Merritt   Maxim

Merritt Maxim

Principal Analyst Serving Security & Risk Professionals

Merritt contributes to Forrester's offerings for Security & Risk Professionals. Merritt covers identity management and access management, including user provisioning, access governance, customer identity and access management (CIAM), identity-as-a-service (IDaaS), single sign-on (SSO), user directory infrastructure, and internet-of-things (IoT) security. His research builds on his 20 years of experience helping security leaders at global enterprises derive optimal business value from their identity and access management initiatives for employees, partners, and customers.

Merritt has spoken at industry events such as the RSA Conference and Cloud Identity Summit on identity-related topics. He also coauthored the book Wireless Security.

Previous Work Experience

Prior to joining Forrester, Merritt managed product marketing for identity management and access governance at CA Technologies, where he was involved in global go-to-market strategies, product positioning and strategy, competitive analysis, and sales enablement. Previously, Merritt held product management and product marketing roles at Security Dynamics, RSA Security, Netegrity, Nuance, and OpenPages.

Education

Merritt holds a B.A. (cum laude, with high honors) in history from Colgate University and an M.B.A. degree from the MIT Sloan School of Management.

Merritt Maxim

Principal Analyst Serving Security & Risk Professionals

Merritt contributes to Forrester's offerings for Security & Risk Professionals. Merritt covers identity management and access management, including user provisioning, access governance, customer identity and access management (CIAM), identity-as-a-service (IDaaS), single sign-on (SSO), user directory infrastructure, and internet-of-things (IoT) security. His research builds on his 20 years of experience helping security leaders at global enterprises derive optimal business value from their identity and access management initiatives for employees, partners, and customers.

Merritt has spoken at industry events such as the RSA Conference and Cloud Identity Summit on identity-related topics. He also coauthored the book Wireless Security.

Previous Work Experience

Prior to joining Forrester, Merritt managed product marketing for identity management and access governance at CA Technologies, where he was involved in global go-to-market strategies, product positioning and strategy, competitive analysis, and sales enablement. Previously, Merritt held product management and product marketing roles at Security Dynamics, RSA Security, Netegrity, Nuance, and OpenPages.

Education

Merritt holds a B.A. (cum laude, with high honors) in history from Colgate University and an M.B.A. degree from the MIT Sloan School of Management.

Merritt Maxim's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Top Trends Shaping IAM In 2018

    Landscape: The Identity And Access Management Playbook

    January 9, 2018 Andras Cser, Merritt Maxim

    For today's digital businesses, identity and access management (IAM) involves more than just provisioning and enforcing employee access to corporate applications and data. Security and risk (S&R) pros must now govern and secure access across a hybrid application environment (on-premises, mobile, SaaS) and a variety of populations — including employees, partners, and customers — all without negatively affecting user experience. This report describes the top trends shaping the IAM landscape in 2018 and how S&R pros should adapt.

  • For Security & Risk Professionals

    REPORT: The State Of IoT Security 2018

    There Is Growing Awareness Of IoT Threats, But Deployments Are Still At Risk

    January 9, 2018Merritt Maxim

    IoT technology enables businesses to optimize processes, enhance product offerings, and transform the customer experience. While business leaders are excited about the business insights they will garner from connected devices, security and risk (S&R) pros struggle with disparate and sometimes immature security offerings that fail to properly secure deployments, leading to increased risk of data loss, physical damage, and revenue loss. This report outlines the current state of IoT security to help S&R pros understand what is possible and effective today.

  • For Security & Risk Professionals

    REPORT: Best Practices: Selecting, Deploying, And Managing Enterprise Password Managers

    Solutions Reduce The Risk Of Breaches From Compromised Credentials

    January 8, 2018Merritt Maxim, Andras Cser

    Despite the known risks, passwords remain the most common method of user authentication. The increased number of apps employees need for their jobs, coupled with the effort required to migrate to new authentication technologies, means that security pros need to plan for password coexistence. EPMs help manage passwords until the security team is ready to replace them. This report offers practical EPM guidance and recommendations security pros can use to keep password costs and risks in check while maximizing employee productivity.

  • For Security & Risk Professionals

    REPORT: The Forrester Tech Tide™: Identity And Access Management, Q4 2017

    Road Map: The Identity And Access Management Playbook

    December 12, 2017 Andras Cser, Merritt Maxim

    Identity and access management (IAM) is critical to protecting customers from identify theft and privacy abuses, limiting the potential for and impact of a cyberattack, and streamlining numerous operational processes. To accelerate their IAM capabilities, security pros are evaluating and adopting a range of contributing technologies. This report presents an analysis of the maturity and business value of the 14 technology categories that support IAM. Security pros should read this report to shape their firm's road map and investment approach to these technologies.

  • For Security & Risk Professionals

    REPORT: The Forrester Wave™: Identity-As-A-Service, Q4 2017

    The Seven Vendors That Matter Most And How They Stack Up

    November 17, 2017 Andras Cser, Merritt Maxim

    In our 41-criteria evaluation of IDaaS providers, we identified the seven most significant ones — Centrify, Gemalto, Microsoft, Okta, OneLogin, Oracle, and Ping Identity — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.

View all of Merritt Maxim's Research

Clients Who Work With Merritt Maxim Also Work With:

View all related analysts