Security, Risk and Compliance

Security, risk, and compliance combines the disciplines of governance and oversight for managing risk, while optimizing security processes and technologies for your organization's future flexibility.

Refine your results

Date Range

Methodology

Topics

Industry

Region

Vendor

15 results in Reports

  • Security Program Governance
  • Andras Cser
  • For Security & Risk Professionals

    Report:Security's Cloud Revolution Is Upon Us

    Understanding Information Security Amid Major Cloud Disruption

    A perceived lack of security has been one of the more prominent reasons organizations cite for not adopting cloud services. However, this attitude is changing rapidly as cloud service providers...

    • Downloads: 763
  • For Security & Risk Professionals

    Report:Inquiry Spotlight: Security And Risk, Q1 To Q4 2012

    Forrester's security and risk (S&R) team fields hundreds of inquiries every month. We use these inquiries as a barometer to track client challenges and to gauge client interest in the various topics...

    • Downloads: 348
  • For Security & Risk Professionals

    Report:Simplify Identity And Access Management Processes To Reduce Costs, Increase Business Efficiency, And Make Users Happy

    This report outlines the process and procedures of Forrester's solution for security and risk (S&R) professionals looking to build their identity and access management (IAM) strategy. S&R...

    • Downloads: 578
  • For Security & Risk Professionals

    Report:Assess Your Identity And Access Management Maturity

    Assessment Framework: The Identity And Access Management Playbook

    An identity and access management (IAM) maturity model is necessary for assessing your current state against industry best practices, understanding your performance relative to that of your peers,...

    • Downloads: 2126
  • For Security & Risk Professionals

    Report:Evolve Your Identity Strategy For The Extended Enterprise

    Executive Overview: The Identity And Access Management Playbook

    The rapid adoption of mobile devices and cloud services, together with a multitude of new partnerships and customer-facing applications, has "extended" the identity boundary of today's enterprise....

    • Downloads: 713
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Enterprise Cloud Identity And Access Management, Q3 2012

    Six Vendors That Matter Most And How They Stack Up

    In Forrester's 15-criteria evaluation of cloud identity and access management (IAM) vendors, we identified the six most significant solution providers in this category — Covisint, Lighthouse...

    • Downloads: 1561
  • For Security & Risk Professionals

    Report:Role Job Description: Identity And Access Management Architect

    Skills And Staffing: The Identity And Access Management Playbook

    This report outlines the skills and staffing requirements for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. Identity...

    • Downloads: 578
  • For Security & Risk Professionals

    Report:Identity And Access Management: 2012 Budget And Planning Guide

    A Review Of Budgets, Spending Intentions, Technology Adoption, And Key Trends

    To help Forrester clients with their identity and access management (IAM) strategy for 2011, Forrester predicted four significant trends. So how'd we do? We got two right and two half right. Heading...

    • Downloads: 1104
  • For Security & Risk Professionals

    Report:Enterprise Fraud Management Predictions: 2011 And Beyond

    You Must Invest In Commercial Solutions To Combat Sophisticated Fraud Rings

    Forrester uncovered three major trends for 2011 that organizations and vendors alike must address to combat increasingly sophisticated fraud rings. First, fraud professionals should insist that their...

    • Downloads: 847
  • For Security & Risk Professionals

    Report:Enterprise Single Sign-On: The Fast Lane To Identity And Access Management

    Desktop or enterprise single sign-on (E-SSO) is a relatively easy way to provide end user convenience and to get started in identity and access management (IAM). The end user benefits of E-SSO are...

    • Downloads: 986
  • For Security & Risk Professionals

    Report:Identity And Access Management Adoption In Europe: 2009

    Uptake Of Individual Technologies Is Low, But Cloud Options Hold Promise

    Interest in and adoption of identity and access management (IAM) technologies has been growing steadily over the past few years, fueled both by the desire to streamline processes relating to...

    • Downloads: 574
  • For Security & Risk Professionals

    Report:Hosted Identity Is Real — Are You Ready For It?

    Identity and access management (IAM) projects have long been plagued with their long implementation times, high services-to-license ratios, integration challenges, labor-intensive build-out and...

    • Downloads: 1081
  • For Security & Risk Professionals

    Report:Identity-Management-As-A-Service

    The Evolution Of Identity Management

    Redesigning the enterprise architecture for identity and access management (IAM) is an important task. As organizations' requirements become more complex, and to keep administrative costs down, IAM...

    • Downloads: 1526
  • For Security & Risk Professionals

    Report:Understanding The Identity Management Market To Make Better Planning Decisions

    Organizations need quantified guidance on how adoption of specific identity and access management (IAM) technologies is succeeding in order to be able to plan their projects....

    • Downloads: 656
  • For Security & Risk Professionals

    Report:Identity Management Market Forecast: 2007 To 2014

    Provisioning Will Extend Its Dominance Of Market Revenues

    The identity management — or identity and access management (IAM) — market will grow from nearly $2.6 billion in 2006 to more than $12.3 billion in 2014 (including revenues from both...

    • Downloads: 2666