Executive View
Elastic Security
Elastic Security is a security platform built on top of the Elastic Stack. It combines security information and event management, threat hunting, endpoint security, and cloud monit...
Whitepaper
Geistiges Eigentum schützen und gleichzeitig geschäftliche A...
Viele Branchen, insbesondere diejenigen, die einerseits zusammenarbeiten und Informationen austauschen und andererseits mit streng vertraulichen Informationen und staatlicher Wirts...
Whitepaper
Protecting Intellectual Properties while enabling business a...
Many industries, specifically the ones that on one hand must collaborate and share information and on the other hand have to deal with highly sensitive information and state-run in...
Architecture Blueprint
Architecting your Security Operations Centre
A security operations centre (SOC) is a dedicated team, usually operating 24x365, to detect and respond to cybersecurity incidents within your organisation that potentially affect...
Leadership Brief
Working for the Business, not the Auditors
Forward-thinking companies no longer see cybersecurity, governance, compliance and privacy as something they are just forced to do. Instead, a comprehensive alignment with applicab...
Executive View
R&S®Trusted Gate - Secure Glocalization by Rohde & Schwarz...
Rohde & Schwarz Cybersecurity offers reliable management of regulated and sensitive information to promote compliant collaboration and file sharing in unified SharePoint platforms...
Leadership Brief
Incident Response Management
The probability of becoming a victim of a data breach is now higher than ever. The hyperconnected world and the ever-increasing complexity of modern IT systems and processes pose n...
Analyst Advice
Business Resilience Management (Crisis Roadmap for Beginners...
Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.
Executive View
Symantec Privileged Access Manager
Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and c...
Leadership Brief
Introduction to the Information Protection Life Cycle and Fr...
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...
Advisory Note
Blockchains and Cybersecurity: Augmenting Trust with Algori...
From trusted third parties to algorithmic consensus: new cybersecurity opportunities and challenges with blockchains. Blockchains can provide distributed and decentralised improvem...
Advisory Note
Business Continuity in the age of Cyber Attacks
Business continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organizations to alter...
Leadership Brief
Cybersecurity Trends & Challenges 2020
2019 already has been a challenging year in cybersecurity. There have (again) been many severe cyberattacks and breaches, and there is no hope that this might change in 2020. Cyber...
Advisory Note
KRIs and KPI for Cyber Security
This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the...
Leadership Brief
Top Ten Trends in Cybersecurity
This report outlines 10 important trends and technologies in cybersecurity that KuppingerCole believes will shape security policies and solutions choice for organisations in the ye...
Executive View
Microsoft Enterprise Mobility + Security Suite
A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecur...
Advisory Note
Understanding and Countering Ransomware
Ransomware is a top security threat and continuously on the rise. Financial organizations, healthcare institutions, and manufacturing industries are the most vulnerable groups; how...
Buyer's Compass
Buyer’s Guide: Ransomware Protection
Ransomware is a global cybersecurity threat. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for s...
Executive View
IBM Cloud Pak for Security
IBM Cloud Pak for Security is an innovative solution that can run in a variety of deployment models that supports security analytics and incident response for today’s complex, hybr...
Executive View
One Identity Safeguard Suite
Privileged Access Management (PAM) has evolved into a set of crucial technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital...
Whitepaper
Moving towards a holistic Cyber Risk Governance approach
The ongoing task of maintaining cyber security and risk governance, while providing evidence and communicating efficiently with corporate stakeholders is getting increasingly more...
Leadership Brief
Penetration Testing Done Right
Penetration Testing should be a key part of any business's assurance process, providing a level on independent testing that they are not wide open to hackers or other malicious act...
Executive View
AlgoSec Security Management Suite
AlgoSec Security Management Suite is a highly automated and business-focused integrated solution for managing network security policies and business application connectivity across...
Executive View
ERPScan Smart Cybersecurity Platform for SAP
ERPScan Smart Cybersecurity Platform for SAP is an Al-driven enterprise level solution for SAP security that leverages machine learning. By addressing predictive, preventive, detec...
Executive View
Micro Focus Privileged Account Manager
With massive data breaches in the headlines and increased regulatory scrutiny of failures to implement effective cybersecurity controls, enterprise management of privileged user ac...
Executive View
StealthDEFEND®
Cyber-attacks often involve a complex process, including an insider threat element, which exploits compromised or illicit user credentials to gain access to data. StealthDEFEND i...
Whitepaper
Wertvolle Daten kennen, schützen und besser nutzen – die Cha...
Neue Regulierungen wie die Datenschutz-Grundverordnung (DSGVO) und die stetig wachsende Gefahr durch Cyber-Attacken führen zu einem hohen Druck auf Unternehmen. Es gibt aber auch C...
Executive View
Senrio Insight
Senrio Insight is an Industrial IoT cybersecurity platform utilizing passive non-intrusive network device discovery to provide visibility and analytics of industrial device behavio...
Leadership Brief
PSD2: New business opportunities and risks
The Revised Payment Service Directive (PSD2) Regulatory Technical Specifications (RTS) take effect this autumn across the EU. The directive will provide new benefits and rights for...
Executive View
Zscaler Security-as-a-Service Platform
Zscaler is the world’s largest multi-tenant distributed cloud security platform that delivers a broad range of services without any on-premises hardware or software agents, includi...