Merritt   Maxim

Merritt Maxim

Principal Analyst Serving Security & Risk Professionals

Merritt contributes to Forrester's offerings for Security & Risk Professionals. Merritt covers identity management and access management, including user provisioning, access governance, customer identity and access management (CIAM), identity-as-a-service (IDaaS), single sign-on (SSO), user directory infrastructure, and internet-of-things (IoT) security. His research builds on his 20 years of experience helping security leaders at global enterprises derive optimal business value from their identity and access management initiatives for employees, partners, and customers.

Merritt has spoken at industry events such as the RSA Conference and Cloud Identity Summit on identity-related topics. He also coauthored the book Wireless Security.

Previous Work Experience

Prior to joining Forrester, Merritt managed product marketing for identity management and access governance at CA Technologies, where he was involved in global go-to-market strategies, product positioning and strategy, competitive analysis, and sales enablement. Previously, Merritt held product management and product marketing roles at Security Dynamics, RSA Security, Netegrity, Nuance, and OpenPages.

Education

Merritt holds a B.A. (cum laude, with high honors) in history from Colgate University and an M.B.A. degree from the MIT Sloan School of Management.

Merritt Maxim

Principal Analyst Serving Security & Risk Professionals

Merritt contributes to Forrester's offerings for Security & Risk Professionals. Merritt covers identity management and access management, including user provisioning, access governance, customer identity and access management (CIAM), identity-as-a-service (IDaaS), single sign-on (SSO), user directory infrastructure, and internet-of-things (IoT) security. His research builds on his 20 years of experience helping security leaders at global enterprises derive optimal business value from their identity and access management initiatives for employees, partners, and customers.

Merritt has spoken at industry events such as the RSA Conference and Cloud Identity Summit on identity-related topics. He also coauthored the book Wireless Security.

Previous Work Experience

Prior to joining Forrester, Merritt managed product marketing for identity management and access governance at CA Technologies, where he was involved in global go-to-market strategies, product positioning and strategy, competitive analysis, and sales enablement. Previously, Merritt held product management and product marketing roles at Security Dynamics, RSA Security, Netegrity, Nuance, and OpenPages.

Education

Merritt holds a B.A. (cum laude, with high honors) in history from Colgate University and an M.B.A. degree from the MIT Sloan School of Management.

Merritt Maxim's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Best Practices: Behavioral Biometrics

    Behavioral Biometrics Has Assumed A Greater Role Since The Equifax Breach

    May 25, 2018 Andras Cser, Merritt Maxim

    Preventing identity theft and account takeover is no small feat. Many solutions that address these concerns impede the user experience, create unnecessary friction, and increase help desk support calls. Behavioral biometrics (BB) solutions boost security and risk (S&R) pros' web and mobile app protection by monitoring user navigation, mouse and screen gestures, typing patterns, risk-scoring enrollment and authentication activity, and flagging anything suspicious. BB protection requires minimal user intervention, helping S&R pros reduce risk without raising end user friction.

  • For Security & Risk Professionals

    REPORT: IAM For Intelligent Agents

    Intelligent Agents Will Require Continuous Authentication And Authorization To Protect Customers, Data, And Privileged Systems

    May 11, 2018 Andras Cser, Merritt Maxim, Amy DeMartine

    Proper identity and access management (IAM) for intelligent agents (IAs) that covers virtual assistants such as Alexa, Cortana, Google Assistant, and Siri reduces the likelihood of fraud, identity theft, compliance violations, and data breaches while still maintaining an optimal customer experience. This report walks through how security leaders can apply and implement essential IAM concepts to manage IAM for human-to-IA interactions and IA-to-downstream-app access.

  • For Security & Risk Professionals

    REPORT: Protecting Industrial Control Systems And Critical Infrastructure From Attack

    Increasing Threats And Devastating Consequences Require A Zero Trust Security Approach

    April 19, 2018Merritt Maxim, Joseph Blankenship

    Much of today's industrial control systems (ICSs), including those in critical infrastructure industries like energy and utilities, consist of outdated technology connected to IT networks and infrastructure. This linkage has left them vulnerable to an array of malicious actors salivating to attack. We talked to a number of security professionals in operational technology roles and found that traditional IT security measures don't stack up. This report outlines advanced technologies to protect ICSs and offers practical Zero Trust strategies to enhance security.

  • For Security & Risk Professionals

    REPORT: Build Your Identity And Access Management Road Map

    Road Map: The Identity And Access Management Playbook

    March 29, 2018 Andras Cser, Merritt Maxim

    Base your road map for identity and access management (IAM) on a well-defined strategy that establishes and explains the business need and value of IAM to both technology and business leaders. Make your IAM road map flexible and specific, describe short-, medium-, and long-term IAM activities for the next 18 to 24 months, and update it at least once a year. In this report, we provide security and risk (S&R) leaders with systematic guidance to develop a compelling IAM road map.

  • For Security & Risk Professionals

    REPORT: Top Trends Shaping Identity Verification (IDV) In 2018

    Post-Equifax Breach, IDV Aggregators Will Cater To Multifaceted IDV Requirements

    March 29, 2018 Andras Cser, Merritt Maxim

    In the face of increasing identity theft, stricter compliance regulations, and the push for online customer acquisition, reliable, accurate, cost-effective, and easy-to-use identity verification (IDV) is becoming a core building block of any customer or employee identity and access management (IAM) system. This document highlights the key trends shaping the IDV market in 2018 and beyond and helps security and risk pros adapt their strategies, vendor selection, and implementation.

View all of Merritt Maxim's Research

Clients Who Work With Merritt Maxim Also Work With:

View all related analysts

Connect

Brief Our Analysts

Upcoming Events

Webinar: Top Recommendations You Should Follow For Your Security Program In 2018

Date: June 4, 2018
Time: 11:00 AM-11:40 AM Eastern Standard Time
Register
View all upcoming events