Article No. / Date
Articles
mc80508

Market Compass

Endpoint Protection, Detection, and Response

The KuppingerCole Market Compass provides an overview of the products offerings in Endpoint Protection, Detection and Response. The Endpoint Security space continues to see much i...

lc70314

Leadership Compass

Unified Endpoint Management (UEM)

This report provides an overview of the market for Unified Endpoint Management (UEM) and provides you with a compass to help you to find the solution that best meets your needs. We...

ev80139

Executive View

SentinelOne Singularity Platform

SentinelOne’s integrated security platform combines prevention, detection, analysis, and mitigation capabilities with the autonomous AI agent to enable deep visibility and consiste...

ev80227

Executive View

Sophos Intercept X

Sophos Intercept X is an endpoint security solution that is powered by a deep learning neural network, anti-exploit techniques, and anti-ransomware technology to provide advanced d...

ev71557

Executive View

IBM Privileged Identity Manager

IBM’s Security Privileged Identity Manager is an across-the-board Privilege Management solution which protects, automates and audits the use of privileged identities and recourses...

ev80192

Executive View

ESET Enterprise Inspector

Enterprise Inspector is ESET’s Endpoint Detection & Response (EDR) solution. It currently runs on Windows and MacOS. ESET Enterprise Inspector collects and analyzes information to...

ev72516

Executive View

RSA NetWitness® Suite

RSA NetWitness Suite is a security monitoring solution that combines log and network traffic analysis with endpoint-based visibility and automated threat intelligence to detect and...

lb80336

Leadership Brief

Top Ten Trends in Cybersecurity

This report outlines 10 important trends and technologies in cybersecurity that KuppingerCole believes will shape security policies and solutions choice for organisations in the ye...

ev80307

Executive View

Apigee Edge API Management Platform

Apigee offers a comprehensive platform to support end-to-end API management at every stage of API lifecycle. From API design to publication, productization, and monetization to mon...

wp70286

Whitepaper

Unified management and control of the digital workspace

Identity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governa...

lb70336

Leadership Brief

Defending against ransomware

Ransomware is an epidemic. Prevention is the best strategy. Don’t give up and pay the ransom.

ev71155

Executive View

Symantec Advanced Threat Protection

Symantec Advanced Threat Protection is a unified platform for uncovering and remediating advanced cyber-attacks across endpoints, network and email, which augments existing Symante...

ev79067

Executive View

IBM MaaS360 with Watson

IBM MaaS360 with Watson is an AI-enabled, cloud-based Unified Endpoint Management (UEM) platform designed to enable enterprises to manage and secure smartphones, tablets, laptops,...

bc80213

Buyer's Compass

Endpoint Detection & Response (EDR)

Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help de...

lc71172

Leadership Compass

Enterprise Endpoint Security: Anti-Malware Solutions

This report provides an overview of the market for Enterprise Endpoint Security: Anti-Malware Solutions and provides you with a compass to help you to find the Anti-Malware product...

ev80181

Executive View

ESET Endpoint Security

ESET Endpoint Security cover the widest variety of endpoint operating systems. This endpoint protection product consistently rates very highly in terms of detection in independent...

lb80186

Leadership Brief

The Differences Between Endpoint Protection (EPP) and Endpoi...

Endpoint Detection & Response products are capturing a lot of mindshare in cybersecurity. But how do they differ from the more standard Endpoint Protection products? We’ll look at...

lb80187

Leadership Brief

Do I Need Endpoint Detection & Response (EDR)?

EDR products are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? If so, do you have the expertise in-house to properly...

ev80180

Executive View

Kaspersky Endpoint Security for Business

Kaspersky offers a full-featured Endpoint Security suite which includes one of the most advanced multi-mode anti-malware detection engines in the market, which is powered by their...

an80110

Buyer's Compass

Endpoint Protection

Malware remains a global cybersecurity threat. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements f...

ev80030

Executive View

Hitachi ID Privileged Access Manager

Hitachi ID Privileged Access Manager (HIPAM) is a mature and feature-rich solution for Privileged Access Management (PAM). It covers all major areas of PAM and comes with sophistic...

ev71309

Executive View

Bromium Secure Platform 4.1

Windows endpoint protection from risky tasks and malicious files, through browser and application isolation within one-time disposable micro-virtual machines combined with user beh...

top