Sean Ryan
Senior Analyst

Author Insights
Blog
S&R Forum 2021: Passwordless Authentication Adoption Is Gaining Momentum
Passwordless authentication, in the form of inherence factors (e.g., fingerprint, facial) or in the form of possession factors (e.g., device, app, token/certificate) and supplemented by other factors (e.g., location, user behavior), is an emerging authentication technology that will protect organizations from brute force attacks, credential stuffing, phishing, and social engineering tactics. If carefully selected and […]
Blog
Perspectives On One Identity’s Acquisition Of OneLogin
On October 4, 2021, identity and access management (IAM) vendor One Identity announced plans to acquire identity-as-a-service (IDaaS) vendor OneLogin for an undisclosed amount. Founded in 2009, OneLogin is an established pure-play IDaaS vendor that primarily serves midmarket enterprises, with a unified platform for employees, partners, and customers, and has raised over $170 million in […]
Blog
Security Recommendations 2021: Taking Stock For The Long Term
After a tumultuous period of reactive steps, now is the right time for security and risk pros to get their long-term plans back on track.
Blog
Okta Acquires Identity Orchestration And CIAM Vendor Auth0 For $6.5B
Forrester analysts take a detailed look at what's driving the unprecedented premium being paid in this acquisition.
Blog
GRC And IAM — Better Together
Struggling to define where GRC ends and IAM begins? Get a clear breakdown of how the two functions should work together in a broader risk management strategy.
Blog
It Is A Privilege To Announce The Forrester Wave™: Privileged Identity Management (PIM), Q4 2020
Bad puns in the title of this blog post aside (queue the rolling of the eyes, sigh, and slight smirk), we are pleased to announce that “The Forrester Wave™: Privileged Identity Management (PIM), Q4 2020” is now live. While PIM vendors have been adding new capabilities and improved user experience over the past two years, […]
Blog
Dealing With The Access Hoarders In Your Organization
Anyone who has seen the show Hoarders knows how people who fill their houses with unneeded stuff can literally bury themselves in junk. Security and risk (S&R) pros who manage employee access to apps, databases, and systems should notice the Hoarders parallel when it comes to IT access: Many employees unknowingly acquire access over time, […]
Blog
CyberArk Scoops Up Idaptive
Read Forrester's take on CyberArk announcing its acquisition of identity-as-a-service vendor Idaptive.
Blog
Security Recommendations 2020: What To Focus On
Our team of security and risk analysts spent the past few months brainstorming and curating tactical and strategic advice designed to improve your security programs for 2020 and beyond . . . and then along came the COVID-19 global pandemic. In the midst of this, firms are undergoing a shuffle of priorities to accommodate a […]
Blog
Privileged Identity Management Solutions Must Secure Growing Diversity Of Use Cases
Last week, Forrester published its latest overview of the privileged identity management (PIM) market, which can be found here. In it, we provide an overview of the 17 leading PIM vendors and categorized each vendor as either a PIM specialist or PIM suite provider , along with a market segmentation based on geography and annual […]
Blog
A Spike In Home Workers Raises MFA Resilience Questions
Building a parallel VPN entry point or swapping MFA vendors is costly. Plus, there is the increased risk of expired tokens, user confusion, and system upkeep. In short, these challenges are daunting to implement and introduce new challenges. Take these four steps to develop an MFA resilience plan.
Blog
Passwords Belong In Time Capsules, Not IT Ecosystems
Threats from ever savvier cybercriminals demand better, more comprehensive responses.
Blog
Rock ‘N’ Role — The Art Of Managing Employee Roles And Access For Dynamic Business Models
Access control in the era of dynamic business is a growing challenge for security pros. Learn about the new scenarios that need to be addressed and the solutions available to S&R pros today.
Blog
Decade Retrospective: Cybersecurity From 2010 To 2019
From the Intel-McAfee deal to the Sony Pictures breach, VP and Principal Analyst Jeff Pollard reviews the past decade’s cybersecurity highlights and lowlights.
Blog
Two-Factor Authentication (2FA) Or Multifactor Authentication (MFA)? That Is The Question
We, as security practitioners, need to be mindful about what we mean when we say “2FA” or “MFA.” These terms are often used interchangeably. The confusion is understandable, since 2FA is a subset of MFA. However, just like Halloween candy, MFA (including 2FA) comes in many flavors. Let’s unpack these terms and consider the various […]
Blog
Meet Your New Identity And Access Management Research Analyst
As of September, I’m the new identity and access management (IAM) analyst on Forrester’s security and risk research team. I am grateful to have joined a very talented group of analysts at a company that is fun, intellectually stimulating, and committed to high-quality, objective research. In my role, I will be taking over some of […]