IAM – Identity And Access Management

Are they who they say they are? Digital has made identity & access management (IAM) crucial and complicated. Read our insights.

Discover how Forrester supports IT leaders.

Insights

Blog

Decentralized Digital Identity: The Global Acceptance Network Gains Momentum

Andras Cser October 10, 2024
Bhutan became the first country to join the Global Acceptance Network (GAN), a foundation that aims to operate a nonprofit decentralized digital identity (DDID) network. Learn more about the use cases for GAN and how it can become successful in this post.
Blog

Visa Risk And Identity Solutions Acquires Fraud Management Vendor Featurespace

Andras Cser October 2, 2024
Last week, Visa announced the acquisition of Featurespace, a UK-based enterprise fraud management and anti-money-laundering (AML) vendor.

Missed Our Tech & Security Predictions Webinar?

Watch the replay to catch up! Dive into the top 2025 predictions and discover their impact on your tech and security strategies — with exclusive insights from the analysts who conducted the research.

Podcast

How Close Are We To Killing Passwords?

What It Means September 5, 2024
Are passwords obsolete or still a necessary evil? In this episode, Vice President and Principal Analyst Andras Cser and Principal Analyst Geoff Cairns describe where we are on the path to passwordless authentication for both enterprise and consumer users.
Blog

Recapping This Year’s InCyber Forum

Madelein van der Hout May 28, 2024
AI and European cybersecurity regulations were among the hottest topics at the recent InCyber Forum in Lille, France. Get more detail on the key trends in this event review.
Blog

Travel And Mobile Are Driving Decentralized Digital Identity (DDID) Growth

Andras Cser March 28, 2024
Recently, SITA, the multinational IT company supporting the air travel industry, announced that it would be the lead investor in the Series A funding for Indicio, a decentralized digital identity (DDID) solution provider. Find out what this means for the evolution of DDID.
Blog

Announcing The Forrester Wave™: Workforce Identity Platforms, Q1 2024

Geoff Cairns March 25, 2024
Last Wednesday, we released The Forrester Wave™: Workforce Identity Platforms, Q1 2024. We looked at the top 12 vendors in the market and evaluated them across 24 criteria. Workforce identity platforms energize a centripetal (inward) force necessary to combat the centrifugal (outward) forces that challenge identity and access management (IAM) deployments in organizations today. These […]
Blog

Data Governance: Your Key To Unlocking An Insights-Driven Business

Jayesh Chaurasia February 5, 2024
The key to turning data into meaningful and actionable insights across the organization lies in a frequently overlooked area — establishing a strong foundation of data governance.

Jan. 30 Tech & Security Predictions Webinar

Join us to dive into the top 2025 predictions and discover their impact on your tech and security strategies — with exclusive insights from the analysts who conducted the research.

Blog

Navigate The Identity And Access Management Landscape In China

Meng Liu January 25, 2024
The identity and access management (IAM) market in China is still emerging but its importance and priority have grown significantly. Learn how in this blog post.
Blog

My Key Takeaways From This Year’s Singapore FinTech Festival

Meng Liu November 19, 2023
In Singapore, the ease of global networking is impressive. At the recent Singapore FinTech Festival, a significant event in APAC attracting around 66,000 attendees, I had the valuable chance to connect with clients and friends worldwide. The event offered both enriching conversations and intriguing fintech product demonstrations. Here are some key takeaways from the event: […]
Blog

Supercharge Your Defense: Level Up AI-Powered Models To Combat Fraud In APAC

Meng Liu October 5, 2023
As authorized push payment fraud rises, learn three things your enterprise fraud management vendor should have to better leverage AI to combat fraud.
Blog

The Web Needs A Way Of Proving That You’re A Real Person — Worldcoin Is Not The Solution

Martha Bennett July 26, 2023
New crypto-focused financial network Worldcoin promises to provide a “new identity and financial network owned by everyone.” But it raises more issues than it solves. Find out why.
Blog

Don’t Ignore Your Employee Offboarding Processes

Paddy Harrington April 4, 2023
How offboarding is handled not only impacts your organization directly — it can also have a lasting effect on how others perceive your organization. Our two latest reports can help leaders mitigate the risks.

Ready For These 2025 Tech And Security Shifts?

Step into 2025 with confidence! Explore our predictions for tech and security leaders, featuring key trends in AI, cloud, SDLC, and AIOps you need to know.

Blog

Meet The New Analyst Covering IAM: Geoff Cairns

Geoff Cairns August 25, 2022
What Topics Will You Be Covering At Forrester? I am very excited to be covering identity and access management (IAM), with a focus on the workforce environment (business to employee). I will also collaborate with Forrester’s other IAM analyst, Andras Cser. Some areas and topics that I hope to explore include: How to optimize workforce […]
Blog

The State Of Decentralized Digital Identities

Andras Cser August 19, 2022
Learn the value of decentralized digital identities in this preview of Forrester’s Security & Risk event, November 8–9.
Blog

SailPoint To Be Acquired By Private Equity Firm Thoma Bravo For $6.9 Billion

Andras Cser April 13, 2022
On Monday, April 11, 2022, identity management and governance (IMG) vendor SailPoint announced that it was being bought by private equity (PE) firm Thoma Bravo for $6.9 billion. This is not the first rodeo for Thoma Bravo with SailPoint; in 2014, the PE firm bought out SailPoint’s original venture capital investors and remained an owner […]
Blog

Okta Lapsus$ Compromise: How To Make Sure You’re Protected

Merritt Maxim March 24, 2022
On Tuesday, March 22, 2022, identity-as-a-service (IDaaS) provider Okta announced that it had detected an attempt to compromise the account of a partner in January 2022. The announcement came after the hacking group Lapsus$ posted screenshots of a computer used by one of Okta’s third-party customer support engineers. As one of the largest IDaaS providers with […]
Blog

Evolve Your IAM Strategy For Today’s Digital Employee And Customer

Merritt Maxim March 16, 2022
Identity and access management (IAM) is the control plane for determining a root of trust for all digital identities. Effective IAM must validate identities, secure access, manage privileges, and be optimized for hardened security, good user experience, and operational efficiency across all user populations — your workforce, partners, customers, and machine identities. Effective and efficient […]

Unleash Your Security Genius In Just 3 Days

Join us in Baltimore December 9–11 for our Security & Risk Summit, featuring 30-plus sessions, workshops, keynotes, case studies, and specialized tracks for targeted learning.

Blog

SentinelOne Secures Identity First, Deception Second, In Attivo Acquisition

David Holmes March 15, 2022
Endpoint security and extended detection and response (XDR) vendor SentinelOne today announced the acquisition of Attivo Networks for just over $600 million. Attivo was a darling of deception technology, but SentinelOne was really after its Active Directory protection portfolio, including ADAssessor and ADSecure. Enterprise identity plays a critical role in the Zero Trust world mandated […]
Blog

Don’t Hit The Curb — Instead, Curb The Risk Of Emerging Technologies In 2022!

Andras Cser February 4, 2022
Find out why these five technology categories are causing security decision-makers the most concern.
Blog

S&R Forum 2021: Passwordless Authentication Adoption Is Gaining Momentum

Sean Ryan November 8, 2021
Passwordless authentication, in the form of inherence factors (e.g., fingerprint, facial) or in the form of possession factors (e.g., device, app, token/certificate) and supplemented by other factors (e.g., location, user behavior), is an emerging authentication technology that will protect organizations from brute force attacks, credential stuffing, phishing, and social engineering tactics. If carefully selected and […]
More posts