Article No. / Date
Articles
ev70965

Executive View

Oracle Database Security Assessment

This report provides an executive summary of Oracle’s Database Security capabilities based on recently published KuppingerCole research. It covers both the company’s traditional da...

ev79000

Executive View

Cayosoft Administrator v5

Cayosoft Administrator is an integrated platform for management and automation of Active Directory and Office 365 environments, including hybrid deployments. The latest release add...

ev80054

Executive View

Akamai Zero Trust Security

Akamai’s Intelligent Edge Platform offers a broad range of access management, threat protection, and application security services that will support you in your journey to Zero Tru...

ev72505

Executive View

Zscaler Security-as-a-Service Platform

Zscaler is the world’s largest multi-tenant distributed cloud security platform that delivers a broad range of services without any on-premises hardware or software agents, includi...

ev79035

Executive View

Securonix Cloud SIEM and UEBA

Securonix Cloud is a next-generation security intelligence platform that provides comprehensive security information and event management, as well as user and entity behavior analy...

ev80156

Executive View

Oracle Identity Cloud Service

Most organizations now have a hybrid IT environment with a cloud first approach to choosing new applications. While this provides many benefits it also creates challenges around s...

wp80155

Whitepaper

Oracle Identity Cloud Service: Identity for Business Applica...

Today, most businesses are using hybrid IT, with a mix on-premises and cloud applications and services. And hybrid IT is here to stay, given that many of the legacy applications ar...

an72570

Advisory Note

Protect Your Cloud Against Hacks and Industrial Espionage

Hacks against on-premises and cloud infrastructure happen every day. Corporate espionage is not just the stuff of spy novels. Unethical corporate competitors and even government in...

ev80005

Executive View

Amazon GuardDuty

Amazon GuardDuty is a fully managed, simple, and affordable security monitoring and threat detection service that combines machine learning and anomaly detection to enable quick an...

ev79041

Executive View

Digital Shadows SearchLight™

Digital Risk Protection as a Service. A combination of data loss protection, the securing of brands and reputation online and the reduction of the overall attack surface by identif...

ev79034

Executive View

CyberArk Privileged Session Manager for Cloud

Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally...

ev80036de

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Verlässliche Kontrolle und Monitoring sensibler Informationen, die in öffentlichen Clouds und Kollaborationstools (Microsoft SharePoint, Office 365) gespeichert sind, durch Virtual...

ev80036

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (SharePoint, Office 365) through virtualization, encryption and fragmentati...

lc70614

Leadership Compass

Cloud Access Security Brokers

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the m...

an72555

Advisory Note

Maturity Level Matrix for Cyber Security

KuppingerCole Maturity Level Matrixes for the major market segments within cyber security. These provide the foundation for rating the current state of your cyber security projects...

an72552

Advisory Note / Architecture Blueprint

Hybrid Cloud Security

Organizations now commonly use multiple cloud services as well as on-premises IT. This KuppingerCole Architecture Blueprint provides a set of building blocks needed to design, imp...

wp80017

Whitepaper

Next-Generation Enterprise Security Delivered from the Cloud...

As businesses embrace the Digital Transformation and become increasingly cloud-native, mobile and interconnected, the corporate network perimeter is gradually disappearing, exposin...

top