Security, Risk and Compliance

Security, risk, and compliance combines the disciplines of governance and oversight for managing risk, while optimizing security processes and technologies for your organization's future flexibility.

Refine your results

Date Range

Role

Methodology

Analyst

Topics

Industry

Region

Vendor

85 results in Reports

  • Authentication, Authorization, & Audit
  • For CIO Professionals

    Report:Protect Your Data In The Cloud

    New Vendors Emerge To Help You Define, Dissect, and Defend Your Data

    Google and salesforce.com are improving security features, but their solutions inherently silo data and restrict some of technology management's ability to control the application. The complexity...

    • Downloads: 289
    • Rating:
  • For Security & Risk Professionals

    Report:Market Overview: Employee And Customer Authentication Solutions In 2013, Part 2 Of 2

    Three Generations Of Vendor Solutions Tackle Various Challenges

    Part 1 of this report captured what you need to know about the seven important trends in the frothy authentication market, which spans three generations of technology. Part 2 dives into the...

    • Downloads: 215
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 538
  • For Security & Risk Professionals

    Report:Predictions 2014: Identity And Access Management

    Employee And Customer IAM Head For The Cloud

    Forrester predicts that in 2014, mobile and cloud adoption will continue to drive identity and access management (IAM) toward application programming interface (API) management. As...

    • Downloads: 535
    • Rating:
  • For Security & Risk Professionals

    Report:Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1 Of 2

    Seven Major Trends Every Security Pro Needs To Understand, Including Attempts To "Kill The Password"

    It's a critical time in user authentication — and a confusing one. Passwords and traditional out-of-wallet questions are go-to security measures, but are weakening by the day. At the same time,...

    • Downloads: 411
    • Rating:
  • For Security & Risk Professionals

    Report:TechRadar™: Enterprise Mobile Security, Q4 2013

    Road Map: The Mobile Security And Operations Playbook

    There are an ever-expanding number of approaches to enterprise mobile security. The current and emerging plethora of technologies span the stack from the network layer to the application layer,...

    • Downloads: 477
    • Comments: 2
  • For Security & Risk Professionals

    Report:Quick Take: Apple's iPhone 5S: The "S" Is For Security

    Biometrics Is Reborn On The Mobile Phone

    Biometrics has always held tremendous promise for better security, but it's never quite gained a solid foothold due to privacy concerns, cost of implementation, and availability of other substitute...

    • Downloads: 196
    • Comments: 3
    • Rating:
  • For Security & Risk Professionals

    Report:Engage Audit Professionals For Better Security Assessment Outcomes

    Constantly changing regulatory and business requirements leads to governance, risk, and compliance (GRC) challenges that require sound strategies and expert execution; otherwise, the control...

    • Downloads: 118
  • For Security & Risk Professionals

    Report:Introducing The Customer Authentication Assessment Framework

    Assess The Usability, Deployability, And Security Of Customers' Login Processes

    Forrester clients often face a hybrid challenge with customer-facing websites: optimizing both security and usability. The tightest security can be a usability disaster, and the most user-friendly...

    • Downloads: 378
    • Rating:
  • For Security & Risk Professionals

    Report:The Forrester Customer Authentication Assessment Framework

    Forrester clients often face a hybrid challenge with customer-facing websites: optimizing both security and usability. The tightest security can be a usability disaster and the most user-friendly...

    • Downloads: 51
    • Comments: 2
    • Rating:
  • For Enterprise Architecture Professionals

    Report:The Forrester Wave™: E-Signatures, Q2 2013

    Electronic signatures are gaining momentum and becoming an increasingly popular topic of inquiries by Forrester clients. In retrospect, today's e-signature users will be seen as early adopters...

    • Downloads: 656
    • Rating:
  • For Application Development & Delivery Professionals

    Report:Mobile Solution Architecture: User Authentication Is The Foundation Of Mobile Trust

    Start Small And Keep An Eye On The Breadth Of Your Future Mobile Scenarios

    User authentication is a key foundation of security for mobile apps — as it is for application security in general. Determining which authentication approach to use for your mobile solution...

    • Downloads: 568
    • Rating:
  • For Security & Risk Professionals

    Report:Top 15 Trends S&R Pros Should Watch: Q2 2013

    From frantic security operations problems to the changing threat landscape, CISOs, senior security leaders, and other IT risk management leaders consistently have trouble keeping up with key trends...

    • Downloads: 854
    • Rating:
  • For Security & Risk Professionals

    Report:Inquiry Spotlight: Consumer-Facing Identity, Q4 2012 To Q1 2013

    The challenges of consumer-facing identity management, access management, and authentication differ in ways subtle and dramatic from those of the employee-facing variety. In fact, several vendors in...

    • Downloads: 376
  • For Enterprise Architecture Professionals

    Report:Trends In Mobility, Cloud Computing, And Analytics Shake Up ECM

    Vision: The Content Management Playbook

    Successful management of content throughout its life cycle has never been more challenging. Customers and employees, operating in a social, mobile world, expect easy mechanisms to create and consume...

    • Downloads: 1091
  • For Security & Risk Professionals

    Report:Mobile Authentication: Is This My App? Is This My User?

    Strategy Deep Dive: The Mobile Security And Operations Playbook

    Mobile devices are everywhere: at work, in the hands of your customers, and with employees. Security and risk (S&R) professionals need to provide users with secure and seamless mobile access to...

    • Downloads: 627
    • Comments: 4
    • Rating:
  • For Security & Risk Professionals

    Report:TechRadar™ For Risk Management Professionals: GRC, Q4 2012

    Road Map: The Governance, Risk, And Compliance Playbook

    The governance, risk management, and compliance (GRC) technology market is one of fluctuation, confusion, and contention. Many technologies relevant for governance, risk management, and compliance...

    • Downloads: 690
    • Rating:
  • For Enterprise Architecture Professionals

    Report:Address The Complex ECM Landscape

    Landscape: The Content Management Playbook

    Information workers struggle under increasing volumes of varying types of content. Historically, enterprise architects have taken a product-specific approach to their enterprise content management...

    • Downloads: 848
    • Rating:
  • For Marketing Leadership Professionals

    Report:Defining DMARC

    A New Way For Emailers To Defend Themselves Against Email Fraud

    Hundreds of brands are hijacked by phishing scams every month, costing companies and ultimately their end customers billions. And existing methods to fight phishing like email authentication...

    • Downloads: 131
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Risk-Based Authentication, Q1 2012

    The Six Vendors That Matter Most And How They Stack Up

    In Forrester's 16-criteria evaluation of risk-based authentication vendors, we identified the six significant vendors in this category — CA Technologies, Entrust, iovation, RSA, Symantec, and...

    • Downloads: 1223
  • For Security & Risk Professionals

    Report:TechRadar™ For Security Pros: Strong Authentication, Q1 2012

    Traditional Methods Start To Sag, While Mobile-Fueled Methods Surge

    The strong authentication landscape has undergone tremendous churn in recent years as new mobile-fueled technologies have come online and as RSA, the premier vendor of hardware one-time password...

    • Downloads: 1142
  • For Application Development & Delivery Professionals

    Report:What To Look For In E-Signature Providers

    Segment E-Signature Use Cases To Help In Your Selection

    Electronic signatures are gaining momentum due to accelerating consumer technology and the need to reduce both transaction costs and the time to close business. But despite increasing customer...

    • Downloads: 495
  • For Application Development & Delivery Professionals

    Report:Customer Experience Drives E-Signature Adoption

    No Waiting, Happy Customers, And Better Compliance

    Electronic signatures are gaining momentum among businesses of all shapes and sizes due to accelerating consumer technology and the need to reduce both transaction costs and the time to close...

    • Downloads: 513
  • For Security & Risk Professionals

    Report:Atlas Shrugged: Security Pros Must Adjust To The New Realities Of A Post-RSA Breach World

    Plan Your Move To Risk-Based Authentication And Software-Based Tokens

    The RSA breach presents IT security professionals with significant challenges regarding authentication and questions the security of the bulletproof hardware token hitherto thought to be invincible....

    • Downloads: 338
    • Rating:
  • For Security & Risk Professionals

    Report:SAS 70 Out, New Service Organization Control Reports In

    Security And Risk Professionals Must Prepare To Phase Out SAS 70 Today

    Developed by the American Institute of CPAs (AICPA), the Statements on Auditing Standards 70 (SAS 70) has been around since 1992. When the Sarbanes-Oxley Act (SOX) of 2002 passed, SAS 70 gained new...

    • Downloads: 459