Security, Risk and Compliance

Security, risk, and compliance combines the disciplines of governance and oversight for managing risk, while optimizing security processes and technologies for your organization's future flexibility.

Refine your results

Date Range

Methodology

Analyst

Industry

Region

Vendor

32 results in Reports

  • Authentication
  • Security & Risk
  • For Security & Risk Professionals

    Report:Top 15 Trends S&R Pros Should Watch: Q2 2014

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research projects...

    • Downloads: 4
  • For Security & Risk Professionals

    Report:Market Overview: Employee And Customer Authentication Solutions In 2013, Part 2 Of 2

    Three Generations Of Vendor Solutions Tackle Various Challenges

    Part 1 of this report captured what you need to know about the seven important trends in the frothy authentication market, which spans three generations of technology. Part 2 dives into the...

    • Downloads: 218
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 543
  • For Security & Risk Professionals

    Report:Predictions 2014: Identity And Access Management

    Employee And Customer IAM Head For The Cloud

    Forrester predicts that in 2014, mobile and cloud adoption will continue to drive identity and access management (IAM) toward application programming interface (API) management. As...

    • Downloads: 540
    • Rating:
  • For Security & Risk Professionals

    Report:Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1 Of 2

    Seven Major Trends Every Security Pro Needs To Understand, Including Attempts To "Kill The Password"

    It's a critical time in user authentication — and a confusing one. Passwords and traditional out-of-wallet questions are go-to security measures, but are weakening by the day. At the same time,...

    • Downloads: 412
    • Rating:
  • For Security & Risk Professionals

    Report:TechRadar™: Enterprise Mobile Security, Q4 2013

    Road Map: The Mobile Security And Operations Playbook

    There are an ever-expanding number of approaches to enterprise mobile security. The current and emerging plethora of technologies span the stack from the network layer to the application layer,...

    • Downloads: 480
    • Comments: 2
  • For Security & Risk Professionals

    Report:The Forrester Customer Authentication Assessment Framework

    Forrester clients often face a hybrid challenge with customer-facing websites: optimizing both security and usability. The tightest security can be a usability disaster and the most user-friendly...

    • Downloads: 51
    • Comments: 2
    • Rating:
  • For Security & Risk Professionals

    Report:Introducing The Customer Authentication Assessment Framework

    Assess The Usability, Deployability, And Security Of Customers' Login Processes

    Forrester clients often face a hybrid challenge with customer-facing websites: optimizing both security and usability. The tightest security can be a usability disaster, and the most user-friendly...

    • Downloads: 378
    • Rating:
  • For Security & Risk Professionals

    Report:Top 15 Trends S&R Pros Should Watch: Q2 2013

    From frantic security operations problems to the changing threat landscape, CISOs, senior security leaders, and other IT risk management leaders consistently have trouble keeping up with key trends...

    • Downloads: 854
    • Rating:
  • For Security & Risk Professionals

    Report:Inquiry Spotlight: Consumer-Facing Identity, Q4 2012 To Q1 2013

    The challenges of consumer-facing identity management, access management, and authentication differ in ways subtle and dramatic from those of the employee-facing variety. In fact, several vendors in...

    • Downloads: 376
  • For Security & Risk Professionals

    Report:Mobile Authentication: Is This My App? Is This My User?

    Strategy Deep Dive: The Mobile Security And Operations Playbook

    Mobile devices are everywhere: at work, in the hands of your customers, and with employees. Security and risk (S&R) professionals need to provide users with secure and seamless mobile access to...

    • Downloads: 628
    • Comments: 4
    • Rating:
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Risk-Based Authentication, Q1 2012

    The Six Vendors That Matter Most And How They Stack Up

    In Forrester's 16-criteria evaluation of risk-based authentication vendors, we identified the six significant vendors in this category — CA Technologies, Entrust, iovation, RSA, Symantec, and...

    • Downloads: 1223
  • For Security & Risk Professionals

    Report:TechRadar™ For Security Pros: Strong Authentication, Q1 2012

    Traditional Methods Start To Sag, While Mobile-Fueled Methods Surge

    The strong authentication landscape has undergone tremendous churn in recent years as new mobile-fueled technologies have come online and as RSA, the premier vendor of hardware one-time password...

    • Downloads: 1142
  • For Security & Risk Professionals

    Report:Atlas Shrugged: Security Pros Must Adjust To The New Realities Of A Post-RSA Breach World

    Plan Your Move To Risk-Based Authentication And Software-Based Tokens

    The RSA breach presents IT security professionals with significant challenges regarding authentication and questions the security of the bulletproof hardware token hitherto thought to be invincible....

    • Downloads: 338
    • Rating:
  • For Security & Risk Professionals

    Report:Inquiry Spotlight: Security And Risk, Q1 To Q4 2010

    Forrester's security and risk (S&R) team fields hundreds of inquiries every month. We often gauge the interest in various topics and plan our future research agenda based on this barometer. Many of...

    • Downloads: 647
  • For Security & Risk Professionals

    Report:Case Study: Improving Healthcare IT With Streamlined Access To Clinical Applications

    How One Healthcare Provider Improved The End User Experience Of 1,500 Physicians

    In today's healthcare environment, physicians must access a wide array of IT applications to provide quality patient care. Because of the growing number of both on-premises and SaaS-based...

    • Downloads: 654
  • For Security & Risk Professionals

    Report:State Of Federation, Q2 2010

    Software-As-A-Service Adoption Drives Federated Access; Provisioning Still Lags

    The wait is over. According to Forrester's recent security survey, adoption of identity federation jumped from less than 5% two years ago to more than 12% in 2009. Why? Because software-as-a-service...

    • Downloads: 678
  • For Security & Risk Professionals

    Report:Identity And Access Management Adoption In Europe: 2009

    Uptake Of Individual Technologies Is Low, But Cloud Options Hold Promise

    Interest in and adoption of identity and access management (IAM) technologies has been growing steadily over the past few years, fueled both by the desire to streamline processes relating to...

    • Downloads: 568
  • For Security & Risk Professionals

    Report:Shift Happened In The Strong Authentication Market In 2009

    Key Vendors Made Dramatic Moves And Are Looking At A Cloudy Future

    The strong authentication market is on the move — slowly but surely. Nearly half of the authentication vendors profiled in Forrester's July 2008 market overview have since changed hands. Even...

    • Downloads: 1011
  • For Security & Risk Professionals

    Report:E-Signatures Q&A: Legalize It

    Minimize The Risks Of Eliminating External-Facing Paper-Based Processes

    Electronic signatures (e-signatures), with their roots in paperwork elimination initiatives, have been edging into greater prominence due to the greater regulatory, legal, and economic pressures that...

    • Downloads: 530
  • For Security & Risk Professionals

    Report:Case Study: Baker Tilly Virchow Krause Builds Trust With Strong Authentication

    Customer Data Is Accessible Yet Safe Whether Users Are Connected Or Not

    Matt Jennings at Baker Tilly Virchow Krause needed to overhaul the accounting and advisory firm's security processes and technologies to ensure ongoing regulatory compliance and customer confidence....

    • Downloads: 209
  • For Security & Risk Professionals

    Report:IT Security's Critical Role During Layoffs

    How To Safeguard Company Data In Difficult Times

    The Gateway Recession of 2009 has brought the prospect of slowing sales and profits — and job losses. Although layoffs are never desirable, they are often necessary. Much of the responsibility...

    • Downloads: 365
  • For Security & Risk Professionals

    Report:Identity And Access Management Adoption In Europe: 2008

    Interest in and adoption of identity and access management (IAM) technologies has been growing steadily over the past few years, fueled both by the desire to streamline processes relating to...

    • Downloads: 490
  • For Security & Risk Professionals

    Report:Case Study: Unisys Takes Its Own Authentication Medicine

    Systems Integrator Chooses An Integrated Credential To Solve Global Physical And Logical Access Challenges

    Unisys is a large and diversified systems integrator with operations worldwide. In recent years, the firm has seen its global workforce become increasingly mobile. At the same time, techniques to...

    • Downloads: 240
  • For Security & Risk Professionals

    Report:A US National ID Begins To Take Root

    WHTI, EDL, And REAL ID

    In the aftermath of the Al Qaeda attacks on 9/11, the US government realized that the lack of effective identity credentials for use in domestic air travel was a contributing factor in the attacks'...

    • Downloads: 304