Cloud Pak for Security

IBM Cloud Pak for Security is an innovative solution that can run in a variety of deployment models that supports security analytics and incident response for today’s complex, hybr...

ev80074

Executive View

One Identity Safeguard Suite

Privileged Access Management (PAM) has evolved into a set of crucial technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital...

lb70359

Leadership Brief

Penetration Testing Done Right

Penetration Testing should be a key part of any business's assurance process, providing a level on independent testing that they are not wide open to hackers or other malicious act...

lb80303

Leadership Brief

PSD2: New business opportunities and risks

The Revised Payment Service Directive (PSD2) Regulatory Technical Specifications (RTS) take effect this autumn across the EU. The directive will provide new benefits and rights for...

lb72573

Leadership Brief

How to get a Grip on OT Cybersecurity

With the increasing demand for more connectivity, Operational Technology (OT) organizations will need to become more interconnected with IT over time. The convergence of IT and OT...

lb80296

Leadership Brief

Do I need Network Threat Detection & Response (NDTR)?

NTDR products/services are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? We’ll look at what NTDR products do, reason...

lb80186

Leadership Brief

The Differences Between Endpoint Protection (EPP) and Endpoi...

Endpoint Detection & Response products are capturing a lot of mindshare in cybersecurity. But how do they differ from the more standard Endpoint Protection products? We’ll look at...

lb80187

Leadership Brief

Do I Need Endpoint Detection & Response (EDR)?

EDR products are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? If so, do you have the expertise in-house to properly...

an80110

Buyer's Compass

Endpoint Protection

Malware remains a global cybersecurity threat. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements f...

ev79074

Executive View

Exostar Supplier Risk Management

Exostar Supplier Risk Management delivers advanced capabilities for identifying and managing risk and compliance with cybersecurity and other best practices and standards, along th...

lb70278

Leadership Brief

Artificial Intelligence in Cybersecurity

Artificial Intelligence remains the hottest buzzword in almost every segment of the IT industry nowadays, and not without reason. The very idea of teaching a machine to mimic the w...

ev80036de

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Verlässliche Kontrolle und Monitoring sensibler Informationen, die in öffentlichen Clouds und Kollaborationstools (Microsoft SharePoint, Office 365) gespeichert sind, durch Virtual...

lc79014

Leadership Compass

Privileged Access Management

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Con...

wp80037

Whitepaper

PATECCO Privileged Access Management Services

Privilege Management is the set of critical cybersecurity controls that deal with the management of security risks associated with privileged access in an organization. Maintaining...

ev80036

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (SharePoint, Office 365) through virtualization, encryption and fragmentati...

lc71147

Leadership Compass

Access Management and Federation

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Web Access Management and Identity Federation on-premises platforms....

ev72505

Executive View

Zscaler Security-as-a-Service Platform

Zscaler is the world’s largest multi-tenant distributed cloud security platform that delivers a broad range of services without any on-premises hardware or software agents, includi...

ev70362

Executive View

TechDemocracy Intellicta

A software platform designed to achieve a holistic assessment of an organization’s cybersecurity, compliance, risk and governance status by establishing risk governance, resilience...

ev72525

Executive View

Senrio Insight

Senrio Insight is an Industrial IoT cybersecurity platform utilizing passive non-intrusive network device discovery to provide visibility and analytics of industrial device behavio...

wp79028

Whitepaper

Wertvolle Daten kennen, schützen und besser nutzen – die Cha...

Neue Regulierungen wie die Datenschutz-Grundverordnung (DSGVO) und die stetig wachsende Gefahr durch Cyber-Attacken führen zu einem hohen Druck auf Unternehmen. Es gibt aber auch C...

ev70366

Executive View

StealthDEFEND®

Cyber-attacks often involve a complex process, including an insider threat element, which exploits compromised or illicit user credentials to gain access to data. StealthDEFEND i...

ev71314

Executive View

Micro Focus Privileged Account Manager

With massive data breaches in the headlines and increased regulatory scrutiny of failures to implement effective cybersecurity controls, enterprise management of privileged user ac...

ev72510

Executive View

ERPScan Smart Cybersecurity Platform for SAP

ERPScan Smart Cybersecurity Platform for SAP is an Al-driven enterprise level solution for SAP security that leverages machine learning. By addressing predictive, preventive, detec...

ev70262

Executive View

AlgoSec Security Management Suite

AlgoSec Security Management Suite is a highly automated and business-focused integrated solution for managing network security policies and business application connectivity across...

wp70360

Whitepaper

Moving towards a holistic Cyber Risk Governance approach

The ongoing task of maintaining cyber security and risk governance, while providing evidence and communicating efficiently with corporate stakeholders is getting increasingly more...

an72599

Advisory Note / Buyer's Guide

Buyer’s Guide: Ransomware Protection

Ransomware is a global cybersecurity threat. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for s...

an70947

Advisory Note

Understanding and Countering Ransomware

Ransomware is a top security threat and continuously on the rise. Financial organizations, healthcare institutions, and manufacturing industries are the most vulnerable groups; how...

ev72541

Executive View

Microsoft Enterprise Mobility + Security Suite

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecur...

an71603

Advisory Note

Blockchains and Cybersecurity: Augmenting Trust with Algori...

From trusted third parties to algorithmic consensus: new cybersecurity opportunities and challenges with blockchains. Blockchains can provide distributed and decentralised improvem...

top