Forrester Planned Research

Projected DateRoleTitleAnalystSuccess ImperativeIndustryDescriptionFeatures
Sep 2017Security & RiskFour Scenarios To Build The Business Case For Enterprise Fraud ManagementAndras CserThe business case for enterprise fraud management (EFM) depends on the reduction of fraud loss across multiple (typically payment) transaction types. So we looked at fraud loss, investigation labor, as well as EFM solution license and implementation costs and modeled four on-premises and software-as-a-service (SaaS) scenarios to support EFM business cases. Security and risk (S&R) professionals can use these to compare the ROI of on-premises and SaaS EFM solutions with that of manual EFM processes to build the business case for their firm.
Sep 2017Security & RiskVendor Landscape: Cloud Workload Security Solutions, Q3 2017Andras CserAs business continue to rapidly adopt cloud platforms, both infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS), security and risk pros struggle to protect their organization’s valuable data while minimize the threat surface of cloud and hybrid cloud workloads. Cloud workload security (CWS) solutions provide automated and layered controls to secure configurations, network, applications and storage of hybrid cloud hypervisors and workloads. In this vendor landscape, we provide S&R pros with an overview of the CWS vendor landscape, critical selection criteria, and key vendor differentiation.
Sep 2017Security & RiskTech Tide™: Identity And Access Management, Q3 2017Andras Cser, Merritt MaximTo help security and risk management professionals plan their investments in IAM, Forrester will investigate the current state of the most important technologies. We will examine past research, interview experts in the field, and conduct detailed research with multiple current or potential users of each of the technologies. We will use this collected data to assess to what extent, if at all, you should invest in these technologies.
Oct 2017Security & RiskThe Future Of Identity And Access ManagementAndras Cser, Merritt MaximToday, identity and access management (IAM) technologies have become a critical component of the BT agenda because business leaders, CIOs, and CISO use them to both serve customers along every step of the customers' journey as well as to understand and engage customers. In this report, we help security and risk (S&R) professionals understand how they can leverage IAM technologies to enable new customer functionality and business models in the next three years.
Oct 2017Security & RiskThe State Of Identity And Access Management: 2017 To 2018Merritt Maxim, Andras CserThis report provides a spending and technology adoption benchmark for security and risk (S&R) leaders responsible for developing their organization's identity and access management (IAM) strategy. This data-driven report outlines budgeting and spending, policies and tools in use, technology adoption plans, and other key IAM trends in global enterprise organizations for 2017 to 2018. Understanding these trends and their implications will help S&R executives examine and adjust as necessary their own IAM resource allocation to drive a positive experience with their employees and customers. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Nov 2017Security & RiskNow Tech: eCommerce Retail Fraud Management (ERFM) 2017Andras Cser    Online retailers have to fight fraud in real time to prevent fraud losses and chargebacks. In addition to using rules-based solutions, many find machine-learning-based solutions of higher accuracy. This vendor landscape looks at the current capabilities of solutions and business models of vendors (take over chargeback losses for a fixed cut of revenues) in ERFM.
Nov 2017Security & RiskThe Forrester Wave™: Identity-As-A-Service, Q4 2017Andras Cser, Merritt MaximDescription coming soon.
Dec 2017Security & RiskTop Trends Shaping IAM In 2018Andras Cser, Merritt MaximAlthough maturing quickly and available in new virtualized and containerized forms, identity and access management (IAM) is undergoing fundamental changes in response to: 1) hybrid cloud access control challenges; 2) IoT security requirements; 3) the erosion of the password; 4) the maturing of identity analytics; and 5) the adoption of cloud directories. For security and risk (S&R) professionals, this report identifies and analyzes the most important IAM trends that will shape 2018.