Security, Risk and Compliance

Security, risk, and compliance combines the disciplines of governance and oversight for managing risk, while optimizing security processes and technologies for your organization's future flexibility.

Refine your results

Date Range

Methodology

Region

Vendor

5 results in Reports

  • Managed Security Services Providers (MSSPs)
  • Andras Cser
  • For Security & Risk Professionals

    Report:Security's Cloud Revolution Is Upon Us

    Understanding Information Security Amid Major Cloud Disruption

    A perceived lack of security has been one of the more prominent reasons organizations cite for not adopting cloud services. However, this attitude is changing rapidly as cloud service providers...

    • Downloads: 763
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Enterprise Cloud Identity And Access Management, Q3 2012

    Six Vendors That Matter Most And How They Stack Up

    In Forrester's 15-criteria evaluation of cloud identity and access management (IAM) vendors, we identified the six most significant solution providers in this category — Covisint, Lighthouse...

    • Downloads: 1561
  • For Security & Risk Professionals

    Report:Identity And Access Management Adoption In Europe: 2009

    Uptake Of Individual Technologies Is Low, But Cloud Options Hold Promise

    Interest in and adoption of identity and access management (IAM) technologies has been growing steadily over the past few years, fueled both by the desire to streamline processes relating to...

    • Downloads: 574
  • For Security & Risk Professionals

    Report:Hosted Identity Is Real — Are You Ready For It?

    Identity and access management (IAM) projects have long been plagued with their long implementation times, high services-to-license ratios, integration challenges, labor-intensive build-out and...

    • Downloads: 1080
  • For Security & Risk Professionals

    Report:Identity-Management-As-A-Service

    The Evolution Of Identity Management

    Redesigning the enterprise architecture for identity and access management (IAM) is an important task. As organizations' requirements become more complex, and to keep administrative costs down, IAM...

    • Downloads: 1526