Merritt   Maxim

Merritt Maxim

Principal Analyst Serving Security & Risk Professionals

Merritt contributes to Forrester's offerings for Security & Risk Professionals. Merritt covers identity management and access management, including user provisioning, access governance, customer identity and access management (CIAM), identity-as-a-service (IDaaS), single sign-on (SSO), user directory infrastructure, and internet-of-things (IoT) security. His research builds on his 20 years of experience helping security leaders at global enterprises derive optimal business value from their identity and access management initiatives for employees, partners, and customers.

Merritt has spoken at industry events such as the RSA Conference and Cloud Identity Summit on identity-related topics. He also coauthored the book Wireless Security.

Previous Work Experience

Prior to joining Forrester, Merritt managed product marketing for identity management and access governance at CA Technologies, where he was involved in global go-to-market strategies, product positioning and strategy, competitive analysis, and sales enablement. Previously, Merritt held product management and product marketing roles at Security Dynamics, RSA Security, Netegrity, Nuance, and OpenPages.

Education

Merritt holds a B.A. (cum laude, with high honors) in history from Colgate University and an M.B.A. degree from the MIT Sloan School of Management.

Merritt Maxim

Principal Analyst Serving Security & Risk Professionals

Merritt contributes to Forrester's offerings for Security & Risk Professionals. Merritt covers identity management and access management, including user provisioning, access governance, customer identity and access management (CIAM), identity-as-a-service (IDaaS), single sign-on (SSO), user directory infrastructure, and internet-of-things (IoT) security. His research builds on his 20 years of experience helping security leaders at global enterprises derive optimal business value from their identity and access management initiatives for employees, partners, and customers.

Merritt has spoken at industry events such as the RSA Conference and Cloud Identity Summit on identity-related topics. He also coauthored the book Wireless Security.

Previous Work Experience

Prior to joining Forrester, Merritt managed product marketing for identity management and access governance at CA Technologies, where he was involved in global go-to-market strategies, product positioning and strategy, competitive analysis, and sales enablement. Previously, Merritt held product management and product marketing roles at Security Dynamics, RSA Security, Netegrity, Nuance, and OpenPages.

Education

Merritt holds a B.A. (cum laude, with high honors) in history from Colgate University and an M.B.A. degree from the MIT Sloan School of Management.

Merritt Maxim's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook

    March 25, 2019 Paul McKay, Jeff Pollard, Jinan Budge, Joseph Blankenship, Andras Cser, Merritt Maxim, Amy DeMartine, Claire O'Malley

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions, consulting engagements, and dozens of primary research interviews with chief information security officers (CISOs), security vendors, and major security consultancies and service providers. CISOs: Leverage this report to guide your security program strategy and prioritize changes to security architecture and operations for the coming year.

  • For Security & Risk Professionals

    REPORT: Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook

    March 25, 2019 Andras Cser, Merritt Maxim

    Your identity and access management (IAM) strategy must establish and explain the business need and value of IAM to technology and business leaders. It must also describe the current state, define the future state, and make defensible recommendations for the sequence of projects needed to execute your IAM strategy successfully. In this report, we provide security and risk (S&R) and business leaders with actionable guidance to develop a compelling IAM strategic plan. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

  • For Security & Risk Professionals

    REPORT: Best Practices: Customer Call Center Authentication

    Prioritize Implicit Biometrics And Phone Reputation To Reduce Customer And Agent Friction

    March 22, 2019 Andras Cser, Merritt Maxim

    Customer call center authentication (CCCA) combines human and machine processes, tools, and technologies. The call center is invariably the channel of last resort for customers looking to get things done, but it's still a largely analog avenue riddled with security holes. Improving CCCA security while reducing customer friction and improving customer and agent experiences is a core building block of a successful digital transformation. This report provides CCCA best practices to help security and risk (S&R) pros beef up customer call center (CCC) security.

  • For Security & Risk Professionals

    REPORT: New Tech: Industrial Control Systems (ICS) Security Solutions, Q1 2019

    Forrester's Landscape Overview Of 21 Providers

    February 28, 2019Merritt Maxim, Joseph Blankenship

    A new crop of industrial control systems (ICS) security technologies, and the solutions they power, stand poised to unleash new paradigms in protecting and securing high-value industrial systems, leading to changing behaviors and disruption in the broad cybersecurity market. This report presents a review of the emerging vendors in the ICS security market. Security professionals should use it to understand the capabilities within major market segments and to inform their technology strategies.

  • For Security & Risk Professionals

    REPORT: The Security Of Cryptocurrencies

    Security Must Help Business Leaders Make Risk-Based Decisions On Cryptocurrency Adoption And Implementation

    February 13, 2019 Andras Cser, Heidi Shey, Jeff Pollard, Merritt Maxim

    Many enterprises are considering the adoption of cryptocurrencies for payment. As a security and risk (S&R) professional, you're responsible for helping business leaders understand the legal and regulatory risks and, importantly, how to secure the cryptocurrency. In this report, we help S&R pros: 1) understand the current adoption of cryptocurrency payments; 2) examine the threat surface; 3) investigate the regulatory landscape; and 4) identify best practices for secure implementation.

View all of Merritt Maxim's Research

Clients Who Work With Merritt Maxim Also Work With:

View all related analysts

Connect

Brief Our Analysts

Upcoming Events

Forum: Privacy & Security 2019

Date: September 12, 2019
Register
View all upcoming events