For Security & Risk Professionals

Navigate The Future Of Identity And Access Management

    Why Read This Report

    This is an update to the report of the same name originally issued to clients on March 22, 2012; it includes updated charts and new 2013 Business Technographics data and adds a discussion on Zero Trust authentication. This report outlines the future look of Forrester's solution for security and risk (S&R) execs building an identity and access management (IAM) strategy for the extended enterprise. This report helps you understand and navigate the major business and technology management trends affecting IAM in the next five years. Increasingly in 2014, IAM has become a tool not just for security but also business agility. Competitive challenges push businesses into the cloud and encourage mobile device use even without full-fledged access controls in place. These trends create pressing provisioning, authentication, and authorization challenges for S&R pros while compliance requirements and breaches and other security threats continue to swell. This report recommends that S&R pros apply a Zero Trust information security model to IAM to unify and improve access control across the extended enterprise.
    US $499
    Add To Cart
    Become A Client

    Get objective, pragmatic guidance that helps you make tough decisions and succeed in a complex world. Contact us to learn more.

    Already A Client?
    Log in to read this document.


    • The Extended Enterprise Urgently Needs Better Access Management
    • Newly Agile Environments Highlight The Weaknesses Of Today's IAM
    • Introducing Zero Trust Identity
    • Apply Three Rules To Achieve Zero Trust Identity
    • Enable Zero Trust Identity Step By Step

      Zero Trust Identity Does Much More Than Protect — It Enables
    • Supplemental Material
    • Related Research Documents