Buyer's Compass
Buyer’s Compass: Unified Endpoint Management
Unified Endpoint Management refers to comprehensive solutions with capabilities that support a range of endpoint types. This KuppingerCole Buyer’s Compass will provide you with que...
Market Compass
Endpoint Protection, Detection, and Response
The KuppingerCole Market Compass provides an overview of the products offerings in Endpoint Protection, Detection and Response. The Endpoint Security space continues to see much i...
Leadership Compass
Unified Endpoint Management (UEM)
This report provides an overview of the market for Unified Endpoint Management (UEM) and provides you with a compass to help you to find the solution that best meets your needs. We...
Executive View
SentinelOne Singularity Platform
SentinelOne’s integrated security platform combines prevention, detection, analysis, and mitigation capabilities with the autonomous AI agent to enable deep visibility and consiste...
Executive View
Sophos Intercept X
Sophos Intercept X is an endpoint security solution that is powered by a deep learning neural network, anti-exploit techniques, and anti-ransomware technology to provide advanced d...
Executive View
IBM Privileged Identity Manager
IBM’s Security Privileged Identity Manager is an across-the-board Privilege Management solution which protects, automates and audits the use of privileged identities and recourses...
Executive View
ESET Enterprise Inspector
Enterprise Inspector is ESET’s Endpoint Detection & Response (EDR) solution. It currently runs on Windows and MacOS. ESET Enterprise Inspector collects and analyzes information to...
Executive View
RSA NetWitness® Suite
RSA NetWitness Suite is a security monitoring solution that combines log and network traffic analysis with endpoint-based visibility and automated threat intelligence to detect and...
Leadership Brief
Top Ten Trends in Cybersecurity
This report outlines 10 important trends and technologies in cybersecurity that KuppingerCole believes will shape security policies and solutions choice for organisations in the ye...
Executive View
Apigee Edge API Management Platform
Apigee offers a comprehensive platform to support end-to-end API management at every stage of API lifecycle. From API design to publication, productization, and monetization to mon...
Executive View
Cisco Advanced Malware Protection
Cisco Advanced Malware Protection (AMP) is an integrated enterprise security intelligence and malware protection solution. By combining global threat intelligence with dynamic malw...
Whitepaper
Unified management and control of the digital workspace
Identity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governa...
Leadership Brief
Defending against ransomware
Ransomware is an epidemic. Prevention is the best strategy. Don’t give up and pay the ransom.
Executive View
Symantec Advanced Threat Protection
Symantec Advanced Threat Protection is a unified platform for uncovering and remediating advanced cyber-attacks across endpoints, network and email, which augments existing Symante...
Leadership Brief
Schutz gegen Ransomware
Ransomware (Erpressungssoftware) ist eine Epidemie. Prävention ist die beste Strategie. Geben Sie nicht auf und bezahlen Sie kein Lösegeld.
Executive View
IBM MaaS360 with Watson
IBM MaaS360 with Watson is an AI-enabled, cloud-based Unified Endpoint Management (UEM) platform designed to enable enterprises to manage and secure smartphones, tablets, laptops,...
Buyer's Compass
Endpoint Detection & Response (EDR)
Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help de...
Leadership Brief
Defending Against Ransomware
Ransomware is an epidemic and continues to evolve. More than half of all companies and other organizations have been attacked with one form or ransomware or another. A multi-layere...
Whitepaper
Protecting the keys to your kingdom against cyber-attacks an...
All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due...
Executive View
BeyondTrust PowerBroker for Unix & Linux
BeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for...
Executive View
BeyondTrust PowerBroker for Unix & Linux
PowerBroker for Unix & Linux von BeyondTrust bietet Server Privilege Management und Session Management speziell für Unix- und Linux-Server. Solche Server sind häufig Angriffen sowo...
Leadership Compass
Enterprise Endpoint Security: Anti-Malware Solutions
This report provides an overview of the market for Enterprise Endpoint Security: Anti-Malware Solutions and provides you with a compass to help you to find the Anti-Malware product...
Executive View
ObserveIT Insider Threat Management
ObserveIT Insider Threat Management is a platform that combines the functionality of traditional User Behavior Analytics (UBA) and Data Loss Prevention (DLP) products in a lightwei...
Leadership Brief
The Anti-Malware Requirement in PSD2
The Revised Payment Service Directive (PSD2) mandates that service providers evaluate transaction requests for signs of malware infection. In order for transactions to be considere...
Executive View
ESET Endpoint Security
ESET Endpoint Security cover the widest variety of endpoint operating systems. This endpoint protection product consistently rates very highly in terms of detection in independent...
Leadership Brief
Top Cyber Threats
The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using...
Leadership Brief
The Differences Between Endpoint Protection (EPP) and Endpoi...
Endpoint Detection & Response products are capturing a lot of mindshare in cybersecurity. But how do they differ from the more standard Endpoint Protection products? We’ll look at...
Leadership Brief
Do I Need Endpoint Detection & Response (EDR)?
EDR products are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? If so, do you have the expertise in-house to properly...
Executive View
Kaspersky Endpoint Security for Business
Kaspersky offers a full-featured Endpoint Security suite which includes one of the most advanced multi-mode anti-malware detection engines in the market, which is powered by their...
Buyer's Compass
Endpoint Protection
Malware remains a global cybersecurity threat. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements f...
Executive View
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager (HIPAM) is a mature and feature-rich solution for Privileged Access Management (PAM). It covers all major areas of PAM and comes with sophistic...
Executive View
Bromium Secure Platform 4.1
Windows endpoint protection from risky tasks and malicious files, through browser and application isolation within one-time disposable micro-virtual machines combined with user beh...