Skip to main content

Save or Share this Report

For Security & Risk Professionals

Market Overview: Employee And Customer Authentication Solutions In 2013, Part 2 Of 2

Three Generations Of Vendor Solutions Tackle Various Challenges

February 24, 2014


Why Read This Report

Part 1 of this report captured what you need to know about the seven important trends in the frothy authentication market, which spans three generations of technology. Part 2 dives into the usability, deployability, and security characteristics of dozens of traditional and emerging authentication-related solutions and assesses their suitability for different populations, authentication stages, and user interaction channels.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($2995 USD).


Table of Contents

  • Assess Authentication Solutions' Usability, Deployability, And Security
  • Solution Assessments
  • Supplemental Material
  • Related Research Documents

Recommended Research