TechRadar™ For Security Pros: Zero Trust Identity Standards, Q3 2012
October 24, 2012
Why Read This Report
This report outlines Forrester's solution to help security and risk (S&R) leaders develop their road map of IAM processes using Forrester's TechRadar™ methodology. The extended enterprise requires enterprise applications, identity stores, mobile apps, and other systems to generate and consume a variety of identity and access information in order to protect sensitive corporate resources. This information must often flow across system and organization boundaries to account for B2B access, employee single sign-on to cloud apps, mobile app authorization, and more. In this environment, standards and protocols take on an exaggerated importance; the best of them enable organizations to control user access in a secure, interoperable, and agile fashion. This TechRadar assesses 17 of the key traditional and emerging standards used to help achieve a Zero Trust stance in extended-enterprise identity and access management.
Already a Client?
Log in to read this document.
Become a Forrester Client
Timely and relevant, Forrester's RoleView research aligns to 13 leadership roles across business and technology management. Our expertise in customer experience, mobile, digital business, and big data will help your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($2495 USD).Purchase
Table of Contents
- The State Of Plans For Identity Standards
- Why The Future Of Zero Trust Identity Standards Matters
- Overview: TechRadar For Zero Trust Identity Standards
- TechRadar: Emerging Standards Deliver — But Also Demand — Agility
- Supplemental Material
- Related Research Documents
Predictions 2016: Customers Boost IAM
November 12, 2015 | Andras Cser
Optimize Your Identity And Access Management Program For Success
June 14, 2016 | Merritt Maxim
Identity And Access Management Metrics For Business Value
May 27, 2016 | Andras Cser