Forrester Planned Research

Projected DateRoleTitleAnalystSuccess ImperativeIndustryDescriptionFeatures
Jul 2017Security & RiskCloud Security Solutions Forecast, 2016 To 2021 (Global)Andras CserAs software, infrastructure, and platforms shift to the cloud, taking care of their security is a must. This led to a new breed of security services is emerging and growing to address the security (data protection, monitoring, IAM, etc.) requirements. This data-driven report gives a five-year view of growth in the global cloud security solutions market, including cloud security gateways (CSGs), also known as cloud access security brokers (CASBs); centralized cloud security management (CCSM); hypervisor security; and native infrastructure-as-a-service/platform-as-a-service (IaaS/PaaS) security. We also share highlights from the forecast.
Jul 2017Security & RiskThe Forrester Wave: Risk-Based Authentication, Q3 2017Andras CserThe traditional strong authentication techniques are costly and complex. Security and risk professionals are turning to contextual authentication  because it: 1) is easy to deploy; 2) works well with mobile devices; 3) is flexible to use on nonweb channels; 4) is easy to use; and 5) is cost-effective. In this Forrester Wave, we will identify the most significant vendors in this category and research, analyze, and score them. This report will detail our findings about how each vendor measures up and plots where they stand in relation to each other, to help security and risk professionals select the right solution for their authentication requirements.
Jul 2017Security & RiskDevelop Identity And Access Management Metrics That Matter To The BusinessAndras Cser, Merritt MaximMost security and risk (S&R) professionals struggle to ensure identity and access management (IAM) remains a top business technology priority. S&R pros who are successful at nurturing their internal and external facing IAM programs track and communicate IAM metrics that demonstrate not only quantifiable savings but business benefits. In this report, we use the Balanced Scorecard approach to detail the most relevant IAM metrics for security, compliance, administration efficiency, and business agility. This is an update of a previously published report; Forrester updates it regularly for data accuracy and relevance.
Jul 2017Security & RiskSizing The Identity And Access Management MarketMerritt Maxim, Andras Cser, Jennifer AdamsNew digital business and customer engagement models have extended today’s identity boundaries. In response, security pros must now manage identities and access across an increasingly diverse variety of populations (employees, partners, and customers), devices and endpoints (cloud, on-prem) to ensure that the right people have access to appropriate level of resources. Today, S&R pros must now develop and execute a comprehensive business-centric identity and access management (IAM) strategy across all these dimensions in ways that keeps fraudsters out, improves operational efficiency and supports optimal user experience. This report organizes today’s diffuse range of IAM security solutions into seven specific categories (web SSO, IDaaS, 2FA, RBA, PIM, IMG, and CIAM) for S&R pros and projects spending patterns for the IAM market on a global basis.
Sep 2017Security & RiskTechRadar: Identity And Access Management, Q3 2017Andras Cser, Merritt MaximTo help security and risk management professionals plan their next decade of investments in IAM, Forrester will investigate the current state of the most important technologies. We will examine past research, interview experts in the field, and conduct detailed research with multiple current or potential users of each of the technologies. We will use this collected data to assess four things: 1) the current state of the technology; 2) the technology's potential impact on customers' businesses; 3) the time experts think the technology will need to reach the next stage of maturity; and 4) the technology's overall trajectory, from minimal success to significant success.
Oct 2017Security & RiskThe Future Of Identity And Access ManagementAndras Cser, Merritt MaximToday, identity and access management (IAM) technologies have become a critical component of the BT agenda because business leaders, CIOs, and CISO use them to both serve customers along every step of the customers' journey as well as to understand and engage customers. In this report, we help security and risk (S&R) professionals understand how they can leverage IAM technologies to enable new customer functionality and business models in the next three years.
Oct 2017Security & RiskTop Trends Shaping IAM In 2018Andras Cser, Merritt MaximAlthough maturing quickly and available in new virtualized and containerized forms, identity and access management (IAM) is undergoing fundamental changes in response to: 1) hybrid cloud access control challenges; 2) IoT security requirements; 3) the erosion of the password; 4) the maturing of identity analytics; and 5) the adoption of cloud directories. For security and risk (S&R) professionals, this report identifies and analyzes the most important IAM trends that will shape 2018.
Nov 2017Security & RiskThe Forrester Wave: Identity-As-A-Service, Q4 2017Andras CserDescription coming soon.
Nov 2017Security & RiskThe State Of Identity And Access Management: 2017 To 2018Merritt Maxim, Andras CserThis report provides a spending and technology adoption benchmark for security and risk (S&R) leaders responsible for developing their organization's identity and access management (IAM) strategy. This data-driven report outlines budgeting and spending, policies and tools in use, technology adoption plans, and other key IAM trends in global enterprise organizations for 2017 to 2018. Understanding these trends and their implications will help S&R executives examine and adjust as necessary their own IAM resource allocation to drive a positive experience with their employees and customers. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.