Security, Risk and Compliance

Security, risk, and compliance combines the disciplines of governance and oversight for managing risk, while optimizing security processes and technologies for your organization's future flexibility.

Refine your results

Date Range

Methodology

Analyst

Industry

Region

Vendor

10 results in Reports

  • Biometrics
  • For Security & Risk Professionals

    Report:Market Overview: Employee And Customer Authentication Solutions In 2013, Part 2 Of 2

    Three Generations Of Vendor Solutions Tackle Various Challenges

    Part 1 of this report captured what you need to know about the seven important trends in the frothy authentication market, which spans three generations of technology. Part 2 dives into the...

    • Downloads: 225
  • For Security & Risk Professionals

    Report:Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1 Of 2

    Seven Major Trends Every Security Pro Needs To Understand, Including Attempts To "Kill The Password"

    It's a critical time in user authentication — and a confusing one. Passwords and traditional out-of-wallet questions are go-to security measures, but are weakening by the day. At the same time,...

    • Downloads: 417
    • Rating:
  • For Security & Risk Professionals

    Report:Quick Take: Apple's iPhone 5S: The "S" Is For Security

    Biometrics Is Reborn On The Mobile Phone

    Biometrics has always held tremendous promise for better security, but it's never quite gained a solid foothold due to privacy concerns, cost of implementation, and availability of other substitute...

    • Downloads: 196
    • Comments: 3
    • Rating:
  • For Security & Risk Professionals

    Report:Inquiry Spotlight: Consumer-Facing Identity, Q4 2012 To Q1 2013

    The challenges of consumer-facing identity management, access management, and authentication differ in ways subtle and dramatic from those of the employee-facing variety. In fact, several vendors in...

    • Downloads: 376
  • For Security & Risk Professionals

    Report:TechRadar™ For Security Pros: Strong Authentication, Q1 2012

    Traditional Methods Start To Sag, While Mobile-Fueled Methods Surge

    The strong authentication landscape has undergone tremendous churn in recent years as new mobile-fueled technologies have come online and as RSA, the premier vendor of hardware one-time password...

    • Downloads: 1143
  • For Security & Risk Professionals

    Report:A US National ID Begins To Take Root

    WHTI, EDL, And REAL ID

    In the aftermath of the Al Qaeda attacks on 9/11, the US government realized that the lack of effective identity credentials for use in domestic air travel was a contributing factor in the attacks'...

    • Downloads: 304
  • For Security & Risk Professionals

    Report:Market Overview: Strong Authentication For Enterprises In 2008

    Securing The Doors To Your IT Environment

    Security professionals have long known that passwords are no longer sufficient to act as the sole means of gatekeeping access to enterprise network and data resources. Increasingly, they're putting...

    • Downloads: 1470
  • For Security & Risk Professionals

    Report:Biometrics: State Of The Art And Future Implications

    Biometrics has matured to the point where several technologies have been internationally standardized and incorporated into major international and national identity verification implementations...

    • Downloads: 759
  • For Security & Risk Professionals

    Report:Biometrics: Beginning To Fulfill Its Promise

    Public uncertainty about biometrics' impact on privacy and civil liberties has long kept the technology from realizing its full potential. However, these concerns have stemmed primarily from an...

    • Downloads: 619
  • For Security & Risk Professionals

    Report:What CISOs Can Learn From The US Government's E-Passport And HSPD-12 Initiatives

    As part of a United Nations standardization effort, the US and 14 other countries have begun issuing e-passports, which add contactless integrated circuit chips (ICs) containing biometric data on the...

    • Downloads: 166