The Forrester Wave™: Risk-Based Authentication, Q1 2012
The Six Vendors That Matter Most And How They Stack Up
February 15, 2012
Why Read This Report
In Forrester's 16-criteria evaluation of risk-based authentication vendors, we identified the six significant vendors in this category — CA Technologies, Entrust, iovation, RSA, Symantec, and ThreatMetrix — and researched, analyzed, and scored them. This report details our findings about how each vendor measures up and plots where they stand in relation to each other, to help security and risk professionals select the right solution for their authentication requirements.
Already a Client?
Log in to read this document.
Become a Forrester Client
Timely and relevant, Forrester's RoleView research aligns to 13 leadership roles across business and technology management. Our expertise in customer experience, mobile, digital business, and big data will help your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($2495 USD).Purchase
Table of Contents
- Ease Of Use And Cost Of Deployment Drive Use Of Risk-Based Authentication
- Risk-Based Authentication Evaluation Overview
- Evaluation Analysis
- Vendor Profiles
- Supplemental Material
- Related Research Documents
Mobile App Internet Recasts The Software And Services Landscape
February 28, 2011 | John C. McCarthy
Brief: California's Employee Reimbursement Ruling Won't Stem BYOD
August 27, 2014 | David K. Johnson
Case Study: How Data Can Enable Business Disruption
March 19, 2015 | Dan Bieler